Title of the Paper Authors
Neural network molecular classification Francisco Torrens
The following papers belong to: WSEAS NNA-FSFS-EC 2003, May 29-31, 2003, Vouliagmeni, Athens, Greece
Associative memories on BBS neural networks: a hardware-oriented learning algorithm
Renzo Perfetti,Giovanni Costantini
Multivariable Control of A HVAC System Using CBETDL (Context Based Emotional Temporal Difference Learning)
Farzan Rashidi, Caro Lucas
Segmentation of Thai Handwritten Word using Heuristic Method Based on Distinctive Features
Kantip Kiratiratanaphrug,Suwich Kunaruttanapruk,Rud Budsayaplakorn,Somchai Jitapankul
speed contro of switch reluctance motors using context based brain emotional learning
Farzan Rashidi, Caro Lucas
Multivariable Control of A HVAC System Using CBETDL (Context Based Emotional Temporal Difference Learning)
Farzan Rashidi, Caro Lucas
Multivariable Control of A HVAC System Using CBETDL (Context Based Emotional Temporal Difference Learning)
Farzan Rashidi, Caro Lucas
Multivariable Control of A HVAC System Using CBETDL (Context Based Emotional Temporal Difference Learning)
Farzan_Rashidi, Caro Lucas
Self-Organization Neural Networks In Prediction of the breakdown voltage in a Point Barrier–Plane Air Gap
L. Mokhnache , A. Boubakeur
Application of chaotic time series for short-term load prediction
A. Tsakoumis, P. Fessas, V. Mladenov, N. Mastorakis
speed contro of switch reluctance motors using context based brain emotional learning
Farzan Rashidi, Caro Lucas
Almost space-invariant cellular neural network for edge detection
Giovanni Costantini, Daniele Casali, and Renzo Perfetti
Pýnar Dundar
Principal Components Analysis Competitive Learning
the stability measures by some invariants of generalised petersen graphs
A Novel Neural Network Controller to Eliminate Buffer Overflow in Client/Server Based Internet Applications
Wilfred Wan Kei Lin and Allan Kang Ying Wong
Applications of Neuro-Fuzzy Methods for Improved Housing Value Forecasting
Izabella Lokshina, Miroslav Trunec
Ezequiel L≤pez-Rubio, Josώ Mu±oz-Pώrez, Josώ Antonio G≤mez-Ruiz
Calculation of Parameters of Low-pass Ladder Networks with Mixed Lumped and Distributed Elements by Means of Artificial Neural Networks
Metin ▐engⁿl,Atilla ╓zmen,Melek Y²lmaz
Serban Radu
Melanie Middlemiss
Multilayer Perceptron Trained by the Backpropagation Algorithm
an application of ordered fuzzy artmap neural network in online short term load forecasting
Shahram Javadi, Hossein Shourestani
Calculation of Parameters of Low-pass Ladder Networks with Mixed Lumped and Distributed Elements by Means of Artificial Neural Networks
Metin ▐engⁿl,Atilla ╓zmen,Melek Y²lmaz
A speed controller for a pv-supplied dc motor drives using universal learning networks
Ahmed Hussein, Kotaro Hirasawa, Jinglu Hu, Junichi Murata
Calculation of Parameters of Low-pass Ladder Networks with Mixed Lumped and Distributed Elements by Means of Artificial Neural Networks
Metin Sengul, Atilla Ozmen, Melek Yilmaz
Adaptable Connectionist Based Framework for Intrusion Detection
Raul C. Muresan
Salim Chikhi
Neural network molecular classification Francisco Torrens
Optimizing the Learning of Binary Mappings John A. Bullinaria
RetinotopicNET: An Efficient Simulator for Retinotopic Visual Architectures.
Building lithologic facies using a non supervised neural method
Influence of activation function for quality of shipΤs motion modelling using artificial neural networks
Zygmunt Kitowski, Bogdan Zak
Neuro-Fuzzy Approaches for Identification and Control of Nonlinear Systems
Associate Proffessor Dr. Anuar Ahmad
Analysis of Neural Network Edge Detection
Tony Jan
Tony Jan
Application of chaotic time series for short-term load prediction
A. Tsakoumis, P. Fessas, V. Mladenov, N. Mastorakis
Calculation of Parameters of Low-pass Ladder Networks with Mixed Lumped and Distributed Elements by Means of Artificial Neural Networks
Metin Sengul, Atilla Ozmen, Melek Yilmaz
M. I. Rajab and M. S. Woolfson
Effective surveillance image analysis using combination of linear regression and modified probabilistic neural network
Tony Jan, Massimo Piccardi, Thomas Hintz
Effective surveillance image analysis using combination of linear regression and modified probabilistic neural network
Effective surveillance image analysis using combination of linear regression and modified probabilistic neural network
Modelling User Navigation
Raul Muresan
Face Recognition Using Neural Networks A. Khashman
28 Female
Multivariable Control of A HVAC System Using CBETDL (Context Based Emotional Temporal Difference Learning)
Farzan Rashidi, Caro Lucas
Corina Sas, Ronan Reilly, Gregory O'Hare, Ioana Marian
Visual Scale Independence in a Network of Spiking Neurons
Architectures and Techniques for Monolingual and Multilingual Information Retrieval Systems in a SOM Framework
Ioannis Triantafyllou, George Carayannis
Raul Muresan
Automated Visual Surveillance using Artificial Neural Network Classifiers
Tony Jan, Massimo Piccardi, Thomas Hintz
an integrated approach for the prediction of tropical cyclone and weather forecast
James Liu Raymond Kwong Meng Wang Danny Sin Lakhmi Jain
Self-Organization Neural Networks In Prediction of the breakdown voltage in a Point Barrier–Plane Air Gap
L. Mokhnache, A. Boubakeu
Visual Scale Independence in a Network of Spiking Neurons
Multivariable Control of A HVAC System Using CBETDL (Context Based Emotional Temporal Difference Learning)
Farzan_Rashidi, Caro Lucas
technical drawing treatment for video presentation
Raul Muresan
Self-Organization Neural Networks In Prediction of the breakdown voltage in a Point Barrier–Plane Air Gap
L. Mokhnache , A. Boubakeur
E. Chiarantoni, V. Di Lecce, A. Guerriero, S. Impedovo
Robustness Analysis of a Cellular Associative Memory for Sinusoidal Signal Recognition
Leonarda Carnimeo, Antonio Giaquinto
Multi-agent interaction of complex systems in restricted resources environment
A. Prykarpatsky, V. Gafiychuk
Robustness Analysis of a Cellular Associative Memory for Sinusoidal Signal Recognition
Leonarda Carnimeo, Antonio Giaquinto
Classification Methods using Neural Networks and Partial Precedence Algorithms for Differential Medical Diagnosis: A Case Study
Angel Fernando Kuri-Morales, Martha R. Ortiz-Posadas
Visual Scale Independence in a Network of Spiking Neurons
the online learning of a hybrid fuzzy controller
Introduction in Artificial System Intuition Leonid M. Polyakov
Introduction in Artificial System Intuition Leonid M. Polyakov
Shiming Wang, Hongshe Jia, Tianshi Li
Fuzzy average to estimate a situation of a complex system of biodisponibility
Regina Lanzillotti, Haydώe Lanzillotti, Monica Borges
A Dynamic Scalar-Tuning Fuzzy Control System Design
Hsuan-Ming Feng and Ching-Chang Wong
Designing of fuzzy tracking autopilot for underwater robotic vehicle using genetic algorithms
Jerzy Garus, Zygmunt Kitowski
Design of Anfis networks using hybrid genetic and svd methods for modelling of explosive cutting process
A Darvizeh, N Nariman-zadeh, M Dadfarmi
Introduction in Artificial System Intuition Leonid M. Polyakov
Introduction in Artificial System Intuition Leonid M. Polyakov
Fuzzy Set Theory and Spatial Analyses Techniques for Poverty Mapping and Decision Making Support
Margareth Simões Penello Meirelles and Oswaldo Luiz Humbert Fonseca
A Dynamic Scalar-Tuning Fuzzy Control System Design
Hsuan-Ming Feng and Ching-Chang Wong
Multi Objective Emotional Learning Based Fuzzy Inference System
Ali Abbaspour, Ali Gholipour, Caro Lucas, Babak N. Araabi, Mehrdad Fatourechi
Fuzzy identifiability, controllability and observability
Stephen C Stubberud
comparison of three adaptive neuro-fuzzy architectures in modeling a water gas heater: input clustering data and input variables selection
Jose Vieira and Alexandre Mota
Andrzej Swierniak, Adam Galuszka
optimal design of anfis networks using genetic algorithm and svd for the modelling of natural frequencies of orthotropic cylindrical shells
Nader Nariman-zadeh, M. Darvizeh, M. Barati, C.B. Sharma
measreuemt-to-track association using fuzzy logic compared to the chi-squared metric
Applications of Neuro-Fuzzy Methods for Improved Housing Value Forecasting
Izabella Lokshina, Miroslav Trunec
Stephen C Stubberud
A Fuzzy Model for an Automotive Engines-Development on a Production Vehicle
Alaa F. Sheta and Janos Gertler
A Dynamic Scalar-Tuning Fuzzy Control System Design
Hsuan-Ming Feng and Ching-Chang Wong
Mamdani type fuzzy controllers for the stabilization of linear systems
Anis Sakly, Kamel Ben Othman and Mohamed Benrejeb
measreuemt-to-track association using fuzzy logic compared to the chi-squared metric
Improving Ranking of the PLIR System By Local And Global Approaches
Elham Ashoori, Farhad Orumchian, Babak Nadjar Araabi
Using Plausible Reasoning for Implementing Intelligent Tutoring Systems
Bita Khandzad, Farhad Oroumchian
Simulation of fractal hybrid orbitals for proteins Francisco Torrens
Controllability of nonlinear systems Klamka
Klamka Jerzy
Said Elkhetali
a new parent selection method based on real-life family situation for genetic algorithm
Angus Wu and L. F. Yeung
Constrained controllability of distributed parameter systems
Application of genetic algorithms to ground probing radar data
A multi-level approach using a diversified Genetic Algorithm for solving partitioning problem in codesign
Mouloud Koudil, Karima Benatchba, Daniel Dours
computing fuzzy Ö-testors using a genetic algorithm
Seppo Sirkemaa
Recurrence Plot Analysis of Internet Traffic
José Ángel Santos-Gordillo, Jesús Ariel Carrasco-Ochoa, José Francisco Martínez-Trinidad
combining evolutionary techniques to improve alvot efficiency
Jesús-Ariel Carrasco-Ochoa, José-Francisco Martínez-Trinidad
Transparent and Automatic SLA Management in Proactive Networks: Closed Loop re-Configuration
MAURIZIO D’ARIENZO, ANTONIO PESCAPE', GIORGIO VENTRE
Knowledge and skills in information technology infrastructure development
Francesco Palmieri, Ugo Fiore
Optimized MAP turbo decoder for 3rd generation W-CDMA systems
Maryam Mizani, Abdolreza Nabavi
From UML to OF-Class towards formal specification
Specific Evolutionary Algorithms for Permutation Problems
Frank Neumann, Friedemann Simon
Application of Satisfiability algorithms to data-mining problems
Karima BENATCHBA, Lotfi ADMANE, Mouloud KOUDIL
Lagrange Multipliers and Other Sensitivity Indices Applied to Voltage Collapse Analysis
Leonardo M. Hon≤rio, A . C. Zambroni de Souza, Geraldo L. Torres
Thouraya Bouabana-Tebibel and Mounira Belmesk
A Hybrid MAX-MIN Ant System to MRF-based Image Segmentation
Ouadfel Salima ,Batouche Mohamed
L. Kalyan Kumar
Criteria for Evaluation of Medical Websites on the Internet
George Anastassopoulos, Dimitrios Mantzaris, Ioannis Stephanakis
A Hybrid MAX-MIN Ant System to MRF-based Image Segmentation
Ouadfel Salima ,Batouche Mohamed
Microstructure Characteristics of ZnO Varistors Simulated by Voronoi Network
S. W. Han and H. G. Cho
An adapted Genetic Algorithms for solving Max-Sat problems
Karima Benatchba, Mouloud Koudil, Habiba Drias, Rahim Belkacem
Producing A Better Solution From Bad Chromosomes For VLSI Test Pattern Generation
hierarchical co-evolution for non-routine design
Robust Relay and PD-Sliding Mode Controllers Design Methods for Robot Position Systems with Parameter Perturbations
M. N. A. Parlakci, E. M. Jafarov, Y. Istefanopulos
experimental design theory for multiparent recombination
Angus Wu and L. F. Yeung
An Improved Genetic Algorithm for Multiprocessor Task Scheduling with Non-Negligible Inter-processor Communication Delay
Jessica Yantachka Frank Moore Gregory Kramer Michael Bohler Yi Pan
A Comparative Study Using Genetic Algorithms to Deal with Dynamic Environments
Anabela SimΫes, Ernesto Costa
M A Rosenman and R Saunders
computing fuzzy Ö-testors using a genetic algorithm
Acquisition of tacit knowledge in virtual organisations Bouarfa Hafida
L. Kalyan Kumar
Watch thy neighbor or how the swarm can learn from its environment
Rui Mendes James Kennedy Josώ Neves
José Ángel Santos-Gordillo, Jesús Ariel Carrasco-Ochoa, José Francisco Martínez-Trinidad
combining evolutionary techniques to improve alvot efficiency
Jesús-Ariel Carrasco-Ochoa, José-Francisco Martínez-Trinidad
genetic optimization Ψ a hybrid evolutionary computation approach
felix streichert, holger ulmer, andreas zell
Producing A Better Solution From Bad Chromosomes For VLSI Test Pattern Generation
Parallel Evolutionary Algorithms on Message Passing Clusters
Jason Digalakis , Konstantinos Margaritis
an evolutionary computational method with experimental design for parametric optimization
Angus Wu and L. F. Yeung
Evolution of Cellular Automata-based Multiprocessor Scheduling Algorithms
Franciszek Seredynski, Albert Y. Zomaya, Pascal Bouvry
Parallel Evolutionary Algorithms on Message-Passing and Shared-Memory Clusters
J. Digalakis, K. Margaritis
Parallel Evolutionary Algorithms on Message-Passing and Shared-Memory Clusters
J. Digalakis, K. Margaritis
Designing a Biological Experiment Using Genetic Programming: An Evolutionary Methodology to Improve the Production of Thermostable Lipase Enzyme
Walid M. Aly, Walaa M. Sheta, Yasser R. Abdel-Fattah and Alaa F. Sheta
Solving Method for a Class of Bilevel Linear Programming based on Genetic Algorithms
Wang, G., Wan, Z. and Wang,X.
Klamka Jerzy
George Antoniou
Constrained controllability of distributed parameter systems
high dimensional function optimization using a new genetic local search suitable for parallel computers
Shuhei Kimura Akihiko Konagaya
The following papers belong to: CSCC 2003, Corfu Island, Greece, July 7-10, 2003
Second-order regular and singular state space systems
Chaos and complexity in nonlinear circuits: Dynamic properties and generation of strange attractors
Donato Cafagna, Giuseppe Grassi
Elbrous M. Jafarov
Combined approach to symbolic approximation
Linearizing l-order generalized systems M. Isabel Garcia-Planas
Delay-dependent stability and alpha-stability criterions for linear time-delay system
Zdenek Kolka, Martin Vlk
Use of probabilistic multiple carries to enhance the performance of a 32-bit asynchronous estimated carry adder
E.M. Ashmila, S.S. Dlay, O.R. Hinton
Generalized reference state model of piecewise-linear dynamical systems
Jiri Pospisil, Zdenek Kolka, Stanislav Hanus, Jaromir Brzobohaty
A Practical method to reconstruct the states and parameters of the Chua's system based on successive integrations of the output
Miguel S. Suarez Castaρon , Carlos Aguilar Ibaρez
Kernel pseudo-error monitor Peng Wang, Wee Ser
Fault detection and identification through variance of wavelet transform of system outputs
G. D. Gonzalez, G. Ceballos, R. Paut, D. Miranda, P. La Rosa
Performance evaluation of received power based call admission control techniques for W-CDMA uplink
Antonio Capone, Simone Redana
Designing new telecommunications services upon open programmable networks
Dionisis Adamopoulos, Constantine Papandreou
Performances of STFBC for MIMO OFDM Broadband FWA Systems
Antonios D. Valkanas, Ana Maria Gallardo, Panagiotis I. Dallas, Alexander D. Poularikas
Performance evaluation of call admission control techniques for UMTS downlink
Antonio Capone, Simone Redana
Implementation of an open platform for voice over IP applications
Stergios Spanos, Kyriakos Satlas, Kostas Papakonstantinou, John Angelopoulos, George Stasinopoulos
Time critical parameters for beamforming in software radios
V. N. Christofilakis, A. A. Alexandridis, K. P. Dangakis, P. Kostarakis
On the Estimation of Shape Similarity in Robotics Dorina-Mioara Purcaru
Defining parallel automata and their conflicts
Designing of fuzzy tracking autopilot for underwater robotic vehicle using genetic algorithms
Jerzy Garus, Zygmunt Kitowski
H.G. Mendelbaum, R.B. Yehezkael (formerly Haskell), T. Hirst, A. Teitelbaum, S. Bloch
Using weights as tools in handling systems instability in model-reality optimal control algorithm
Rohanin Ahmad, Mohd Ismail Abd Aziz
Sliding mode throttle control for drive-by-wire operation of a racing motorcycle engine
Alessandro Beghi, Mauro Bisiacco, Sebastiano Daros, Lorenzo Nardo
Verifying specifications in hybrid automata models of systems
Isabella Kotini, George Hassapis, Ioannis Mavridis
Dorina-Mioara Purcaru
The Configuration of the CSC (Cable SMS Confirmatio Tae Kyoon Kim, Eun Jung Kwon, O-Hyung Kwon
Considerations about the classification of the prototypes
Simulation model of underwater vehicle’s motion in disturbed environment
Bogdan Zak, Andrzej Zak
Verification of hybrid system specifications using linear hybrid automata
Isabella Kotini, George Hassapis, Ioannis Mavridis
Application of a corba-based humanoid robot system for accident site inspection through the internet
Yasuo Nasu, Shin-Ichiro Kaneko, M. Yamano, G. Capi, S. Nahavandi
An evolutionary based method for humanoid robot gait initiation and transition
G. Capi, Yasuo Nasu, K. Mitobe
Texture presentation capabilities of a high resolution tactile display mounted on a mouse
Masahiro Ohka, Hiroshi Koga, Yasunaga Mitsuya
Stanislav Milanovic
Florin Lohan, Irek Defee
Quality of service as an essentila component of the next generation Internet
Zoran Bojkovic, Zoran Perisic
Integration of the wireless lans into enterprise security architecture
The Design of a RISC Processor Based on a Fixed-point ISA of MIPS R2000 Processor For Telecommunication Applications
S. Ahmad Mohseni Barandagh, A. Khademzadeh
Parallel architecture for flexible approximate text searching
Panagiotis Michailidis and Konstantinos Margaritis
Integrated web-based management system for a heterogeneous multimedia systemQuality of service routing of bandwidth guaranteed connections in MPLS networks
Antonio Capone, Fabio Martignon
Interference level configuration in CDMA based cellular networks
P. Demestichas, K. Tsagkaris, M. Theologou, G. Dimitrakopoulos
A priority dropping mechanism for the multicast delivery of layered video in a DiffServ environment
P. Stathopoulos, S. Zoi, D. Loukatos, V. Tountopoulos, A. Roustas, N. Mitrou
Configuring a differentiated services domain towards achieving fair distribution of resources between TCP and UDP flows
Giannis Dermitzakis, Panagiotis Stathopoulos, Nikolas Mitrou
Accurate scheduler implementation for shaping flows of variable length packets in high-speed networking applications
Th. Orphanoudakis, H.-C. Leligou, George Kornaros, Ch. Charopoulos
Hierarchy of models in microsystems design Miroslav Husak
Evaluation of delay bound for QoS provisioning in optical packet network interface
Michael S. Berger, Brian B. Mortensen, Villy B. Iversen, Rodrigo Jociles-Ferrer
Measurement-based QoS management in composite radio environment
D.Kouis, V.Tountopoulos, P. Stathopoulos, K.Kontovasilis, N. Mitrou
Evaluating a QoS-aware MAC protocol for packet-oriented GPON access network
J. D. Angelopoulos, T. Argyriou, H. C. Leligou, C. Linardakis
Methodology of development of high-tech profitable Mission Control Center for automatic space vehicles
Valeriy Alekseevich Udaloy, Nikolay Mihailovich Ivanov , Nikolay Leonidovich Sokolov , Vladimir Urievich Pazdnikov
Computational experience with a GRG method for minimizing fuel consumption on cyclic natural gas networks
Humberto Flores-Villarreal, Roger Rios-Mercado
Generating number sequences with different distributions by means of topological conjugacies between non-linear maps
Mieczyslaw Jessa, Marcin Walentynowicz
George K. Adam
G. Economakos
Modelling and simulation with arena of a mechatronics system for hydraulic tubes constructionSystem C as an open source hardware / software Co-simulation platform
Importance of the color in the cave maps and the imposed limitations for the light of acetylene electromagnetic spectrum
Jesus Irigoyen, Jose-Carlos Martinez, Eloina Coll, Jose Herraez
Shape analysis and classification in the identification of colon texture images
Khaled Marghani, Satnam Dlay, Andrew Sims , Bayan Sharif
New construction of complete complementary arrays with applications to image watermarking
Said E. El-Khamy, Mohamed A. Mokhtar, and Noha O. El-Ganainy
Color images segmentation using the Support Vector Machines
H. Gomez, P. Gil, S. Lafuente, R. Vicen, R. Sαnchez
Steganography detection of whole-image-DCT-based watermarking in gray-scale images
Sui Song, Dekun Zou, Constantine Manikopoulos and Yun-Qing Shi
A study on real time pitch alteration of speech signal
Lorenzo Ntogramatzidis
Wangrae Jo, Myungjin Bae
An integrated systems approach to monitoring and control of complex industrial processes
Yingchuan Zhang, D. Britton, Yong Zhang, B. Heck and G. Vachtsevanos
On the motion control of unmanned skid steering vehicles
Lefteris Doitsidis, Kimon Valavanis, Nikos Tsourveloudis
A closed-form representation of the solution of the Riccati Differential Equation
Peculiarities of spacecraft “Ocean-O” control in geomagnetic storms
Udaloy Valeriy Alekseevich, Ivanov Nikolay Mihailovich, Sokolov Nikolay Leonidovich, Pazdnikov Vladimir Urievich
Jerzy Garus
Fundamental principles of safety related system design
Gerhard H. Schildt, Daniela Kahn
Sufficient conditions for optimal control problems with state constraints
Elzbieta Gakewska, Andrzej Nowakowski
Non-linear control of motion of underwater robotic vehicle in vertical plane
Energy estimation with systemC: A programmer's perspective
Spiros Xanthos, Alexander Chatzigeorgiou, George Stephanides
An efficient test strategy for fast multiplier cores
Maziar Nekovee
Georgios Ch. Sirakoulis
Tatjana Kapus
Jiann-Chyi Rau, Ohia-Hung Lin, Ching-Hsiu Lin
stocast: a stochastic algorithm for scalable data aggregation in multicast sytems
Cartographic viewer using objects of ArcGIS 8.1 and Visual Basic 6.0. Application to the historical center of Valencia
Eloina Coll, Ion Martinez, Jose-Carlos Martinez, Jesus Irigoyen
Exploring the influence of feature geometry on design style
Chensheng Wang, Joris S. M. Vergeest, Tjamme Wiegers, D. J. van der Pant, T. M. C. van den Berg
An algorithm for the direct conversion of boolean expressions into VHDL code.
Rapid verification of a traffic light controller using ObjectGEODE
In search for chroma in music
Telemedicine: multimedia communication perspective
W. F. Poon and K.T. Lo
SALM: a scalable application layer multicast protocol
A method for determination the influence of thermic deformation of the round pieces and lathe’s knife about the size accuracy without temperature measurement
C.C. Tsakoumis, T.A. Tashev, A.C. Tsakoumis, V.M. Mladenov, N.E. Mastorakis
Dionysios Politis, Dimitrios Margounakis
Zoran Bojkoviζ, Andreja Samθoviζ, Vedrana Miliζ-Raiζ�
Performance study of hierarchical video-on-demand (VoD) systems for layered videos in broadcast environment
Development of awareness driven 3D videoconferencing applications
Mojtaba Hosseini, Steve Pettifer, Nicolas D. Georganas
Panayotis Fouliras,Athanasios Manitsaris,Spiros Xanthos
A flow management scheme for multimedia traffic for hiA. Sharifinejad
Background behavior analysis in video sequences
Parameter analysis of Morlet wavelet transform based Liming Zhang, Tao Qian
On a reduction of computation time of FFT cepstrum
Transparency reduction algorithms for 3D-DCT encoders and decoders
Tomas Fryza, Stanislav Hanus
A fast novel motion estimation for video coding using logarithmic diagonal search algorithm
Somphob Soongsathitanon, Santam S. Dlay
P. Gil-Jimenez, S. Lafuente, R. Vicen, R. Sanchez and R. Gil
A decision fusion framework for content-based image retrieval
Panagiotis Androutsos, Azadeh Kushki, Konstantinos Plataniotis, Anastasios Venetsanopoulos
JongKuk KIM, MyungJin BAE
Combined methods for image compression
Ernesto Saavedra, Adolf Grauel, Danny Morton
Performance enhancement of asynchronous MC-CDMA system with carrier frequency offset using successive interference cancellation
Ramy Abdallah , Mohamed Mokhtar
Modified diffusion dynamic load balancing employing mobile agents
Magdy Saeb, Cherine Fathy
Impact of imperfect channel knowledge on adaptive MIMO system performance
Tomaz Javornik, Gorazd Kandus, Sreco Plevel, Tomaz Slivnik
The impact of location awareness in mobile ad hoc networks
Dionisis X. Adamopoulos, Constantine A. Papandreou
Accurate measurements and modeling of interaction between the human head and the mobile handset
T.Zervos, A.A.Alexandridis, V.V.Petrovic, K.Dangakis, B.M.Kolundzija, D.Olcan, A.R.Dordevic, C.Soras
T. Newe, T. Coffey
Specifications of spatial analysis software
M. Reza Salehnamadi
Deploying power-aware on-demand (PAOD) schemes over routing protocols of mobile wireless Ad-Hoc networks
Mohammed Kamel, Ahmed Sameh
On the logical verification of key exchange protocols for mobile communications
Study and of the characteristics needed for underwater acoustic networks
Ahcene Buzoualegh, Thierry Val, Fabrice Peyrard, Eric Campo
Wireless mobile Ad Hoc network (MANET) emulation using the hardware switch software router (HSSR) platform
Bin He, Jun Li, Constantine Manikopoulos
Philippos Pouyioutas, Nadia Charalambous
RMICR: Reconfigurable mesh with interchangeable coloumn_row
Portable instrumentation and profiling of Java bytecode
Emanuele Lattanzi, Alessandro Bogliolo, Luca Benini
INFRAWEBS - Intelligent framework for networked busH.-J. Nern, T. Atanasova, G. Agre, J. Saarela
K. H. Edelmoser
The reliability optimization in safety - Critical and real-time embedded systems
Ninoslav Slavek, Franjo Jovic
Bi-directional DC-to-DC converter for solar converter applications
Fair unbundling of transmission power losses in competitive environments
Enrico De Tuglie, Francesco Torelli
FDTD simulation for detection of objects buried in lossy and inhomogeneous soils
Fethi Choubani, Thouraya Ajroudi, Ammar Bouallθgue
High quality model of data hiding in a binary image AL-Jaber Ahmed
Secure key-exchange
Sangseung Kang
Application of a genetic algorithm for calculating the capacitances on an insulator string
Ioannis F. Gonos, Nikoleta C. Ilia, Vassiliki T. Kontargyri, Ioannis A. Stathopoulos
Method for design of balanced boolean functions satisfying strict avalanche criterion (SAC)
M.Mitrouli,A.P.Markovskyy
Methods and tools for improving efficiency of symmetric cryptographic algorithms
N.G.Bardis, A.P.Leros, E.G.Bardis, N.Karadimas
George Stephanides, Nicolae Constantinescu
A secure and invisible data hiding in a gray-scale image
Ahmed AL-Jaber & Khair Eddin Sabri
On the extended key recovery in E-commerce systems
Multimedia contents security: watermarking requirements and techniques
Zoran Bojkovic, Dragorad Milovanovic
Models with equivalent circuit of the PWM converters Elena Niculescu
K. H. Edelmoser
An accelerated Papoulis-Gerchberg algorithm
A comparison study of very large time constant switched-capacitor integrators
N. Radev, K. Ivanov, V. Mladenov
Current mode state models of third-order dynamical systems
Tomas Dostal, Jiri Pospisil, Stanislav Hanus, Vaclav Michalek
Control strategy of a stand-alone solar power inverter CONTROL
Full-order model of the boost PWM converter with DCM
Elena Niculescu, Eugen-Petrisor Iancu
Robust position and tracking variable structure pd-controllers design methods for robot manipulators with parameter perturbations
M. N. A. Parlakci, E. M. Jafarov, Y. Istefanopulos
A model evaluation of a wavelet based multiresolution image data coding
Vincenzo Di Lecce, Andrea Guerriero, Sebastiano Impedovo
Benjamin G. Salomon, Hanoch Ur
alessandro bogliolo
Popescu Theodor
Tracking time-varying channels with adaptive step-size transform domain lms algorithm
Radu Ciprian Bilcu, Pauli Kuosmanen, Karen Egiazarian
Accurate sampling of the instantaneous value of fast periodic signals
A feedforward compensation scheme for perfect decoupling of measurable signals
Giovanni Marro, Lorenzo Ntogramatzidis
Change detection method with application in vibrating structures analysis
Condition number for reliable microwave transistors modelling
Wahid Bejaoui, FethiI Choubani, Ammar Bouallegue
On designing address lookup methods for IPv6 Kari Seppanen
Migration path to fully integrated IP-SAN Stanislav MilanovicService control in connection oriented networks Cristian Lambiri, Dan Ionescu, Bogdan IonescuA comparative analysis of on-line measurement-based Fatih Haciomeroglu, Michael DevetsikiotisDelay reduction with provision based fair scheduling a Henrik Wessing
Predictive multi-mode quantizer structure for parametric speech coding systems
Jani Nurminen, Ari Heikkinen, Jukka Saarinen
Bandwidth estimation schemes for TCP over wireless networks
Antonio Capone, Fabio Martignon
A mathematical model of TCP with bandwidth estimation
Antonio Capone, Fabio Martignon
Design of converged IN and IP architecture that offers existing and next generation services to both PSTN and IP users
Maria Skoura, Fadi-Sotiris Salloum, Anastasios Dagiuklas, Panagiotis Katsavos, Spyros Anthis
Comparative routing overhead analysis of PNNI and saturation for ATM networks
Jose L. Ucles, Constantine N. Manikopoulos
Geospatial information management system
Influence of activation function for quality of ship's motion modeling using artificial neural networks
Bogdan Zak, Andrzej Zak
Locally-connected neural networks: Stability analysis and synthesis technique
Giuseppe Grassi, Donato Cafagna
Text-to-phoneme mapping using a fast neural network with adaptive learning rate
Eniko Beatrice Bilcu, Janne Suontausta, Jukka Saarinen
A neural network based human machine interactive system
M. Srinivasan, W.L. Woo, S.S. Dlay
Improving performance of neural network models for intrusion detection using singular value decomposition
Ohm Sornil and Jessada Kajornrit
Eloina Coll, Oscar Atienza, Jose-Carlos Martinez, Rafael Gabaldon
Vladislav Skorpil
Mahmud Hassan
Hardware community through the use of web services and hardware interpreter
S.C. Wong, S.N.Cheong, Azhar K.M.
Proposal and study case of a multiAgent architecture to retrieve information in distributed and heterogeneous data source
Maristela T. Holanda, Danisio F. M. Sousa, Robson P. Miranda, Rafael T. S. Jr, Claudia J. B. Abbas
On the evaluation of availability in computer networks based on an N-Tier client/server architecture
Flavia E. S. Coelho, Jacques P. Sauve, Claudia J. B. Abbas
Virtual network creation on an ATM multimedia environment
An efficient path recovery mechanism for LDP in MPLS networks
Jenhui Chen, Chung-Ching Chiou, Shih-Lin Wu, and Cheng-Yi Lin
Robust path routing protocol in mobile Ad Hoc networks
Shih-lin Wu, Chung-Ching Chiou, Jenhui Chen, and Tai-Jiun Chen
Delay analysis of a discrete-time non-preemptive priority buffer with 3 traffic classes
Joris Walraevens, Bart Steyaert, Herwig Bruneel
A new approach to designing fuzzy systems
Feature selection for clustering based fuzzy modeling
Modelling interdependent critical infrastructure
On using the hyperbolic distribution to statistically model network LAN traffic time-segments
Jun Li, Constantine Manikopoulos
Leszek Rutkowski, Krzysztof Cpa³ka
Inverse modelling of the mass transfer process in the RDC column by fuzzy approach
N.Maan, J.Talib, K.A.Arshad & T. Ahmad
Data driven modeling using descriptive Takagi-Sugeno fuzzy systems
Ingo Renners, Adolf Grauel
A. Chong, T.D. Gedeon, L.T. Koczy
Roberto Setola, Giovanni Ulivi
Tomas Dostal
Optimization of elliptic leap-frog CDBA-based filters
On filter banks and wavelets based on Chebyshev polynomials
R. J. de Sobral Cintra, H. M. de Oliveira, L. R. Soares
Design of FIR digital differentiators using maximal linearity constraints
Ishtiaq Rasool Khan, Masahiro Okuda, Ryoji Ohba
Universal N-order ARC filters using current conveyors and multi-output current followers
Compactly supported wavelets derived from Legendre polynomials: Spherical harmonic wavelets
Milde M.S. Lira, Hιlio M. de Oliveira, Manoel A. Carvalho Jr, Ricardo M.C. de Souza
Synthetic immittance element with gyrator for filter realization
Ivo Lattenberg, Kamil Vrba
Dalibor Biolek, Michal Olsak, Viera Biolkova
A comparison study of very large time constant switched-capacitor integrators
Nikolay Radev, Kantcho Ivanov, Valeri Mladenov
Guy De Trι
Evaluating the impact of information sources heteroge
Argyrios C. Varonides
Argyrios Varonides
Argyrios Varonides
Hierarchical co-evolution for non-routine design
Enhancing the ODMG model: A framework based on constraints
A Spatial Distributed Approach for Electronic Medical Record Administration
George Anastassopoulos, Lamprini Kolovou, Dimitrios Lymperopoulos
A Methodological Approach for Database Access Control Engineering
Ioannis Mavridis, George PangalosEurico Borges, Anália Lourenço,
Improved equivalent circuit, for multiple quantum well photovoltaic nanostructures, by inclusion of thermionically escaping electrons
Photogeneration and Thermionic Currents in p/i(n)/n(+) Multiple Quantum Well Nanostructures
Detailed Fermi level balance in un-doped bulk and intrinsic quantum well nanostructures
Mike Rosenman and Rob Saunders
Alberto Pιrez Alonso
Nadim ObeidUnknown attribute value processing by hierarchical ba Ivan Bruha
Optimisation by clonal selection principlesOrlando Belo
Methods of heuristic search in a hypothetical delivery company
Towards a formalization of collective decision-making and learning
Maintenance of case bases through pruning and learning
Costas Tsatsoulis, Ping Yang
M. Koester, A. Grauel, H. Convey
A common vulnerability markup language and a new zero administration framework of system security
Tian Hai-tao, Huang Liu-sheng
A simple form to encode/decode information based on Carlos Aguilar I., Miguel S. Suarez C., J. Humberto Sossa
An authentication protocol to MANET
Optical receiver for single-photon transmission
Using adaptive decision making based on incomplete trust in electronic commerce
Petri Puhakainen, Catharina Candolin, Hannu H. Kari
Secure key recovery for archived and communicated data
Emmanouil Magkos Vassilios Chrissikopoulos Nikos Alexandris Marios Poulos
Ricardo Puttini, Ludovic Me, Rafael de Sousa
Otakar Wilfert, Josef Sip, Zdenek Kolka
Static compaction for sequential circuits by reassembling test subsequences
Michael Dimopoulos, Panagiotis Linardis
Computational geometry algorithms in an educational intelligent scenario management system
Marios Poulos, Vasilios Belessiotis, Nikolaos Alexandris, Vasilios Chrissikopoulos
On multi-agent fault diagnosis Nadim Obeid
Comparison between computational geometry and coherence methods applied to the EEG for medical diagnostic purposes
Marios Poulos, Nikolaos Alexandris, Vasilios Belessiotis, Emmanouil Magkos
Improved selection of test subsequences in sequential circuits for reduced power consumption
Michael Dimopoulos, Panagiotis Linardis
Compacting test sequences for sequential circuits by applying set covering techniques
Michael Dimopoulos, Panagiotis Linardis
The reliability optimization in safety - Critical and real-time embedded systems
Ninoslav Slavek, Franjo Joviζ
Identifying attractors in a boost converter
Camcorder metric calibration
Opto-electronic devices for optical cross-connect Mohamad A. Habli
A global innovative approach for EMC education Fethi Choubani
Ivan Flegar, Denis Pelin, Tomislav Adamovic
Jose-Carlos Martinez, Eloina Coll, Jesus Irigoyen, Jose Herraez
Compensated bandgap reference voltage using polysilicon resistors
Wenceslas Rahajandraibe, Christian Dufaza, Tahir Rashid, Vivek Chowdhury, Bernard Majoux
E-learning on the web: The necessary fusion of the computer techniques, graphical arts and psychological aspects
Philippe Dondon Patrice Kadionik
Didactical aspects of using web and video in contemporary learning material
Marjan Krasna, Tomaz Bratina
Internet authoring tool for E-learning courseware Boyan Bontcev, Dessislava Vassileva
Development of a DiffServ/MPLS QoS laboratory envi Rafael T. de Sousa Jr, Alexandre C. V. de Oliveira, Regina Tsujiguchi, Vinicious M. Pacheco, Cl
Haohui Liao, Yun Tang
Didactic tool for teaching communication systems and digital signal processing
Jaime alberto Parra plaza, Ferney orlando Amaya
A lan based experience for filter measurement in a microwave laboratory
R. Sanchez M. Gonzalez S. Lafuente R. Vicen P. Lopez
Parameter estimation in nonlinear time-varying systems through Takagi-Sugeno fuzzy models and wavelets
Juan Francisco Araya and Aldo Cipriano
The mathematical descriptions of CCEBC-EEAC method in power systems
Numerical analyses of backward-wave oscillation stability of magnetically focused monofilar-helix traveling wave tube foraApplications in telecommunications
Sergei N. Khotiaintsev, Eugene D. Belyavskiy, Victor Garcia-Garduρo, Ivan V. Shevelenok
G. Shen, D. Budimir
Angus Wu, W.L. Lee
Angus Wu, W. L. Lee
A time-frequency domain timing approach for OFDM systems
Kuang Yujun and Yue Guangxin
Interference analysis of macrodiversity ratio combining in CDMA networks
Y.M. Siu, K.T. Ng, S.W. Leung and K.K. Soo
Novel combline resonator structures for wireless systems
A new approach in iterative multiuser detectionfor asynchronous CDMA communication
Hamid Ebrahimzad, Hamidreza Amindavar
Parallel architecture for hardware implementation of LDPC decoder
VLSI implementation for sequential LDPC decoder with modified architecture
A VLSI chip of scla based 2-d DWT/IDWT
A VLSI architecture of EBCOT for JPEG2000
The queueing systems with Weibull server
Improving ranking of the PLIR system by local and glo Elham Ashoori, Farhad Orumchian, Babak Nadjar Araabi
Tudor Barbu
Tudor Barbu
Leibo Liu, Ning Chen, Hongying Meng, Li Zhang, Zhihua Wang, Hongyi ChenLeibo Liu, Dejian Li, Li Zhang, Zhihua Wang, Hongyi Chen
Analysis and optimization of disk retrieval techniques in a PC-based VoD server
Florin Lohan, Marius Vlad, Irek Defee
Agnieszka Rutkowska, Boguslaw Filipowicz
Entropy gradient: A technique for estimating the entropy of finite time series
Adel Atawy Ahmed Belal
A computer vision system for graphical pattern recognition and understanding
Several pattern recognition approaches for region-based image analysis
Giovanni Costantini
Face detection in color image using multiclassifier
Wataru Kase
VSS control for a class of underactuated systems Faical Mnif
Almost space-invariant cellular neural network for edge detection in grayscale images
Giovanni Costantini, Daniele Cosali, Renzo Perfetti
Hopfield network based associative memories storing grey-scale images
Jie Wang, Konstantinos Plataniotis, Anastasios Venetsanopoulos
Analysis of fault detection space using interactor matrix
On achievable behaviors, controllability, and interconnections of discrete event systems
Takashi Misaki, Osamu Kaneko and Takao Fujii
A novel distributed hierarchical control for blackboard applications
Sahar A. Mokhtar, Ashraf H. Abdel Wahab, Samir I. Shaheen
Extending OpenMP for task parallelism Ami Marowka
Comparison of different coding schemes in CDMA cellular system
Alireza Babaei, Ebrahim Karami, Mohsen Khansari
Optimized MAP turbo decoder for 3rd generation W-CDMA systems
Maryam Mizani, Abdolreza Nabavi
Protecting mobile agents against malicious host attacks
Magdy Saeb, Meer Hamza, Ashraf Soliman
Framework for verifying assertions using sequential ATPG
Ravi Kumar. Dasari and Krishna Kumar. D.
A software assurance tool using web publishing technology
Jose Romero Cunat, Oscar Pastor Lopez
A WEB tool to use traffic management plans V. Ramon Tomas, J. F. Garcia, J. J. Samper, E. Carrillo
Comments on Shao's blind signature scheme
An analysis of average search cost of the external hashing with separate chain
Ningping Sun, Ryozo Nakamura, Hongbing Zhu, Akio Tada, Wenling Sun
Solving rescheduling problems in software project management
Ho-Leung Tsoi, Terry Rout
Optimization technique of static compensators in EHV transmission line
Naeem M. Hannoon, Kartik P. Basu, Boniface C.H.Kwang
Sensitivity of power system losses with respect to power system parameters by using adjoint networks
C.M.S.C. Jesus, L.A.F.M.F. Ferreira
Mingxing He, Pingzhi Fan, Firoz Kaderali
Simple valley-fill self-oscillating electronic ballast with low crest factor using pulse-frequency-modulation
Alyssson Seidel, Fαbio Bisogno, Douglas Pappis, Ricardo Prado
Self-oscillating electronic ballast with automatic luminous control
Alyssson Seidel, Fαbio Bisogno, Douglas Pappis, Ricardo Prado
Victor S. Chernyak
Ioannis Pountourakis
Ioannis Pountourakis
A review about electronic ballasts for high intensity discharge lamps
Fabricio Antonio Egert, Ricardo Nederson do Prado
An analysis about valley fill filters applied to electronic ballasts
Marco A. Dalla Costa, Ricardo N. Prado
Decentralised signal processing for wideband multisite radar systems with information fusion
ISDN dialup Internet access based on dynamic user profiles depending on available resources
Stavros Vrontis, Charalampos Patrikakis, Georgios Mitseas
Propagation latency in the asynchronous transmission WDMA protocols
The impact of propagation delay in WDM networks improvement performance
Salim Chikhi
Giovanni Costantini
Electronic bottleneck reduction: Problem and solution Ioannis Pountourakis
A convergent algorithm for time parallelization
Building lithologic facies using a non supervised neural method
A new hybrid cost function for improving classification performance and accelerating training rate of RBF neural network
D. Huang, T.W.S. Chow, W.N. Chau
Intelligent machine fault detection using SOM based RBF neural networks
Sitao Wu, Tommy W.S. Chow, K.T. Ng
Automatic Target Recognition in SAR Imagery using Neural Network for Classification
Andrew M.Veronis, Dimitri Michalopoulos
Associative memories on BSB neural networks: a hardware-oriented learning algorithm
I. Garrido, G.E. Fladmark, M.S. Espedal
Terrence P. Fries
An efficient lineage tracing in a data warehouse Issam A.R. Moghrabi
Content management Emmanuel Solidakis
John M. Prousalidis
Conflict resolution among intelligent agents using fuzzy linguistic variables
Dual band MMIC filter using active inductors for future wireless communicaton systems
Alexandre Augusto Shirakawa, Cristian Pavγo Moreira, Horαcio Tertuliano Filho
A fully integrated CMOS PLL for frequency synthesizer using Gm-C filter
Wen-Ching Chang, Chun-Hung Lien, Yu-Chung Wei
Universal biquads using CDTA elements for cascade filter design
Dalibor Biolek, Viera Biolkova
A new concurrency control protocol for dynamic-priority scheduling in hard real-time databases
Qiang Wang, Hong-an Wang, Hong Jin, Guo-zhong Dai
Application of space-vector theory to multi-phase multi-winding AC machines
Jyri Rajamδki
Ovidiu Neamtu
Correlations between the finnish EMI statistics of radio systems and EMC market surveillance
High reliability ultra-thin interpoly-oxynitride dielectrics prepared by N2O plasma annealing
J.C. Wang, J.W. Lee, T.F. Lei, and C.L. Lee
Nonlinear magnetostatic surface waves guided by a single ferroelectric interface
Z.I.Al-Shahhar and M.M.Shsbat
Electronic DSP system tester for electrosecurity heater electric resistor
A parallel environment for solving partitioning problems in codesign
Karima Benatchba, Mouloud Koudil, Daniel Dours, Hassane Oumsalem, Kamel Chaouche
A new heuristic for bin assignment and component sequencing in surface mount technology
Gerardo Diaz-Cuellar, Jose Luis Gonzalez-Velarde
Reda El-Khoribi
Intrusion detection system model
On the formal verification of cryptographic protocols
Full design of hidden markov models using evolutionary algorithms
Walter Godoy Junior,Marco Aurelio Bonato
Access key distribution scheme for level-based hierarchy
Mingxing He , Pingzhi Fan , Firoz. Kaderali, Ding Yuan
Tom Coffey Reiner Dojen Tomas Flanagan
Analysis of adaptive-H-struct: An algorithm for mining generalized association rules
Taysir H.Soliman, M.F. Tolba, A. Salem, and A. Hamad
Development of a voltage unbalance electromagnetic compensator
Gilson Paulillo, Jose Policarpo G. Abreu
Monofilar-Helix traveling wave tube for applications i Sergei N. Khotiaintsev, Eugene D. Belyavskiy, Victor Garcia-Garduno, Ivan V. Shevelenok
Control of computer programs using "Field Diagrams" Paolo Rocchi
Gerlic Ivan
Slim Hariri
Analysis of real feed probe influence to the resonant frequencies of the cylindrical metallic cavity using 3D TLM method
Bratislav Milovanovic, Jugoslav Jokovic, Aleksandar Atanaskovic
Nonlinear TM surface waves in a superconductor structure film
M. S. Hamada, M. M. Shabat, D. Jager
Distance education, new communication trends in education - didactic analysis
The following papers belong to: ASCOMS, TELE-INFO, AEE '03 New York, USA, September 14-17, 2003
Parameterization Function: A Novel Modeling Approach For Large Scale Distributed Information Systems
Farid Touati
Farid Touati
A Robust Continuous State Feedback Current Control faical Mnif
A Robust Continuous State Feedback Current Control faical Mnif
Check High Level Properties in Arithmetic Circuits
High-Performance CMOS and BiCMOS Transimpedance Preamplifiers for Optical Communications
New Design Approach for High-Performance BiCMOS Amplifiers for Fiber-Optic Receivers
A Fuzzy Fusion Strategy for the Multimodel Approach Application
Ltaief Majda, Abderrahim Kamel, Ben Abdennour Ridha, Ksouri Mekki
A New Technique of Validities' Computation for Models' base
Talmoudi Samia, Abderrahim Kamel, Ben Abdennour Ridha, Ksouri Mekki
Bijan Alizadeh, Hamid Shojaee
Alexandre Grebennikov
VSS Control for a Class of Underactuated Systems Faical Mnif
high efficiency sequential switching hpwm inverter
A Comparative Study on JPEG-Like and EZW Based Image Coders
Bruno Roque, José Salvado
E-GOVERNMENT – INTEGRATED APPROACH USING CITIZEN’S LIFE CYCLE
B. Visvesvara Rao, K. R. Rajeswari, Satyam Bheemarasetti
Mathematical and Numerical Modelling of Scanning and Penetrating Computer Tomography
"Two Level Crossover Genetic Algorithm For Unit Commitment Problem"
V. Senthil Kumar M. R. Mohan
g.venkatesan, dr. r.arumugam, m.vasudevan,s.balamurugan
inter-domain usable self-certified public key
a WTLS handshake protocol against active attack
estimation of stator resistance of induction motor for direct torque control scheme using adaptive neuro fuzzy inference systems USING ADAPTIVE NEURO-FUZZY INFERENCE SYSTEMS
m.vasudevan, dr. r.arumugam, g.venkatesan,s.paramasivam
The Fast LSPnTransformation algorithm using not uniform interval
Soyeon Min, Kyunga Jang, Myungjin Bae
The Fast LSP Transformation Algorithm using not Uniform Searching Interval
Soyeon Min,Kyunga Jang,Myungjin Bae
Youngseok Chung, Seungwoo Lee, Dongho Won
wireless authentication protocol keeping low computation in mobile environment
Gibum An, Jin Kwak, Dongho Won
Jongsu Han, Eunsung Cho, Dongho Won
A New Receiver for Chaotic Digital Transmissions: The Symbolic Matching Approach
Gilles Burel and Stephane Azou
WAP Access to SCADA-typed database system
Synchronized oscillator system with phase feedback
Design of powerful digital servo-controller
Peer-to-Peer Networking with Firewalls
Wai-leung Cheung, Yong Yu, Yu-fai Fung
A Study on the reduction of bit rate using duration control of speech in CELP vocoder
KyungA Jang, Soyeon Min, Myungjin Bae
Vladislav Skorpil, Jiri Stastny
Lu Yan, Kaisa Sere and Xinrong Zhou
Speaker Recognition System Using the Prosodic Information
Locus of Relative Velocities Approach to Robot Collision Avoidance
Tsvi M. Kopelowitz, Ezra J. Auerbach, and Mordechai N. Reif
High-Level Synthesis of Priority Resolution Networks Walter Dosch
Walter Dosch
An alternate approach in finding optimum load impedance for maximum power transfer using vector representation
K.Bhoopathy Bagan, K.Mozhiarasi ,N.P.Subramaniam, M.Manikandan and G.Selvakumar
computer sumulations on industrial mrmi for inspecting several nuclei
On an Interactive Fault-Sensitive Stack - From Communication Histories to State Transition Tables
Hybrid PSO-DS for non-convex economic dispatch problems
T. Aruldoss albert Victoire, A. Ebenezer Jeyakumar
a case study for atm over adsl network evaluation Stanislav Milanovic
Dong Hwa Kim
Dong Hwa Kim
Emerging Technologies Making a Business Case for Networking Convergence
O. Satty Joshua and Constantine Coutras
AEROSPACE MAINTENANCE SUPPLY CHAIN OPTIMIZATION VIA SIMULATION
Ki-young Jeong, Jae-hyuk Oh
Age-based Multilevel Regression Modelling of Melanoma
Antony Brown Carsten Maple Malcolm Keech
Considerations and Calculations for Coverage and Capacity for 3G Mobile Network Planning
Carsten Maple Liang Guo
NONLINEAR POWER PLANT CONTROL USING IMMUNE ALGORITHM BASED MULTIOBJECTIVE OPTIMIZATION
POWER PLANT BOILER LEVEL CONTROL USING IMMUNE ALGORITHM BASED FUZZY RULE AUTO-TUNING
Mark Trakhtenbrot
Mpeg-based Interactive Video Streaming:A Review
A neural system for digital data processing
V. Zorkadis
Model-Based Validation of Complex Reactive Systems: A Case Study
Kostas Psannis, Marios Hadjinicolaou
On the Scheme of Infrared Reection Measurements and Regularization Data Processing Algorithm
Alexandre Grebennikov, Jose Italo Cortez, Mario Mauricio Bustillo Diaz
Wanwu Guo, Anthony Watson
On the Concept of ‘Learning Object Design by Contract’
Miguel-Angel Sicilia, Salvador Sánchez
Efficient Security Mechanisms for Multicast and Group Communication
V. Zorkadis
sampling a web subgraph Paraskevas Lekeas
Shymaa M. Arafat
Faical Mnif
Performance Analysis of Security Mechanisms for Computer Networks
dynamic ART : advanced web documents clustering algorithm
Kwangcheol Shin, Sangyong Han
An Efficient Simple Algorithm for Building Optimal Alphabetic Trees in Parallel
recursive backstepping stabilization of a wheeled mobile robot
Sherif Michael
Evolutionary switching devices for all-optical networks Francesco Palmieri
PHIMA-U Model and Digital Library Evaluation Pedro Isaias
Saturation Analysis of IEEE 802.11e Burst Acknowledgment Mechanism over Infrared Wireless LANs
Evagelos Varthis, Giannis Karamitsos
A VLSI Design of a Low Sensitivity Programmable Sampled Data Filter
Neighborhood Model: An Efficient approach for Secure Mobile Multicast Communications
Elijah Blessing.R, Rhymend Uthariaraj.V
Privacy-Enhancing Digital Rights Management Systems
V. Zorkadis, D. A. Karras
Qiangguo Pu
Madiha Jabee
salah al-sharhan
A Geometry of Coding Theory Partha Dey
A Low Noise, 2.0GHz CMOS VCO Design
The System Parameter Fusion Principle and its Application
Robot Arm Modelling and Simulation in a 3d Factory environment
The following papers belong to: WSEAS SEPAD-AIKED-ISPRA-EHAC 2003, Rethymno, Greece, August 11-13, 2003A soft computing algorithm for designing fixed-topologies in wireless networksA complete attribute reduction algorithm in rough set theory
Bing Wang, Shang-ben Chen
A framework of integration and optimized software testing process
Ljubomir Lazic, Dusan Velasevic, Nikos Mastorakis
A Hybrid Dynamic Self-Organizing Map For Clustering Of Document Collections
Abdel-Badeeh M. Salem, Mostafa M. Syiam, and Ayad F. Ayad
A Hybrid Fuzzy Logic and PID Controller for Control of Nonlinear HVAC Systems
Farzan Rashidi, Mehran Rashidi
A light-weight Internet protocol for Internet telephony purpose on small devices
King-Man Ho, Kwok-Tung LoKuo-Hsing Cheng, Shu-Chang Kuo, Chia-Ming Tu
A New Crossover Technique to Improve Convergence in Genetic Algorithm Search
Goutam Chakraborty and Basabi Chakraborty
A new Hardware Algorithm for Fast IP Routing Targeting Programmable Routers
Mahmoud Meribout and Lazhar Khriji
A New High Level Model Based on Integer Equations to Check CTL Properties in VHDL Environment
Bijan Alizadeh, Mohammad R. Kakoee, Zainalabedin Navabi
Wanwu Guo
A Prototype Web-Enhanced Teaching Environment
A Sensor with Embedded Ethernet
A solid state power amplifier at X-band
A new method to determine a similarity threshold in clustering problems
G. Sanchez-diaz,J. fco. Martinez-trinidad,J. Waissman-vilanova
A novel approach for mass detection in digitized mammograms
Noha Youssry, Fatma E. Z. Abou-Chadi
A Planning Algorithm for Predictive State Representation
Masoumeh T. Izadi and Abeer G. Ghuneim
A preventive process model of the incremental integration level of software testing
Z. Mihajlovic, D. Velasevic, N. Mastorakis
A Principle-tactics Based Approach for Guiding Student Project Management
Vasso Stylianou, Andreas Savva
A QoS provisioning framework for multimedia cellular networks
Zheng Lin,Yang Zongkai,He Jianhua
a qos provisioning framework for multimedia cellular networks
Cheng Wenqing, Zheng Lin,Yang Zongkai,He Jianhua
Petr Cach, Petr Fiedler, Miroslav Sveda, Milos Prokop, Marek Wagner
Ozlem Sen, Celal Dudak, Baris Nakiboglu
A solid state power amplifier at X-band for satellite communication
Dr. Ozlem Sen, Celal Dudak, Baris Nakiboglu
A Statistical Correction-Rejection Strategy for OCR Outputs in Persian Personal Information Forms
Ramin Mehran, Amin Shali, Farbod Razzazi
A support-vector rule based method for the construction of motion controllers via natural language training
Guanghong Wang, Ping Jiang
shamsuddin ahmed
An Algorithmic Foundation for Viewcharts Ayaz Isazadeh
E. Conte A. De Maio
Antenna Array on PBG Layers of GaAs
A ZVS PWM three-phase inverter with active clamping technique using only a single auxiliary switch
Denizar Cruz Martins, Marcelo Mezaroba, and Ivo Barbi
A zvs-pwm inverter with voltage clamping technique Using only a single auxiliary switch
Denizar Cruz Martins, Marcelo Mezaroba, and Ivo Barbi
Accident and Emergency Section Simulation in Hospital
Action Equivalences Among Heterogeneous Agents: A Step Towards Cooperative learning
S. M. Reza Mirfattah, Majid Nili Ahmadabadi, Babak N. Araabi
Adaptive Sliding Mode Speed Control with Fuzzy Approach for Induction Motor
Farzan Rashidi, Caro Lucas, Mehran Rashidi
Admission Control and Channel Mapping Strategies for GEO Satellite Multicast/Broadcast Systems
Evangelos Angelou, Nektarios Koutsokeras, Athanasios Kanatas,Ilias Andrikopoulos, Philip Constantinou
An analytical model and a fast mechanism for fault restoration with QoS constraints in MPLS networks based on n:m protection
tan xiansi, chen jingwen, ma yajie, ou liang, yang zongkai
An Application of Ordered Fuzzy ARTMAP Neural Network in Online Short Term Load Forecasting
Shahram Javadi, Hossein Shourestani, Shahriar Javadi
An Approach to Solving Traveling Salesman Problem Using a Fine-Grain Parallel Genetic Algorithm
Fattaneh Taghiyareh, Hiroshi Nagahashi
An Efficient Front-End system for Isolated Persian/Arabic Character Recognition of Handwritten Data-Entry Forms
Mohammad soleymani - Farbod Razzazi
An Invariant Framework For Adaptive Detection in Partially Homogeneous EnvironmentAnalysis and improvement on robustness of AQM in DiffServ networks
Wei Liu, Jianhua He, Zongkai Yang
Analytical model for ieee 802.11 dcf supporting service differentiation
He Jianhua,Zheng Lin,Yang Zongkai,Chun Tung ChouHumberto Fernandes, Alysson Moura and Antonio Teixeira
Asymmetric digital watermarking using nonlinear adaptive sytems trained on frequency domain
Ruo Ando,Yoshiyasu Takefuji
Automatic Running Planning for OmniφDirectional Mobile Robot By Genetic Programming
Peng Chen, Takashi Isoda, Shinichiro Mitutake and Shinji Koyama
CHARACTERIZATION OF HEXAGONAL FERRITE BASED RADAR ABSORBER AT Ku BAND
M R Meshram, Bharoti Sinha &Nawal k.Agrawal,P.S.Misra
Clustering for Network Planning
Data-Driven Web Sites
CHARACTERIZATION OF M TYPE HEXAGONAL FERRITE AND SIC BASED MICROWAVE ABSORBING PAINTS USING FREQUENCY SELECTIVE SURFACE
m.r. meshram,nawal k .agrawal, bharoti sinha,p.s.misra
Lamiaa Fattouh, Omar Karam, Mohammed El Sharkawy, Walaa Khaled
Clustering of Scientific Information for Optoelectronics Material GaN
Vassiliki Gountsidou, Hariton M Polatoglou
Comparative Study on Feature Extraction for On-Line Handwritten Character Recognition
Basabi Chakraborty and Goutam Chakraborty
Comparison of advanced modulation schemes for leo satellite uplink communications
Onder Belce, Dr. Stephen Hodgart
Comparison of Hybrid Neural Systems of Kohonen SOM with Back-propagation Learning in Artificial Odor Recognition System
Benyamin Kusumoputro,Aniati Murni
Complex Wavelet Packets-based DWMT for Digital Subscriber Line
Ahmed muthana M. Nadhim, Abdul-Karim a-r. Kadhim, and Zongkai Yang
Computational Geometry Algorithms for Animation of a Segmented Space Reflector Telescope
Yulu CHEN, Charles w. LIU, Jane DONG, Helen BOUSSALIS, Khosrow RAD, Charalambos POULLIS
Damping Enhancement in the Presence of Load Parameters Uncertainty Using Reinforcement Learning
Farzan Rashidi, Mehran Rashidi
Data Acquisition System Exploiting Bluetooth Technology
Ondrej Sajdl, Zdenek Bradac, Radimir Vrba, Miroslav SvedaYuri Boreisha, Oksana Myronovych
Design Of a Logic Arithmetical Unit and Its Application of Control of Motors
Mario Maurico Bustillo Diaz, Carlos Celaya,Boergs, Jose Italo Cortes, Leonel Quiroz Maldonado
Bharoti Sinha
Electromagnetic spectrum and human color vision
Jiri Haze, Radimir Vrba
Finding minimal set of attributes in medical data
Design of low-power content addressable memory cell
Kuo-Hsing Cheng, Chia-Hung Wei, Jiann-Chyi Rau
Design of small slot array including the effect of coupling and wall thicknessDetermination of 3-D Image Viewpoint Using Modified Nearest Feature Line Method in Its Eigenspace Domain
Lina,Benyamin Kusumoputro
Development of 3D Face Databases by Using Merging and Splitting Eigenspace Models
Benyamin Kusumoputro,Yudhi Satria
Development of hydrogenated carbon layers for passivation of power semiconductor devices
Frantisek Cerny, Jan Gurovic, Jan Vobecky, Dmytro Palamarchuk, Pavel Matejka, Anna Mackova, Miroslava Trchova
Effect of Finite Grounded Dielectric Slab on the Radiation of Microstrip Antenna
Golge Ogucu, Lale Alatan, Ozlem Aydin Civi, Tuncay Ege
Effect of Hidden Terminals on the Throughput of Multihop Ad Hoc Networks
Yixin Dong, Dimitrios Makraksi
Jesus Irigoyen, Eloina Coll, Jose-Carlos Martinez , Jose Herraez
Embedded System Specifications Reuse by a Case Based Reasoning Approach
Miroslav Sveda, Radimir Vrba
Episode and Q-cell Sharing Among Heterogeneous Q-learning Agents: A Cooperative Learning Strategy
S. M. Reza Mirfattah, Majid Nili Ahmadabadi, Babak N. Araabi
Errors and Their Cancellation in ADC Using Switched Capacitors Technique
Euler-Based 3D spatial Position and Direction measurements algorithm using a magnetic sensor
TOMOYUKI NAGASE, MASAYA KOMATA, and TAKASHI ARAKIAhmet Babanli, Ali Gⁿnes
Firing Angle Control of TCSC Using Emotional Learning
Firing Angle Control of TCSC Using Emotional Learning
Faical Mnif
Paraskevas Dalianis
Global handover latency minimisation in HMIPv6
Farid Touati
Image noise removal using graph theory
Fractal Analysis of Microscopic Images of Breast Tissue
Lucia Ballerini and Lennart Franzen
Free Projection SOM: A New Method For SOM-Based Cluster Visualization
Abdel-Badeeh M. Salem, Emad Monier, Khaled Nagaty
Full-bridge dc-dc converter using zvs-pwm commutation cell
Denizar Cruz Martins and Fernando C. Castaldo
Fuzzy c-means and Its Generalization by Lp Norm Space
A. ISAZADEH M. GORBANI
Fuzzy neural network implementation of Q(lambda) for mobile robots
Amir massoud Farahmand, Caro Lucas
GA optimization of a oliding mode montroller for an underactuated systemGenerating knowledge through workflow management systems
Generating Smooth Curves from a Control Polygon Using a Recursive Approach of Bώzier Splines
Andreas Savva, Vasso StylianouSaurabh Bansal, Aboubaker Lasebae, Richard Comley
High-Performance Optical Receiver Using Conventional Sub-Micron CMOS Technology for Optical Communication Applications
S. Georgakopoulos, I. Andreadis
Impact of angle and delay spread on the fading envelope through use of critical scattering zone for microcell environments
Claudio Lopez-Miranda, David Covarrubias-Rosales
Implementing PNNI signaling in the optical control plane
Improved Estimation of Evoked Potentials Using an Iterative Independent Component Analysis Procedure
George Zouridakis and Darshan Iyer
Improved local-projection algorithm applied to noise reduction for chaotic signal
Yang Zongkai, Zheng Lin, Hu Jing
Improving Real-Time Capability of TCP for Multimedia Streaming using Time-Controlled Window Algorithm
King-Man HO, Kwok-Tung LO
Information society services provided by access networks
Jouni Ikonen and Jari Porras
Leopoulos Vrassidas
Intelligent Spatial Filters Based On Fuzzy Logic
Bharoti Sinha
Knowledge-based measurement fusion in bioreactors
Miroslav Sveda
Many Faces of Hamming Code Partha Dey
Meta-Model Simulation for Custom Clearence shamsuddin ahmed
MPI Communication in Clusters of SMP Workstations
Integrated modeling and simulation of customer order process, production order process and discrete production system, for production planning evaluation using Petri Nets
F.Kaleem, K.Yen, A.Caballero
Interaction of electromagnetic energy emitted by mobile communication handset with human headInterconnection of pv modules to the utility grid using an electronic inverter circuit
Denizar Cruz Martins & Rogers Demonti
Introducing a New Approach for Defining Personality of Artificial Agents
Roozbeh Daneshvar , Caro Lucas
Isolated three-phase rectifier using a sepic dc-dc converter in continuous conduction mode for power factor correction
Denizar Cruz Martins and Anderson H. de Oliveira
Julio Waissman-Vilanova, Josep Aguilar-Martin, Gilles Roux, Boutaieb Dahhou
Load Forecasting in Power Systems Using Emotional Learning
Farzan Rashidi, Mehran Rashidi, Caro Lucas
Local Time for Formal Specifications of Networked Embedded SystemsLocation-driven watermark extraction using supervised learning on frequency domain
Ruo Ando,Yoshiyasu Takefuji
Maximising the Alternative Resources for Solving the Rescheduling Problems in Software Project Development
Ho-Leung Tsoi and Terry Rout
Methods of Current Mode Analog-to-Digital Converter Design
Michal Skocdopole, Radimir Vrba
Modeling of substrate noise coupling in CMOS mixed signal circuits
Maria Rizzi, Beniamino Castagnolo
Modeling Two-Windows TCP Behavior in Internet Differentiated Services Networks
Jianhua He, Zongkai Yang, Zhen Fan
Modular Structure for Software Implementation of H.323 Multimedia Conferencing Terminal
King-Man HO, Kwok-Tung LO
Monolithic down-converters for 5-GHz WLAN applications
Alessandro Italia, Egidio Ragonese, Giovanni Girlando, Giuseppe PalmisanoPentti Huttunen, Jouni Ikonen, Jari Porras
Multi critics based intelligent control
Multi Objective Emotional Learning Approach
shamsuddin ahmed
P- Manager: A System to Support Managers
Performance evaluation of X-ray detectors
Program Code Analysis Focused on its Structure
mehrdad fatourechi, caro lucas, ali khaki sedigh
Multi fuzzy variable structure control for a biped locomotion robot
Ali Abbaspour, Caro Lucas, Babak Nadjar Araabi
Network Selection Strategies for All-IP Heterogeneous Networks
Li-Der Chou Meng-Hsin Ou
Novel Method to Estimate Peak Electric Load Demand ANN and Principal Components
On Cellular CDMA/SDMA System Capacity: Radio Channel Spatial Model effect on Adaptive Antennas
Angel G. Andrade, David Covarrubias and Alejandro Pardo
Optimal Prefetching Cache Size for a Unibus DSP-Based Multiprocessor Shared Memory System
Charalambos S. Christou
Optimized Efficiency for Multicast Service: A New Approach
Ayaz Isazeaeh, Mohsen Haydrian
Optimum Supply and Threshold Voltages and Transistor Sizing Effects on Low Power Circuit Design
Farzan Farbiz - Mohammad Emadi
Carlos J. Costa, J. Paulo Costa, Manuela Aparicio
Performance Analysis of DS Spread Spectrum System in Multiple Narrowband Interference
Demosthenes Vouyioukas, Philip Constantinou
Performance evaluation of different wireless network topologies using the IEEE 802.11 MAC Protocol
Chris Basios, Panagiotis Kostarakis, Evangelos PallisMaria Rizzi, Beniamino Castagnolo
Portuguese Parliament as a Case Study of FLoWPASS - Framework to Laws Workflow Process Automation SystemS
NASCIMENTO, Rogerio P.C. do; MARTINS, Joaquim A.C.; PINTO, Joaquim M.S.
Predicting Geomagnetic Activity Index by Brain Emotional Learning Algorithm
Ali Gholipour, Caro Lucas, Danial ShahmirzadiSatou Tadamasa, Yorinori Kishimoto
Semantic matching for digital library query service
The CBS Transponder Tesing by the EGSE
The effect of word sampling on document clustering
Scalable Probe Based Admission Control Schemes For Multicast QoS
Chunhui Le, Jianhua He, Zongkai Yang
SD-IMAS: a New Slip Detection system design for a Vehicle using an Induction Magnetometer and an Accelerometer
TOMOYUKI NAGASE, DAISUKE HASEGAWA and TAKASHI ARAKIJi-hyeon Kim, Ji-hoon Kang
Simulation of specific absorption rate of electromagnetic energy radiated by mobile handset in a human head using FDTD method
Bharoti Sinha,Ramesh Singh
SIR Improvement of Different Antenna Arrays Structures in CDMA Cellular Systems
Marco A. Panduro, David H. Covarrubias and Luis F. Solis
Speed Control of Switch Reluctance Motor Using Genetic Algorithm
Farzan Rashidi, Mehran Rashidi, Caro Lucas
Spice simulations for a designed network that models the wp learning algorithm
Behjat Foruzandeh - Farzan Farbiz
Study of potential role assignment in multi-agent systemSupplier Selection Using Fuzzy Logic - this is my second submission of this paper ---
Chiraz Gasmi & Sema E. AlptekinJin-Ho Jo, Dong-Han Shin, Jong-Heung Park, Seong-Pal LeeOmar H. Karam, Ahmed M. Hamad, Sherin M. Moussa
The Efficient Generation Method of Critical Fault Clearing Time Functions for Power System Transient Stability Assessment
Tetsushi Miki, Ryuzaburo Sugino, Yoshiyuki Kono
Three-dimensional model algorithm of neared objects algorithm using videogrammetry
Eloina Coll, Jose-Carlos Martinez, Jesus Irigoyen, Jose Herraez
Time based Resource Reservation for Multicast Routing
Bhed Bahadur Bista and Goutam Chakraborty
Trajectory tracking of robot using a fuzzy decentralized sliding-mode control
Chih-Lyang Hwang and Hung-Yueh Lin
TRANSMISSION LINE MODELING (TLM) FOR EVALUATION OF ABSORPTION IN FERRITE BASED MULTI LAYER RADAR ABSORBER
M.R.Meshram, Nawal K.Agrawal,Bharoti Sinha,P.S.Misra
videogrammetry system orientation for small objectsVisual Simulation of Ants Behaviour
WAN-WLAN roaming for voice application
wireless ieee 1394 home networking profile
Zamin Environment: Review and Comparison
A Benchmark Generator for Dynamic Optimization
Tuning of Power System Stabilizers via Genetic Algorithm for Stabilization of Power Systems
Farzan Rashidi, Mehran Rashidi
using bayesian networks to facilitate intelligent agents to make decision coordinately
Victor B. Kreng and Chia-hua ChangJose-Carlos Martinez, Jesus Irigoyen, Eloina Coll, Jose Herraez
qinghai dai, liu xin, qiufeng wuQiaozhong Ke, Dimitrios Makrakis
Saman Harati Zadeh, Abolfazl Keighobadi Lamjiri, Caro Lucas
The following papers belong to: WSEAS Applied Mathematics 2003 and WSEAS IMCASS-ISA-SOSM 2003, Malta, Sept.1-3, 2003
802.11 Wireless LAN performance estimation under varying network load
Chris Basios,Panagiotis Kostarakis
Abdunnaser Younes and Otman Basir and Paul Calamai
Hsin-Chu Chen
Tudor Barbu
Motofumi T. Suzuki
A Block Decomposition Method for Block Quindiagonal Matrices
A Computer Vision System for Graphical Pattern Recognition and Semantic Object Detection
A dynamic programming approach to search similar portions of 3d models
A Dynamic Sliding Mode Control Scheme for a Synchronous Reluctance Motor
Mohamed Zrib, Muthana Alrifai and Jamal Al-Sumait
A Fuzzy Approach to Uncertainty Principle in Quantum Theory
Shahriyar Kaboli, Nasser Sadati
Chiang Kao
A Fuzzy Image Matching Algorithm with Linguistic Spatial Queries
Tzung-pei Hong, Szu-po Wang, Tien-chin Wang, Been-chian Chien
A Generalized Linear Programming Approach to Efficiency Improvement
A Generator Excitation controller Based on Fuzzy Set Theory
Rasool Mohammadi Milasi, Caro lucas
A Hybrid Evolution Strategy for vehicle suspension optimization
Dimitris Koulocheris, Harry Vrazopoulos, Vasilis Dertimanis
A hybrid multivariate-analysis statistical method for manufacturing process optimisation
Michele DASSISTI (*), Roberto RUTIGLIANO
A Learning Environment to Teach Computer Architecture
Sebastiano Pizzutilo and Filippo Tangorra
A Linear Programming Approach for Calculation of All Stabilizing Parameters of Lead-Lag Compensator for Continuous-Time Plants
Mahdi Jalili-Kharaajoo and Babak N Araabi
A Neural Network-Based Data Managing and Manipulating System
Wanwu Guo, Anthony Watson
A new class of convolutional codes for coded TPSK schemes
Makoto Nakamura , Hideyuki Torii
A new competitive learning neural network for document clustering
Worapoj Kreesuradej, Somkid Saensanor,Songpol Chutipongpattnkul,Warune Kruaklai
A new multi-output neural model with tunable activation function
A New Non Radio Active Flow Metering Method for Use in Multi-Phase Flow
MAHMOUD MERIBOUT1, MOHAMED HABLI1, AHMED AL-NAAMANY1, and KHAMIS AL-BUSAIDI2
A New Ultrasonic-based device for Accurate Measurement of Oil, Emulsion, and Water Levels in Oil Tanks
MAHMOUD MERIBOUT1, MOHAMED HABLI1, AHMED AL-NAAMANY1, and KHAMIS AL-BUSAIDI
A non-classical view of coverings and its implications in the formalization of pattern recognition problems
Salvador Godoy-Calder≤n Manuel Lazo-Cortώs Josώ Fco. MartΊnez-Trinidad
A novel approach for three phase fault loaction and classification using discrete wavelet transform
N.P.Subramaniam, K.Bhoopathy Bagan and M.Manikandan
A novel architecture of optimized truncation for jpeg2000
Ning Chen, Shigen Xie, Xiang Xie, Leibo Liu, Li Zhang, Zhihua Wang
A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation
CHUAN-SHENG WANG and YIMING LI
A Novel Optimization Algorithm for Deep-submicron MOSFET EKV Model Parameters Extraction
YEN-YU CHO and YIMING LI
A novel single-element- controlled cfoa-based square wave oscillator
A parallel environment using taboo search and genetic algorithms for solving partitioning problems in codesign
Abderrazak Henni, Mouloud Koudil, Karima Benatchba, Hassane Oumsalem, Kamel Chaouche
A Protocol for Adaptive Autoconfiguration of Active Networks
Arso Savanovic, Borka Jerman Blazic
A ProtoG Algorithm Applied to the Traveling Salesman Problem
Marco Goldbarg, Elizabeth Goldbarg, Iloneide Ramos
A Quantitative Model for Capacity Estimation of Products
Rajeshwari G.,Renuka S.R.
A robust optimal control for robot manipulators Faical Mnif
Arafat Awajan
A Scheme for Form Identification System
A robust disturbance observer for multivariable systems
Xinkai Chen, Guisheng Zhai
A Rule-Based Morphological Analyzer of Arabic Words
Wichian Premchaiswadi, Nucharee Premchaiswadi,Suparat Aphiwongsophon, Seinosuke Narita
A solving prototype dedicated to a transport problem case study
Meriam Kefi,Khaled Ghώdira
Avram Sidi
Gilles Burel
A time re-scaling function proposal for the Adaptive Verlet Method of the 8-choreography and a comparison with other finite differences solutions.
Jorge Sánchez-Sánchez
A Transgenetic Algorithm for the Permutation Flow-shop Sequencing Problem
Elizabeth Goldbarg,Marco Goldbarg,Wagner Costa
A Visual Tool for Specifying MPI Collective Communication Operations
Robert R. Roxas and Nikolay N. Mirenkov
A zero-cost preconditioning for a class of indefinite linear systems
About the Reliability of Simulations of MIMO Transmission Systems
P²nar Dundar
Zhenyu Yang
Shengxiang Yang
Toshiaki Itoh
Dorina-Mioara Purcaru
Accessibility Number And Vulnerability Measures of Recursive Complete Graphs
Active noise control for a one-dimensional acoustic duct using feedback control techniques: modelling and simulation
Adaptive group mutation for tackling deception in genetic search
Algebraic Geometrical Treatment of Numerical Algorithms
Algorithm for studying the linear optical incremental encoder
Alternative Approach for Designing Optical WavelengthSeparators using Single Layer Coating on an AbsorbingSubstrate
M.A. Habli and H. Bourdoucen
An e-commerce secured system Florin Hartescu
Burak Ordin
An algorithm for detection of calibration points for photogrammetric camera calibrations independent of illumination variations
Otniel Portillo, Luciano Chirinos, Carlos Vazquez
An Approach To The Dominating Subset With The Minimal Weigt Problem
An Architecture of a Multi-Agent System for Power System Operation
Alexandre Rasi Aoki, Ahmed Ali Abdalla Esmin, and Germano Lambert Torres
An Architecture of a Multi-Agent System for Power System Operation
Alexandre Rasi Aoki, Ahmed Ali Abdalla Esmin, and Germano Lambert Torres
An assistance environment for the classification of knowledge on risk project
Rachid Chalal, Razika Ouamane
An autonoumous chaotic CNN hysteresis circuit
Noriyuki Fujimoto
P Pepe
Cherif Aissi and Demetrios Kazakos
An LP-rounding-based Algorithm for the Shortest Common Superstring Problem
An Observer for Switching Nonlinear Systems with Mode Dependent Time Delays
An Optimal Design for an Ordered-entry Array Flexible Assembly System
Alireza Feyzbakhsh, Masayuki Matsui
Analysis of the Updating Mechanism of a Model-Reality Differences Algorithm: the Newton-Like Properties
Rohanin Ahmad, Mohd Ismail Abd Aziz
Evangelos Dermatas
Approximate Subdifferentials of Value Functions K. Allali
Guoyin Wang
Application of recurrent neural network in dynamic modeling of sensors
Meng Shi,Sheping Tian,Pingping Jiang,Guozheng Yan
Application of Satisfiability algorithms to time-table problems
Fahima NADER, Mouloud KOUDIL, Karima BENATCHBA, Lotfi ADMANE, Said GHAROUT, Nacer HAMANI
Approximate estimation of the Cramer-Rao Lower Bound for Sinusoidal Parameters
Attribute core of decision table in the algebra view and information view
Borland Pascal Tools for Bootstrapping
Business Process Modelling using Simul8
Cam Optimal Design with Evolutionary Algorithms Alberto Borboni
Automatic Lumbar Vertebrae Segmentation In Fluoroscopic Images Via A New Parallel Hough Transform
Mahmoud Meribout and LAzhar Kheriji
Broken Characters Identification for Thai Character Recognition Systems
Nucharee Premchaiswadi, Wichian Premchaiswadi, Ubolrat Pachiyanukul, Seinosuke Narita
Vesna Bosilj- Vuksic and Vlatka Hlupic
Channel coding with very low decoding complexity
Clustering on antimatroids and convex geometries
Clustering text data using text art neural network
Dante Mantini, Federico Volponi, Giovanni Cancellieri
Yulia Kempner, Ilya Muchnik
Worapoj Kreesuradej, Warune Kruakli and Norraseth Chantasut
Color picture enhancement using rational unsharp masking-based approach
Lazhar Khriji, Mahmoud Meribout, Moncef Gabbouj, Samir Akkari.
Combining Gauss and Genetic Algorithms for Multi-Objective Transmission Expansion Planning
Francisco Reis, Pedro Carvalho, Luis Ferreira
Combining Gauss and Genetic Algorithms for Multi-Objective Transmission Expansion Planning
Francisco Reis, Pedro Carvalho, Luis Ferreira
Complex Derivative: A Basis Free Definition Partha Dey
Computer education in a deleveloping nation Ade Beecroft
Complete Complementary Codes Composed of Perfect Sequences and their Application to Mobile Communications
Naoki Suehiro, Toshiaki Imoto
Contribuition to Model Eucalyptus's Growth Curves in Portugal
Anabela Gouveia da Silva
Convolutional Coded Coherent and Differential Unitary Space-Time Modulated OFDM with Bit Interleaving for Multiple Antennas system
Chang-Jun Ahn and Iwao Sasase
CRAMS - Curriculum Repository and Metatagging System
Joseph Sant, Gary Closson, Peggy Hilliard, Xiaolan Shi
Cross-correlation Neural Network: A New Neural Network Classifier
Arit Thammano, Narodom Klomiam
Decisional portal using approximate query processing
Prof. Dr. Olga Martin
Prof. Dr. Olga Martin
Database Imperatives in Managing Supply Chain: An Empirical Study
Noor raihan Ab hamid; Ali Khatibi
Carlo dell'Aquila, Ezio Lefons, Filippo Tangorra
Determination of All Stabilizing Constant Feedback Gains for Open-loop Unstable Second-order Systems with Time Delay
Mahdi Jalili-Kharaajoo and Babak N Araabi
Determination of reactions in yielding supports by a numerical method
Determination of reactions in yielding supports by a numerical method
Education by Correspondence in Russia.
Chi-Man Pun
Determing Differences between Two Sets of Polygons
Matej Gomboγi Borut Οalik
Development of Web-based Multimedia News Management System for News On Demand Kiosk Network
S.N.Cheong, AzharK.M. , M. Hanmandlu
Dielectric characteristics of marble rocks after the application of various stress modes before fracture.
Dimos Triantis, Cimon Anastasiadis, Ilias Stavrakas, Filippos Vallianatos
Efficient Algorithms for Invariant Discrete Wavelet Decomposition
Efficient Implementation of G.729 Annex A Speech Codec On a Fixed-Point DSP
Mojtaba Valinataj,Behjat Foruzandeh
Abolghasem Bozorgnia
Forward-Backward Saulyev method to solve pdes
Further Evolution of Fieldbuses
Fuzzy neurules: Edging over Neurules
engineering-based computer simulation for modeling greenhouse whitefly population
Bahram Tafaghodinia - Alaeddin Malek
Extension of some probability inequalities and application
Factorial experiment with fuzzy and statistical techniques
Onur Baskan, Sansli Senol, Sinem Peker
FLoWPASS-based Applications Suggested to Portuguese Parliament and Supported by XML Web Services
NASCIMENTO, Rogerio P.C. do; MARTINS, Joaquim A.C.; PINTO, Joaquim M.S.
Mohammad Taghi Darvishi
Petr Fiedler, Zdenek Bradac, Frantisek Bradac, Milos Prokop, Marek Wagner
John Hatzilygeroudis, Constantinos Koutsojannis
M.C.Gouveia
Vladimir Pletser
Generating Periodic Functions
Hall's Theorem: A Group Algebra Approach Partha Dey
Farid Touati
Generalized Directional Distance-Rational Hybrid Filters
Lazhar Khriji, Mahmoud Meribout, Moncef Gabbouj, Samir Akkari
Generalized Inverses of Bezoutian and Resultant Matrices over Integral Domains
Generalized Mersenne prime numbers: characterization and distributions
Matilde Legua, Josώ A. Mora±o, Luis M. Sάnchez Ruiz
High-High-Performance CMOS and BiCMOS Transimpedance Preamplifiers for Optical Communications
Hybrid f.e.b. face recognition algorithm
Elena Niculescu
Hybrid simulation of qualitative bond graph model
Image information content estimation and elicitation Emanuel Diamant
S.K. Singh, D.S. Chauhan, Richa Singh, Mayank Vatsa
Hybrid modelling of the second-order converters with dcm
C.H. Lo, Y.K. Wong and A.B. Rad
Information Systems Security Policy - Human Factor Modelling and Simulation
Denis Trcek, Gorazd Kandus
Instrumentation and Measurement of a Room Air Conditioner Performances
T.M.I. Mahlia, M.N. Izham
Internet Technologies for Use in Virtual Laboratories
LeaSel: A Highly Secure Scalable Multicast Model
least-Delay widest-bandwidth routing algorithm
Petr Honzik, Sediva Sona, Bradac Zdenek, Prokop Milos, Wagner Marek
Interval computations with BK-products of fuzzy relations in disgnostic knowledge-based system Clinaid
Ladislav kohout isabel Stabile
knowledge compilation method: a unit resolution approach
Manoj K Raut and Arindama Singh
knowledge-based automatic fault detection for dynamic physical systems
C.H. Lo, Y.K. Wong and A.B. Rad
Elijah Blessing.R, Rhymend Uthariaraj.V
Jiaqing Huang, Zongkai Yang, Du Xu
Majorization Principle and its Application
ME: Mobile E-Personality
Modeling turbulence using a nonautonomous system
T.M.I. Mahlia
load balancing routing policies in wavelength-routed WDM networks
Ching-Lung Chang, Steven Lee, and Chih-Cheng Lin
Pekka Jϊppinen and Jari Porras
Cherif Aissi and Demetrios Kazakos
Modeling, simulation and experimental validation of a palm oil mill boiler
Motion Estimation and Video Compression with Spatio-temporal Motion-Tuned wavelets
Patrice Brault and Alain Merigot
New Application for the Edge Detection Algorithm
ObAn – an Application Supporting e-Learning
Necessary and sufficient conditions for generalized invariant subspaces
Naohisa Otsuka,Β and Rixat Abdursul
Vladislav Skorpil, Jiri Stastny
Nonlinear Model Predictive Control of an Esterification Semi Batch Reactor Using Second-order Volterra Models
Ben nasr nejib, MΤsahli faouzi, Ben abdennour ridha
Nonlinear Observers for Perspective Time-Varying Linear Systems
Rixat Abdursul and Hiroshi Inaba
Novel Developments in the Attitude Control of an Underactuated satellite using two wheels
nadjim mehdi Horri , stephen Hodgart
Alina Stasiecka, Jacek Plodzien, Ewa Stemposz
On Cx Number Partha Dey
Partha Dey
Nizami Gasilov
On the classification of term ordering types Giovanna Roda
On a Reliability Polynomial of Fibonacci and Some Other Graphs
Mark Korenblit and Vadim E. Levit
On Relation between Gender and Aptitude in Mathematics: A Case Study
On solutions of the plasma vertical stability problem in a tokamak
On the Use of Fuzzy Regression in Parametric Software Estimation Models: Integrating Imprecision in COCOMO Cost Drivers
Javier Crespo, Miguel-Angel Sicilia, Juan-Jose Cuadrado
Anna Ochal
Order Statistics Applied to Risk Management Radu Tunaru
Parallel functions in recursive program schemes Mark Trakhtenbrot
On the use of fuzzy techniques for partial scan insertion based on the testability metrics
Caro Lucas,Naghmeh Karimi
Optimal Control in Superpotential for Evolution Hemivariational Inequality
Organization of an intellectual searching to support vehicles control.
Bocharov Lev Aleksandrovich, Sokolov Nikolay Leonidovich, Udaloy Valeriy Alekseevich
Parametric time domain identification of a flexible robotic arm using evolutionary algorithms
Dimitris Koulocheris, Vasilis Dertimanis, Harry Vrazopoulos
Performance analysis of PC based SIMD parallel mechanism
Y.F. Fung, M.F. Ercan, W.L. Cheung, T.K. Ho, C.Y. Chung, G. Singh
PID controller with fuzzy error predictive
Portfolio Analysis Using Single Index Model
Q-analysis of ecological networks from tropical forests
Quantum Searching and Encryption Systems
Query Expansion in a Distributed Search System V.V.Kluev
Josώ F. SolΊs V., Omar J. Santos Sάnchez, Ram≤n Soto C.
Anton Abdulbasah Kamil
Promoting Agent-Based Knowledge Discovery in Medical Intensive Care Units
Analia Lourenύo, Orlando Belo
Javier Burgos, Sonia Torres, Edilberto Sarmiento
Filomena de Santis, Michele Guida
Real time system using secure socket connections Florin Hartescu
Reflexive Time: The Magic Non-local Touch E.Macer-Story
Robot vision using circular dynamic stereoscopyKikuhito Kawasue, Osamu Shiku
Robotic Finger Actuated with Shape Memory Alloy Tendon
NICU-GEORGE BIZDOACA, ILIE DIACONU, MARIUS C. NICULESCU, ELVIRA BIZDOACA, SONIA DEGERATU, DANIELA PANA, CRISTINA PANA
Safe Protocol providing Authentication and Secret Sharingin Peer to Peer Computing
SOO-JIN KIM, GI-BUM AHN, HYUN-JUE KIM, DONG-HO WON
Tudor Barbu
SMILE: Printed Thai Character Recognition System
Scheduling and Ordering Production Policies in a Limited Capacity Manufacturing: The Multiple Replenishment Products Case
Soundouss Bouhia, Frederick H. Abernathy
Sequential Cancellation Scheme and its Performance of Multi-user Detection for W-CDMA
Hirofumi Nakano, Masashi Miyamoto, Atsushi Fukasawa, and Yumi Takizawa
Several Pattern Recognition Approaches for Region-based Image Analysis
Simple & Accurate Device for Water-Cut in Oil Measurement
M. Habli, M. Meribout, A. Al-Naamany, A. Maashari , K. Al Busaidi, A. Al Ismaily
Simulaton of a scheduling algorithm based on lfvc(leap forward virtual clock) algorithm
Nucharee Premchaiswadi, Wichian Premchaiswadi, Surakarn Duangphasuk, Seinosuke Narita
Petr Ponizil, Ivan Saxl
Soliton Gas in Space-Charge Dominated Quantum Systems
Salvatore De Martino, Mariarosaria Falanga and Stephan I. Tzenov
Spatial and planar tessellations: Classification, database and applications
Spatial Electric Load Distribution Forecasting using Simulated Annealing
Hector Gustavo Arango and Germano Lambert Torres
Spectrum characteristics of ternary psk signals amplified with non-linear amplifiers
Hideyuki Torii, Makoto Nakamura
Square Root of a Prime: A Monte-Carlo Approximation
Manzia Jamil, Partha Pratim Dey
Stability and L2 gain analysis for discrete-time LMI systems with controller failures
Guisheng Zhai, Xinkai Chen, Hai Lin
Singh, Abhishek
Strain gradient notation for finite element polynomials João Elias Abdalla Fo.
Study of stack permutations Suneeta Agarwal
Statistical Equation for Density in a State and its Applications
Statustical research technique of perturbed trajectories of vehicles motion in atmosphere
Udaloy Valeriy Alekseevich, Sokolov Nikolay Leonidovich
Study on agent intelligent learning algorithms, agent architecture and application
Shujun Zhang , Qingchun Meng
Studying of the capability of the cermet tools during turning of steels
Tareq Ahmad Abu Shreehah
Tabu-based Evolutionary Algorithm for Effective Program Module Assignments in Parallel Processing
Jerzy Balicki, Zygmunt Kitowski
TclGen: a graphical interface for NS-2
Iwona Nowakowska
The nonlinear "authority-society" model
Jorge Sά Silva, Vitor Fonseca, Fernando Boavida
The dual dynamic programming and production analysis with long time cost function
the effect of imperfect phase estimation on the performance of MMSE receiver CDMA systems
Ali f. Almutairi, Scott l. Miller, and Haniph Latchman
Michael Dmitriev, Alexander Petrov, Galina Zhukova
The Optimal Configuration of Cogeneration Systems Based on Natural Gas: a Parallel Evolutionary Approach
Marco Goldbarg, Elizabeth Goldbarg, Francisco Neto
The Uniform Generalized Decomposition Method for Generating Algebraic Expressions of Fibonacci Graphs
Mark Korenblit and Vadim E. Levit
Theory prime implicates of first order formulas
P. Pepe, M. Di Gregorio
Prof. Dr. Olga Martin
Manoj K Raut and Arindama Singh
Three-Dimensional Geometric Modeling by Initial Model Modification
Junta Doi, Yohei Miyamoto, Shingo Ando and Tetsuo Miyake
Three-dimensional measurement by free scanning of a CCD camera and laser
Kikuhito Kawasue, Go Uezono, Yoshinobu Gejima, Masateru Nagata
Two gains observer based control of a four cylinders engine fuel air ratio
Using Conditional Probabilities of Weighted Terms for a Lexicon Based Sense Disambiguation System
Kostas Fragos, Yannis Maistros, Christos Skourlas
Variational solution of the two-dimensional transport equation
Where, why, and when fuzzy regression analysis
XML Key Information System for Secure e-Trading
Ahmad Sharifinejad
Visual Steps towards Better Understanding of Cellular Automata Algorithms
Mahmoud A. Saber and Nikolay Mirenkov
Onur Baskan, Sansli Senol, Sinem Peker
Nam-Je Park, Ki-Young Moon, Sung-Won Sohn
The following papers belong to: WSEAS Applied Mathematics 2003 and WSEAS ICOSMO-ICOSSIP-ICOMIV-ICRODIC-ICONNEMC-MEM-MCP, Rethymno, Greece, Oct.13-15, 2003A fast entropy contrained vector quantizer for Subbands imagecompression versus variable rate tree structured vector quantizer
A Flow Management Scheme for Multimedia Traffic for High-Speed Network Based on Statistical Weibull Distribution
Bharoti Sinha
H Infinity Fuzzy Control of Structural Systems
Patrice Brault
Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
AboulElla H. and Jafar M. H. Ali.
design of a small slot array including the effect of mutual coupling and wall thickness
A Novel Methodology of Working Capital Management for Large Public Constructions by Using Fuzzy S-curve Regression
Cheng-Wu Chen, Morris H. ΨL. Wang, Ting-Ya Hsieh and
Cheng-Wu Chen, Ken Yeh
Motion estimation and video compression with spatio-temporal motion-tuned wavelets
development of ferrite based absorbing paints for reduction of EMI /EMC problems in microwave range
M R Meshram, Bharoti Sinha &Nawal k.Agrawal,P.S.Misra
Invariant Recognition Of Human Faces Gulzar Khuwaja
characterization of emc chambers at high frequencies and spline interpolation for missing experimental data
Zia Nadir, Hemen Goswami, Md. Abdus Salam
Rough Set Approach for Classification of Breast Cancer Mammogram Images
Aboul Ella Hassanien Jafar M. H. Ali.
wavelet based image compression using perceptual distortion metric and dithered quantization model
Hemen Goswami, Zia Nadir, Md. Abdus Salam, Samuel P. Kozaitis
Comments On Schemes And Algorithms For RTCP Scalability Problems
N.A. Elramly1, H.M Harb2, A.S Habib1, and O.S Essa1
Flow shop scheduling using hybrid combinatorial evolution strategy
Georgette Kanarachou, Vrasidas Leopoulos
Yuri Lobanov
Min-max optimization of investment processes using a hybrid evolution strategy
Georgette Kanarachos, Vrasidas Leopoulos
Numerical integration with respect to Wiener measure in studying the open quantum systems
Palmprint verification by bi-directional crease matching
Wenxin Li, Shengxiong Xia, David Zhang, Zhuoqun Xu
Multi-user Detection by Sequential Interference Cancellation for W-CDMA
Hirofumi Nakano, Atsushi Fukasawa, Yumi Takizawa
region-based image retrieval using expection-maximizatin algorithm and robust region descriptions
Yajuan Cheng and Laiyao Fan
Bharoti Sinha
MACS: Multi-agent charter system
studying of the capability of the cermet tools during turning of steels
Tareq Ahmad Abu Shreehah
Image compression using adaptive Chebyshev polynomials
Nader Ahmed Al-Mutawwa & Mohamed Jamal Zemerly
simulation of specific absorption rate of electromagnetic energy radiated by mobile handset in human head using FDTD method
Bharoti Sinha, Ramesh Singh
interaction of electromagnetic energy emitted by mobile communicationhandset with human head
development of (Co-Mn-Ti) substituted M type barium hexagonal ferrite based microwave absorber at X-band
MekhramMeshram, Bharoti Sinha, Nawal K. Agarwal, P.S.Mishra
Maja Λtula, Darko Stipaniϋev, Mirjana Bonkoviό
skeletonization algorithm for an arabic handwriting
Zeljko Panian
Microstrip Antenna Array Applied in High Frequency
Wen Qi
An Employment Agent with a Speech Module Tomaz Sef
A Second Law Thermoeconomic Optimization Of A Gas Turbine Power Plant And Flue Gas Emissions Evaluation
J.M. RODRIGUEZ LELIS ; SOSIMO E. DIAZ MENDEZ
Mohamed A. Ali, Kasmiran Bin Jumari
New E-Business Model Supported by Web Services Technology
Humberto Cώsar Chaves Fernandes, Josώ Elesbήo C. Neto, Davi Ara·jo Nascimento, Raykleison Igor R..Moraes And, Giuliano F. B. Oliveira
Firwire Camera Calibration for Video See-through Augmented Reality System
Givanna Morgavi
Mahdi Eslami
psychological interviews: characterization and modeling
A new evaluation index for comparison of treatise filtering system's performance
Masao Yamamoto, Hiroshi Yajima, Hiroshi Kinukawa
Adaptive Nonlinear Model Based Predictive Control:Application to an Esterification Semi Batch Reactor
Ben nasr nejib, MΤsahli faouzi, Ben abdennour ridha
An improvement in the FARSI syllable segmentation using contouring spectogram
A New Technique of Validities' Computation for Models' base
Talmoudi Samia, Abderrahim Kamel, Ben Abdennour Ridha, Ksouri Mekki
A Fuzzy Fusion Strategy for the Multimodel Approach Application
Ltaief Majda, Abderrahim Kamel, Ben Abdennour Ridha, Ksouri Mekki
Integration of IP and Trunked Radio Network
Zbynek Tychtl
OPNET modeler and ns-2: comparing the accuracy of network simulators for packet-level analysis using a network testbed
Gilberto Flores Lucio, Marcos Paredes-Farrera, Emmanuel Jammeh, Martin Fleury, Martin J. Reed
A methodology to model and simulate an environment for e-learning
Ines Brosso, Alessandro La Neve
Short-range Data Transmission Using Inductive Method
Milan Vajdik, Ivo Herman, Dan Komosny
Dan Komosn, Milan VajdΊk
Fuzzy Models For Gas Distribution Network Optimization
Radek Sindelar Petr Pavlik
the partly preserved natural phases in the concatenative speech synthesis based on the harmonic/noise approach
A remotely controlled measurement system for experiments in wind tunnel
Francesco Fusco, Michele Inverno, Alessandro Masi, Andrea Ruggiero
An acoustic feedback cancellerMatteo Romanin, Cosmo Trestino
Non-Invasive, Cardiac Risk Stratification Using Wavelet Coefficients
Matthew Wiggins, Lichu Zhao, George Vachtsevanos, and Brian Litt
Performance Evaluation of Rake Receiver for Wavelet Video with UEP Codes in W-CDMA System and Fading Channels
Minh Hung Le and Ranjith Liyana-Pathirana
Czech Audio-Visual Speech Synthesis with an HMM-trained Speech Database and Enhanced Coarticulation
Milos Zelezny, Zdenek Krnoul
a comparison of supervised pixel-based color image segmentation methods. application in cancerology
C. Meurie, G. Lebrun, O.Lezoray, A.Elmoataz
a region-based trimmed feature matching approach to content-based image retrieval
Yajuan Cheng,Laiyao Fan
a numerical method to solve the nonlinear stochastic differential equations
Omid Soleimani fard , Ali Vahidian kamyad
A Framework for QoS Negotiation in Future Mobile Networks
Milan Bjelica, Zoran Petroviό
A New Algorithm for T/2-Soft Decision Feedback Blind Equalizer
Vladimir R. Krstic, Zoran Petrovic
Mathematical Morphology Elements Used for the Ridges Extraction of Linear AM-FM Modulated Signals
Cornelia Gordan, Romulus Reiz
Design of Logic Arithmetical Unit and Its Application of Control of Motors
Bustillo DΊaz Mario Bustillo, Cortez Josώ Italo, Celaya Borges Carlos, Quiroz Maldonado Leonel
Yip Kit Kuen
A Shortcut into Speaker Verification Roxana Saint-Nom
Elena Niculescu
Genetic Fourier Descriptor for the Detection of Rotational Symmetry
Improving a Keyword Spotting System Using Phoneme Sequence Generated by a Filler Model
Lubos Smidl, Ludek Muller, Josef Psutka
the genetic heuristics for the plant and warehouse location problem
Seong-kook Choi, Taehan Lee, Jinsuk Kim
design of user management system for e-logistics system based on ebxml
Jeongsook Chae,Younghee Kim,Jaegak Hwang,Yongjoon Lee
Hybrid modelling of the second-order PWM converters with DCM
Dorina-Mioara Purcaru
Eugen Iancu
Modeling and simulation of arterial pressure control
Matrix analysis anchored structures Olga Martin
Computerized study of the linear optical incremental encoder
Modeling and simulation of the ammonia synthesis column
Matei Vinatoru, Eugen Iancu
Modeling and simulation of failures in dynamic systems
Eugen Iancu, Ionela Iancu
Voice Assimilation Phenomenon and Its Implementation in LVCSR System with Lexical Tree and Bigram Language Model
Aleγ Praηάk, Filip JurϋΊϋek, LudΉk Mⁿller, J. V. Psutka
Periodical solutions for the neutron transport equation Olga Martin
Implementation of ebXML compliant Business Process Management System
Sunghwan Choi, JaeGak Hwang, Yong-Joon Lee, Hye Jin Park
ebXML Business Process Analysis in a Logistics Industry
Hye Jin Park, Yong-Joon Lee
An Implementation Of A Pipelined Encryption Multi-Processing Unit Utilizing Vhdl And Field Programmable Gate Arrays
Magdy Saeb, Samy Salamah
Design and Implementation of a Secret key Steganographic Micro-Architecture Employing FPGA
Hala A. Farouk, Magdy Saeb
The Design of a Resource Broker for Optimal Resource Selection and Job Migration in Grids
Hwa Min Lee, Sung Ho Jin, Dae Won Lee, Seongbin Park, Soon Young Jung, Won Gyu Lee and Heon Chang Yu
Subjective Quality Evaluation of Real-time audio transmission over Internet Protocol (IP) Networks
ROBSON L.K. MANDISODZA, HAIFENG LIU, MARTIN J. REED
An evolutionary algorithm for camera calibration
toward self-managing systems
A coordination Model for Ubiquitous computing
Philippe Guermeur, Jean Louchet
H.T.Tian L.S.Huang J.L.Shan B.He
Secure Session Establishment with SIP in Environments containing Middleboxes
Klaus Umschaden, Igor Miladinovic, Johannes Stadler
Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm
Magdy Saeb, Cherine Fathy
A Comparison Between Implicit and Explicit Spacecraft Gyro Calibration
Itzhack Y. Bar-Itzhack Richard R. Harman
Application of Decentralized Neural Control On Space Reflector
Alex Khoshafian, Helen Boussalis, Khosrow Rad, Jane Dong, Charles Liu, Salvador Fallorina, Anastassios Chassiakos, Elias Kosmatopoulos
Fault-Tolerant Parallel Implementation of Decentralized Control for a Segmented Telescope Test-bed
Salvador Fallorina, Helen Boussalis, Khosrow Rad, Charles Liu, Jane Dong, Alex Khoshafian
On the Design and Implementation of User-friendly Interface for Scientific and Engineering Applications
Wei Sun, Yulu Chen, Helen Boussalis, Charles Liu, Khosrow Rad, Jane Dong
simulation on industrial mrmi system with multiplex wavelet model
large step optimization approach to flexible job shop scheduling
Yangja Jang, Hoon Jung, Jinsuk Kim
using wavelets for texture classification
Dawei Cai
EEG signal compression using generalized regression neural network estimator model
N.Sriraam, C.Eswaran, R.Kannan
the location-based knowledge management system development for e-logistics application
Hyun ah Lee, Hye jin Lee, Dong ho Kim, Jin suk Kim
Bayram Kara, Nurdal Watsuji
building speech synthesis for bahasa melayu text-to-speech system
Shanmugasilan Anantan, Reena Ram Tawar,Gunavathy Loganathan,Natarajan Sriraam
projector correction approach for unknown geometry surface
Tiina Heikkinen
a propagation model of cellualr mobile radio communication in urban areas
Sachendra N Sinha,Bharoti Sinha
Moment method analysis of radiating slots of arbitrary shape in the broadwall of a rectangular waveguide
D.B. Konditi and S.N. Sinha
More Scalable Scheme Based on Management Distribution for the Real-time Control Protocol (RTCP)
N.A.Elrmly1, H.M.Harb2, A.S.Habib1, O.S.Essa1
On noncooperative scheduling: existence of efficient equilibria
Web3D Environmental Science E-learning as 3D GIS Application
Full wave analysis of scattering from a stub-loaded microstrip patch antenna
Sachendra N. Sinha and Pujara Dhaval Kumar
Observation of disturbances for multivariable systems
secure semantic web service using saml
Dorina-Mioara Purcaru
A full-order model of Æuk PWM converter with DCM Elena Niculescu
Xinkai Chen, Guisheng Zhai
an information broadcasting system with infrared data communication protocol
Dawei CAI~{!!~}Yuji Saito Yoshihiko Abe
An approach to unstructured finite element mesh generation using Coons mapping and smoothing techniques
V. Dimitriou, A. Kanarachos, D. Koulocheris
Jooyoung Lee, Kiyoung Moon
An efficient algorithm for shape identification in tactile recognition
Shih-Ching Lo
A Java-Based Embedded Digital Signal Processing System
Zhe Lou, Stefaan Verschuere, Jo Plentickx, Xing-Zhi Qiu, Jan Vandewege
Solving a biobjective location problem using a geometric method
Teresa Ramos, Carmen Ramos and Rosa Ramos
Modeling and Numerical Analysis for Dynamic Speed of Traffic Flow
acoustic feedback cancellation in hearing aids using spectral subtraction
Won-seok, Ryu Kyoung, Park Jang-sik, Park
Computational Comparison of Transport Models for Ultra Short Channel Metal Oxide Semiconductor Field Effect Transistors
S.C. Lo, J.W. Tsai, and Yiming Li
A method for the synthesis of nonlinear controllers using a Taylor series expansion of the control law
Stratis A. Kanarachos, Konstantinos Spentzas
Near optimum solutions and sensitivity analyses based structural optimization applied to truss structures under arbitrary constraints
Stratis Kanarachos, Dimitrios Koulocheris, Harris Vrazopoulos
A new “min-max” Hamiltonian method for computing optimal obstacle avoidance trajectories of vehicles
Stratis A. Kanarachos Konstantinos Spentzas
Nonlinear vibration control of a flexible-link robot arm based on a Taylor series expansion of the control law
Stratis A. Kanarachos, Konstantinos Spentzas
A study of the makespan objective considering processing and machine setup times
Georgette Kanarachou, Vrasidas Leopoulos
Mahmoud Alrefaei
Vassiliki Bouki
a stopping rule for stochastic simulated annealing with constant temperature
Dynamic Power Management of Streaming Applications over a Wireless LAN
Andrea Acquaviva, Emanuele Lattanzi, Alessandro Bogliolo, Luca Benini
A Quantitatively Study of Threshold Voltage Fluctuation with Quantum Mechanical Models for Deep-Submicron MOSFETs
C.S. Tang, S.C Lo, J.H. Tsai, and Y. Li
Regulation of primary cytotoxic response by antigen-presenting cells
Igor M Rouzine, Kaja Murali Krishna, & Rafi Ahmed
Interactive Notes: The notion of interactivity in e-learning
Exploring Coprocessor Interfaces in an Embedded Java Environment
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bogliolo, Luca Benini
Learning Robotic Behaviors with Association Rules Thomas Hellström
A framework for hybrid computational models Roman Neruda
FPGA Implementation of a Parallel Pipelined Hardware Genetic Algorithm (PPHGA) and its Applications in Function Approximation
Ahmed Khadragi, Hossam Mostafa, Yasser Hanafi.
Discovering Fuzzy Classifiers With Genetic Algorithm And Aggregation Operators
Hasanzade, M., Bagheri, S.,Lucas, C.
Fast and Accurate Closest Point Search on Triangulated Surfaces and its Application to Head Motion Estimation
Dennis Maier, Jürgen Hesser, Reinhard Männer
Adaptive Filtering Based on Gradient Information
A Collection of Interaction Patterns for Design the Visual Feedback of Interactive Applications
On The Overlay of Intelligent FDSS (MC-CDMA) on AMPS System (Downlink and Uplink Analysis)
Bazil Taha-Ahmed, Miguel Calvo-Ramón AND Leandro de Haro-Ariet
Numerical Treatment and Evaluation of Inverse Problems
Pantelis Soupios, Constantinos Papazachos, Filipos Vallianatos, Taxiarchis Papakostas
Video Sequence Coding by Neuro-Fuzzy Image Segmentation and Polynomial Modeling of Motion Fields
Cataldo Guaragnella, Giuseppe Acciani, Giacinto Calculli
Yulin Liu, Xiaojun Jing, Gangbing Tan
fusion filtering and an advanced algorithm Xiaojun Jing, Yulin Liu
Wavelet Video with Unequal Error Protection Codes for Wideband Multicarrier CDMA over Fading Channels
Minh Hung Le and Ranjith Liyana-Pathirana
Improving Recognition Accuracy on CVSD Speech under Mismatched Conditions
Madhavi K. Ganapathiraju, N. Balakrishnan, Raj Reddy
Effect of Adjacent IS-95 Network to FDSS Uplink Capacity
Bazil Taha-Ahmed, Miguel Calvo-Ramón AND Leandro de Haro-Ariet
Mathematical modeling of crown forest fire initiation Valeri Perminov
Inducing Stability by Linear Rewards and Penalties Uriel G. Rothblum
a simple diagnostic method for memory testing
Parallel and Cooperative Architecture for a Scalable VOD Integrated System
Feng Huang, Yuwen He, Yuzhuo Zhong
Application of CLEAN algorithm in incomplete mictrotremors recordings
George Hloupis, Margarita Moisidi, Filippos Vallianatos, John Stonham, John Makris, Dimos Triantis
Adaptive Load Sharing in Video-On-Demand Distributed Multimedia System Using Parallel Servers
Mohammad Riaz Moghal, Mohammad Saleem Mian
Keon-jik Lee, Byeong-jik Lee, Seong-Woon Kim
Fuzzy Models of Cam Systems
Tensor Decomposition Resolves Geoelectrical Structure Modeling Ambiguities in Mohr Circle Topology
John P. Makris, Filippos K. Vallianatos, Ioannis O. Vardiambasis
Alberto Borboni, Horia Nicolai Teodorescu
A methodology to model and simulate an environment for e-learning
Ines Brosso; Alessandro La Neve
The Design of a Resource Broker for Optimal Resource Selection
Hwa Min Lee, Sung Ho Chin, Dae Won Lee, Seongbin Park, Soon Young Jung, Won Gyu Lee, Heon Chang Yu
A simulation test-bed for the design of dependable e-services
Panajotis Katsaros - Constantine Lazos
The following papers belong to: WSEAS AIC-ISTASC-ISCGAV 2003, Rhodes, Greece, Nov.15-17, 2003
Noncausal vector linear prediction filters
A model to approximately cover an area by antennas
Kh. Manglem Singh and Prabin K. Bora
S. A. Paschos, V. Th. Paschos, V. Zissimopoulos
cooperative competing technologies enhancing the publishing industry: the xml revolution
Tor A. Kwembe, Jan-jo Chen, Azungwe I. Kwembe
Compression of Persian Text for Web-Based Applications, Without Explicit Decompression
Fattane Taghiyareh, Ehsan Darrudi, Farhad Oroumchian, Neeyaz Angoshtari
Design of an I-Beam using a deterministic multiobjective optimization algorithm
Dimitris Koulocheris, Harry Vrazopoulos, Vasilis Dertimanis
Evolutionary Algorithms Software - Parametrisation Possibilities and Performance
Thomas Schnattinger, Gabriella Kókai, Zoltán Tóth
Evaluation Of The Probability Density Function Of The Four-Wave Mixing Noise
J. Neokosmidis, th. Kamalakis, a. Chipouras & d. Varoutas
Electrical crosstalk estimations on flip-chip and wire-bonded OEICs
D. Varoutas, a. Chipouras, a. Arapoyianni & t. Sphicopoulos
A Closed-form Discrete Fractional Gabor Expansion Erol Onen, Aydin Akan
fcp: forecasting community portal
Fuzzy Based Twin Controllers for Overhead Crane Cheng-yuan Chang
E.Tavanidou, Dr.K.Nikolopoulos, Dr.K.Metaxiotis, Prof.V.Assimakopoulos
Control of General Nonlinear Systems Using a Novel Dynamic Structure Neural Network
BEHZAD MOSHIRI and MAHDI JALILI-KHARAAJOO
Evaluation Of Techtonic Structure Of Gelibolu Using Steerable Filters
Osman Nuri Ucan, A. Muhittin Albora, Atilla Azmen
Computerized Office Scheduling System Mahmoud Iskandarani and Nidal Shilbayeh
A Methodology for Modeling Ecological Systems based on Cellular Automata.
G. Gh. SIRAKOULIS, I. KARAFYLLIDIS, A. THANAILAKIS, and Ph. TSALIDES
High Performance Computing in Protein Secondary Structure Prediction
Yutao Qi, Feng Lin and Kin Keong Wong
Minimum-Knowledge Schemes for low-power, low-memory Devices
Thomas Newe, Tom Coffey
Data Flows Algorithms with Neural Networks
Summing Amplifier as a Multi-Valued Logical Element
Luis Mingo, Miguel Diaz, Rafael Gonzalo, Levon Aslanyan, Eugenio Santos
Victor Varshavsky, Viacheslav Marakhovsky, Ilya Levin, Nayaly Kravchenko
Olgierd Unold
Cellular Automata equivalent to D0L Systems
QoS Comparison for DiffServ over Heterogeneous MPLS Multicast Networks : A Simulation Study
Abdullah AlWehaibi, Anjali Agarwal, Michael Kadoch and Ahmed ElHakeem
Context–free grammar induction using evolutionary methods
Abdel Latif Abu Dalhoum, Alfonso Ortega, Manuel Alfonseca
Synchronous state analysis for a master-slave clock distribution architecture
J.R.C. Piqueira and S.A.C. Vargas
Wideband sound compression for multimedia application
Adrian Rominski, Zygmunt Ciota
Design and measurements of current mode filters using CMOS technology
Mariusz Jankowski, Zygmunt Ciota, Bartosz Maciejewski, Andrzej Napieralski
Optimum Signal Linear Detector in the Discrete Wavelet Transform-Domain
Ignacio Melgar, Jaime Gomez, Juan Seijas
Evagelos Varthis
New method for time series forecasting Theodor D. Popescu
J. Sebestyenova
A survey of Reservation Schemes for Optical Burst Switching (OBS)
Hierarchical verification of reactive systems with timing constraints
Towards wireless IT infrastructure Seppo Sirkemaa
A Novel Transadmittance-Type KHN-Biquad Employing DO-OTA with Only Two Grounded Capacitors
Muhammed A. Ibrahim and Hakan Kuntman
Simple design of photonic crystal mmi couplers
Real Life Data Mart - Models Comparison
Source localization of brain electrical activity via time-frequency Linearly Constrained Minimum Variance method
Riaz ahmed Khan, Ejaz Khan
M. Mamalis, d. Varoutas, a. Chipouras & th. Kamalakis
Mario Milicevic, Vedran Batos, Vedran Mornar
Analysis of Polyphase Filter Section with CFAs Mahmut Un
The Optimal Routing and Uncertainty Processing of Moving Objects in e-Logistics
Dong Ho Kim, Jin Suk Kim, Keun Ho Ryu
A precise DA converter realised with imprecise resistors
LJubisa Stankovic, Rada Dragovic-Ivanovic, Zoran Mijanovic, Nedjeljko Lekic
Hybrid FEC/ARQ Delay for DiffServ Over IP and MPLS Multicast Networks
Abdullah AlWehaibi, Anjali Agarwal, Michael Kadoch and Ahmed ElHakeem
High frequency Silicon-germanium heterostructure devices:simulation and analysis
Brishbhan Panwar, Gagan Khanduri
Active Queue Management: Comparison of Sliding Mode Controller and Linear Quadratic Regulator
MAHDI JALILI-KHARAAJOO and ALIREZA DEHESTANI
Application of Computational Intelligence Techniques in Active Networking Technology
MAHDI JALILI-KHARAAJOO and ALIREZA DEHESTANI
Application of Robust Control Issues in Differentiated Services Networks
ALIREZA DEHESTANI and MAHDI JALILI-KHARAAJOO
Modelling and control of cotton sliver drafting process Jaroslav Hlava
Discrete-Time Sliding Mode Control Design for Linear Time-varying Systems with Application to Steering Control of Highway Vehicles
MAHDI JALILI-KHARAAJOO and BEHZAD MOSHIRI
A High Performance CMOS Opamp and An LP Filter Design Example for Video Applications
Atilla Uygur and Hakan Kuntman
performance investigation of a broadband ofdm system employing spatial diversity and turbo coding
Emmanouil I. Kalantzis, Panagiotis I. Dallas, Bayan S. Sharif
Cellular Automata Modelling and Fractal Analysis of High Burn-up Structures in UO2
Ioannis Antoniou, Elena Akishina, Viktor Ivanov, Boris Kostenko
ARMAX parameter estimation using hybrid optimization techniques
Dimitris Koulocheris, Vasilis Dertimanis, Harry Vrazopoulos
Two-dimensional cellular automata of radius one for synchronization task
Rene Reynaga and Franz Yupanqui
The Software Architecture of a Decision Support System for Process Plant Instrumentation
Gustavo Vazquez, Sebastian Ferraro, Jessica Carballido, Ignacio Ponzoni, Mabel Sánchez, Nélida Brignole
An extended notion of Cellular Automata for surface flows modelling
M.V. Avolio, G.M. Crisci, D. D’Ambrosio, S. Di Gregorio, G. Iovine, R. Rongo, W. Spataro
Notes on control and observation in cellular automata models
S. El Yacoubi and A. El Jai
Design of dedicated parallel processors for the simulation of physical processes using cellular automata and genetic algorithms.
G. Gh. Sirakoulis, I. Karafyllidis, A. Thanailakis, and Ph. Tsalides
Improving Image Data Processing Noriaki Asada
A novel framework for the evaluation, verification and validation of distributed applications and services
Antonio Liotta, Carmelo Ragusa, Marco Ballette
ARMAX
Camera Positioning within a Driving Simulator
A Proposal for the Specification of a SVC Service in a MPLS UNI
Edson Moreira Silva Neto, Sergio Vianna Fialho
Tersia Janse van rensburg, Anton van wyk
Sunil Gupta
Discrimination of Perfumes Using an Electronic Nose System
Nidal Shilbayeh and Mahmoud Iskandarani
Combining Neural Networks and CLP for Production Scheduling
Dimitrios Panopoulos, Dimitrios Ptochos, Athina Oikonomou, Dimitrios Askounis, John Psarras
Performance Evaluation of an Adaptive Volterra/Hybrid Equalizer in a Nonlinear Magneto-Optic Data Storage Channel
Analysis of 1/f Nature of Sea-Wave Noise Data Tayfun Akgül
Petri Net Modeling of Transformer Fault Diagnosis Process
Pavlos S. Georgilakis and John A. Katsigiannis
On the state of the art of cost estimation and cost uncertainty analysis
Vrassidas Leopoulos, Michael Sfantsikopoulos
Fuzzy Rule 110 Dynamics and The Golden Number Angelo B. Mingarelli
A Bounded Local Adaptive Packet Pricing (BLAPP) Scheme for IP Networks
Chanan Glezer, Yuval Elovici, Yehuda Ben-Shimol
Objective functions for systolic arrays Dragan M. Randjelovic
A Configurable and Scalable SIMD Machine for Computation-Intensive Applications
Xizhen Xu, Sotirios G. Ziavras
Alexandre Grebennikov
Neural Networks: a Versatile and Robust Tool for Mobile Space Communications
Francis Castanié, Daniel Roviras
Discrete Time Linear Quadratic Optimal Control for an Electrical Servo Drive System
Corneliu Botan, Florin Ostafi, Alexandru Onea
Fast Algorithm for Solution of Dirichlet Problem for Laplace Equation
An Adaptive Encoder for Audio Watermarking
a novel eye localization method for face recognition
B. Gunsel, S. Sener, and Y. Yaslan
Developing and testing on-line survey instrument Norazlina Zainul and Abbas Cheddad
The System Parameter Fusion Principle and its Application to Evaluating the Core Competence of the Corporation
Qiangguo Pu, Haili Xia, Zhengqin Wu, Ying Liao
Audio-on-demand system using rtp protocol based on jmf api
Ibrahim Aref - Abd Rahman Ramli - Mohamed Derahman - Syed Al-Haddad
Jan Glasa
Ovidiu Pop
On bit-level systolic arrays for digitized contour derivatives estimation (invited paper)
Reliability Analysis of Time-Constrained Distributed Software
HAI JIN XIA XIE YUNFA LI ZONGFEN HAN
Terminological Reasoning in a Persistent LOGIDATA++ Object-Oriented Database
Satellite-based networking for the enterprise Stanislav Milanovic
Qiangguo Pu, Yong Wu
Farid Touati
The System Parameter Fusion Principle and its Application to Evaluating the Level of Real Estate Enterprise Informatization
Integrated Wideband Low-Noise Current-Mode Transimpedance Preamplifiers for Optical Receivers
Noncausal vector linear prediction filters
Shubh Shrivastava
Martin Juras
Kh. Manglem Singh and Prabin K. Bora
Design Maintenance System (Transformational Software Maintenance by Reuse):Invited Paper
Enumerative and structural aspects of incomplete generating languages
A Semigroup Representation of the World Wide Web Paraskevas V. Lekeas
Learning Object Model for Laboratory-based Lessons
using wavelets for texture classification
Habib Mir Hosseini, Keck-Voon Ling, Bing Duan, Robert Kheng Leng Gay
Bayram Kara, Nurdal Watsuji
Ranjan Bose
Joint Encryption & Compression using Variable Model Arithmetic Coding
Ranjan Bose and Saumitr Pathak
Performance of hybrid Turbo coding scheme for optical ppm communication systems
Ranjan Bose
Ranjan Bose
On the performance of Turbo Codes over UWB channels at low SNR
Kola Codes: A Constructive Technique for Trellis Codes with Large dfree
Improvement of Web-Based Intelligent Tutoring Systems
Constantinos Koutsojannis, Ioannis Hatzilygeroudis
Predicting Geomagnetic Activity Index by Brain Emotional Learning
ALI GHOLIPOUR,CARO LUCAS, DANIAL SHAHMIRZADI
Incoherent Detection of Distributed Targets in Structured Gaussian Interference
A. De Maio and G. Foglia
noncausal vector linear prediction filters Kh. Manglem Singh and Prabin K. Bora
A Recursive Matching Method for Content-based Image Retrieval
Hyunwoo Kim, Tae-Kyun Kim, Sang Ryong Kim, Wonjun Hwang, Seok Cheol Kee
Stefan Florczyk
Zamin Environment: Review and Comparison
New techniques for video based indoor exploration with mobile robots
SAMAN HARATI ZADEH, ABOLFAZL KEIGHOBADI LAMJIRI, CARO LUCAS
Applying BELBIC (Brain Emotional Learning Based Intelligent Controller) to an Autolanding System
Caro Lucas, Sahar Moghimi
SPEED CONTROL OF A SWITCHED RELUCTANCE MOTOR USING BELBIC (Brain Emotional Learning Based Intelligent Controller)
G. Zandesh,J. Moghani,C. Lucas,D. Shahmirzadi,B. N. Araabi,O. Namaki,H. Kord
Multi-Critics Based Intelligent Control Mehrdad Fatourechi, Caro Lucas, Ali Khaki Sedigh
Fuzzy Neural Network Implementation of Q(ë) for Mobile Robots
AMIR MASSOUD FARAHMAND, CARO LUCAS2
Fingerprint image enhancement in person identification
Arun Gaikwad , Navnath Pasalkar
Emotional Reinforcement Learning for Portfolio Selection
Ali Abbaspour, Caro Lucas
a novel eye localization method for face recognition
A statistical approach to distinguish between different DNA functional parts.
I. Abnizova, M. Schilstra, R. te Boekhorst, C.L. Nehaniv
HYUNWOO KIM, JONG HA LEE
Multiple Finite-Value Logic and Demonstrations
Estimation of the permanent of the binary matrix
Yong Wu, Qiangguo Pu
Dr.Oloyede .S Dr.Anani .R
Simulation Analysis of Packet Scheduling Algorithm for WWW and Video Streaming Service in UMTS Downlink FDD Mode
Marko Porjazoski, Borislav Popovski
Dobromir Kralchev,Dimcho Dimov,Alexander Penev
Evaluation of the Level of Real Estate Enterprise Informatization
A unit resolution approach to knowledge compilation
Wavelet Representation of Differentially Fed ANN
Arindama Singh and Manoj k Raut
A Learner-Centered Distributed Learning Environment
Peter Holt, Oscar Lin, Harris Wang, Qiangguo Pu
Reg Manjunath, K.S. Garamurthy
Ashraf HusseinNumerical Simulation of Neural Network-Controlled Unmanned Undersea Vehicle
Bayesian Decisions with Differentially Fed Neural Networks
Reg Manjunath, K.S. Gurumurthy
Introducing a New Approach for Defining Personality of Artificial Agents
Roozbeh Daneshvar, Caro Lucas
The following papers belong to: WSEAS ICECS and WSEAS E-Activities 2003, Sentosa, Singapore, Dec.7-9, 2003
Identity Hiding by Blind Signature Scheme
Salah, Albermany, Hamza Ali and Abdulameer, Hussain
A fuzzy global efficiency optimization of a photovoltaic water pumping system
K. Benlarbi, L. Mokrani, M. –S. Nait-said
A BICMOS Gm-C bandpass filter with Q enhancement based on symbolic design.
Luis Abraham Sanchez Gaspariano, Arturo Prieto Fuenlabrada, Joel Garcia Delgado
Convolution of gaussian manifolds in a differentially fed artificial neural network
Manjunath.R, Dr K.S.Gurumurthy
Bayesian decisions with differentially fed neural networks
Manjunath.R, Dr K.S.Gurumurthy
Differentially fed neural networks as ideal estimators in bayesian space
Manjunath.R, Dr K.S.Gurumurthy
Model Bell-LaPadula in Ciphered Environment
Spectral analysis of differentially fed artificial neural networks
Manjunath.R, Dr K.S.Gurumurthy
Analog spice behavioral model for digital io pin based on ibis model
Won-ok Kwon, Kyoung Park
Possibilities of the direct implementation of control algorithms from environment MATLAB/Simulink
Kamil Svancara, Petr Pivonka
A Robust Fuzzy Credit Assignment Cerebellar Model Articulation Controller (FCA-CMAC) with Fast Learning Applied to Control System
Yan-Ping Wang1, Zne-Jung Lee*2, and Shun-Feng Su1
Immunity Based Genetic Algorithm for Solving Quadratic Assignment Problem (QAP)
Chou-Yuan Lee, Zne-Jung Lee, Shun-Feng Su
Hardware Optimized Image Processing Algorithms for Industrial High Speed Applications
Joerg Velten, Marco Krips, Anton Kummert
João Nunes de Souza Ilmério Reis Silva Pedro Moises de Sousa
WIRE: Web Interface for Real-time ECG Sheela V. Belur
Timo Mantere
Applications with voltage conveyors Vit Novotny, Kamil Vrba
A simple diagnostic method for memory testing
Generating test images and halftoning filters with co-evolutionary GA
A Self-Tuning Method of Fuzzy Inference Rules Using Counter Propagation Networks
Hiromi Miyajima, Shinya Fukumoto, Noritaka Shigei, Kazuya Kishida
Keon-jik Lee, Byeong-jik Lee, Seong-woon Kim
A Stochastic Multipath Propagation Channel Model for Mobile Environments
Seedahmed S. Mahmoud, Zahir M. Hussain, and Peter O'Shea
Rangarajan,Kalyani
Detection and Estimation of Spectral Change
Ambient E-Society
Doppler Spectrum Analysis for the Hyperbolic Macrocell Channel Model
Seedahmed S. Mahmoud, Zahir M. Hussain, and Peter O'Shea
Online Promotions and Advertising in the Indian Context
P. O'Shea, M. Farquharson, G. Ledwich, Z. M. Hussain
Kari Heikkinen and Outi Cavén
Blind Source Separation of FM and Doppler Signals Using T-Distributions
L. Shang, Z. M. Hussain, and R. Harris
Rohan De silva
Comparative Energy and Delay of Energy Recovery and Square Wave Clock Flip-Flops for High-Performance and Low-Power Applications
Aliakbar Ghadiri and Hamid Mahmoodi-Meimand
Mobile Telemedicine for Accident and Emergency Scenes in Tropical Regions
B. Fong, A. C. M. Fong, P. B. Rapajic, G. Y. Hong
Performance evaluation of selective summary cache via simulations
Real-Time Implementation of an Adaptive Gain Equalizer for Speech Enhancement Purposes
Nils Westerlund, Mattias Dahl, Ingvar Claesson
Digital Filter Design of IIR Filters using Real Valued Genetic Algorithm
Mikael Nilsson, Mattias Dahl, Ingvar Claesson
A Time-Dependent LMS Algorithm for Adaptive Filtering
Yuu-Seng Lau, Zahir M. Hussian, Richard Harris
M Y Siyal
A High Performance Blind Adaptive Filtering Algorithm
Jusak Jusak, Zahir M. Hussain, Richard Harris
Orthogonal Space-Time Block Coding with Adaptive Transmit Diversity for Correlated MIMO Channels
Kevin H. Lin, Zahir M. Hussain, Richard Harris
Attitude to Disclose Personal Information in the Internet:
Chan Ik Park, Changi Nam
A Correlative Criterion for the Stability of Sigma-Delta Based IIR Filter: Application to an FIR-like Bit-Stream Filter
Adam Charles Thompson, Zahir M. Hussain, Peter O'Shea
Delayed Filter Update - An Acoustic Echo Canceler Structure for Improved Doubletalk Detection Handling
Fredric Lindstrom, Mattias Dahl, Ingvar Claesson
A Novel Framework For Business To Consumer E-Commerce
M Y Siyal
M Y Siyal
M Y Siyal
Qiangguo Pu
A Biometric Based E-Security System For Internet-Based Applications
A Window-Based Image Processing System For Itelligent Trnsportation System
A Novel Image Processing Approach for Qualitative Road Traffic Data Analysis
An empirical study of bi-level parallel computing on a PC
Yu-fai Fung, Wai-leung Cheung, Gujit Singh, Muhammet F. Ercan
The System Parameter Fusion Principle and its Application
The Future Development of e-Government :Collaboration across Citizen, Business, and Government
In-Gul Lee, Dong-Hoon Yang
‘C’ Symposium On Signal Processing Sanjay Agarwal
Audio-on-demand system using rtp protocol based on jmf api
Ibrahim Aref - Abd Rahman Ramli - Mohamed Derahman - Syed Al-Haddad
Implementation and Performance Analysis for the Multimedia Home network based on IP over IEEE1394
Tak-Goa Tsuei, Kun-Chang Chen, and Han-Chieh Chao
A SiGe Heterostructure Bipolar Transistor for High Voltage Power Switching Applications
Gagan Khanduri, Brishbhan Panwar
Developing a Framework for Online Laboratory Learning Objects
Bing Duan, Keck-Voon Ling and Habib Mir M. Hosseini
Camera based vehicle detection and tracking using shadows and adaptive template matching
Marco Krips, Andreas Teuner, Jörg Velten, Anton Kummert
Weixin Kong, H. C. Lin
A New Paradigm for Mobile Agent Computing R. B. Patel, K. Garg
A Learner-Centered Distributed Learning Environment
Holt, P., Pu, Q., Lin, O., Wang, H.
Fitting Convex Surface to Scattered Data Points with Applications to Medical Imaging
Ravi Gautam,Sachin Patkar
Efficient Network Flow Based Ratio-Cut Netlist Hypergraph Partitioning
Sachin Patkar,Himanshu Sharma,H. Narayanan
A low phase noise fully integrated 2-GHz CMOS LC VCO design
Synthesis of Object-Oriented Descriptions Modeled at Functional-Level
Maziar Goudarzi, Shaahin Hessabi
Synchronous state frequency in mutually coupled PLL networks
M. Q. Oliveira, M. V. R. Unzueta and J. R. C. Piqueira
Adaptive tuning of scheduling parameters
Texture Analysis of Proximal Femur Radiographs
R.B. Patel, K. Garg
A Continuous Phase Modulation Scheme for Telemedicine Systems
B. Fong, P. B. Rapajic, A. C. M. Fong, G. Y. Hong
timo hamalainen, ari viinikainen, jyrki joutsensalo, kimmo kaario
Image denoising by thresholding in the wavelet domain and implementation in FPGA using VHDL.
Anand Paul , Bharanidharan K. , Sakthivel R.
Conversational browser for accessing VoiceXML-based IVR services via multi-modal interactions on mobile devices
Jieun Kim, Junsuk Park, Dongwon Han
Tati Rajab Mengko and J. Tjandra Pramudito
Distributed Banking with Mobile Agents: an approach for E-Commerce
Internet Web Browser Application for Children
A new security architecture for mobile commerce
Norazlina Khamis
An arbitration agent for bilateral trading in an electronic marketplace
Kannan Balaji, Varun S. Malhotra
Hardware/Software Partitioning and Simulation with SystemC
Richard Gallery, Deepesh Man Shakya
Current Gain Improvement at High Collector Current Densities for SiGe Heterostructure Transistors
Gagan Khanduri, Brishbhan Panwar
Noor Azliza Che Mat, Masita@ Masila Abdul Jalil, Amir Ngah, Noraida Haji Ali, Ham Yik Wah
Michael Turega, Chongyan Ren
FCSIT WAP Based Student's Information System: A Proposal
Online Final Year Project Selection System
Masita @ Masila Abdul Jalil, Noor Azliza Che Mat, Amir Ngah, Noraida Hj. Ali And Dzul Fadly Ismail
A Novel Approach for Integrated Flyback Converter Using ZVT- PWM Technique in DC UPS
R.Dhanasekaran,M.Rajaram,Rajesh Bhupathi
A Novel Approach for Integrated Pushpull Converter Using ZVT-PWM Technique in DC UPS
R.Dhanasekaran,M.Rajaram,Rajesh Bhupathi
Adaptive Control and Management System for Active Networks
Mahdi Jalili-Kharaajoo and Alireza Dehestani
Fuzzy Second-Order Sliding Mode Control Applied to Active Queue Management
Mahdi Jalili-Kharaajoo and Alireza Dehestani
Assessment and reuse of contents in the competence-based educational platform intermediactor
R. Pedraza-Jimenez,F. Valverde-Albacete,H. Molina-Bulla,J. Cid-Sueiro,and A. Navia-Vazquez
Model for a gradual objects recognition
Rohan Desilva
Neuromazes: 3-Dimensional Spiketrain Processors
Mohamed Sadgal, Aziz Elfazziki, Abdellah Ait Ouahman
An Extended CAP File to Support High Performance Embedded Java
Jesse Van Beurden Greg Knowles Graham Bignell
Real time vibration cancellation in magnetic bearing systems
esref turker, lijiang qin, alan harvey
Secure e-Business Management System Using Multiple Agents
Sangseung Kang, Joochan Sohn
A simple approach to congestion control of abr traffic with weighted max-min fairness
Andrzej Buller, Michal Joachimczak, Juan Liu, Adam Stefanski
Utterance verification using fuzzy methods
Digital Signature Generation using Fingerprint, Password and Smart Card
Fawad Ahmed and Mohammed Yakoob Siyal
Energy Recovery Strategy for Low Power CMOS Circuits Design
Anand Paul,Dr.A.Ebenezer Jeyakumar, Prof.P.N.Neelakantan , K.John Pratheep
A sidelobes suppression technique for spectra discontinuous HF radar signal
Dongpo Zhang,Xingzhao Liu
Web Based Portal for Capacity Building of Development Sector Enterprises in Pakistan
Shafay Shamail, Mian M. Awais, Shahid Masud, Sadaf Shams
Power Minimization Strategy in MOS Transistors Using
Anand Paul, Dr.A.Ebenezer Jeyakumar, Prof . P.N. Neelakantan
Dat Tran and Dharmendra Sharma
Automatic gender recognition
Hafsa beni laabassi
Alessandro Genco
Dat Tran and Dharmendra Sharma
Web-based employee evaluation system : A prototype
Sri devi Ravana & Ong Yean fong
E-learning globalization in multilingual and multiciltural environement
HAREM: The Hybrid Augmented Reality Exhibition Model
Mobile Agents for Resource Discovery in a Distributed Computing Virtual Coomunity
Francesco Agostaro, Alessandro Genco, Salvatore Sorce
DDSP based modem technology
Digital signal processing In v.90 modem technology
Eung-Nam Ko
Davinder Pal Sharma, Jasvir Singh
Jasvir Singh,Davinder Pal Sharma, S.S.Bhatti
A Web Based Multimedia Distance Education System With An URL and Error Synchronization Function
Modeling Human Computer Interactions with Automata
Pradip Peter Dey, Thomas M. Gatton, Mohammad N. Amin
Mohamma Amin
Ehsan Fathi
Mostafa Ghannadrezaii
Mostafa Ghannadrezaii
The Impact of Wireless Communications on E-business
Image Texture Classification using Gray Level Co-occurrence Matrix and Neural Network
Muhammad Suzuri Hitam, Mohd Yahyal Haq Muslan, Mustafa Mat Deris and Md. Yazid Mohd Saman
A 3-V Digital-Audio Sigma-Delta Modulator in 0.35-╡m CMOS
New Synchronization Method for Robust Watermarking using Dual PN
Using Wavelet-base HAS model for Robust Audio Watermarking
Secure Protocols For VarietyCash Transactions Chandra Pandey
Jose Noriega
Sunil Gupta B. Womack
Abel Stephen
A heuristic fault tolerant control for nonlinear mimo systems using neural networks
Adaptive Volterra/Hybrid Equalization of Nonlinear ISI in a Magneto-Optic Data Storage Channel
Explicit Frequency Domain Noise Compensation for Time Delay Estimation
Xiaoshan He, Jonah Gamba, Tetsuya Shimamura
The Emergence of Interdependent E-Commerce Constructs
Vector median filter for removal of impulse noise from color images
Kh. Manglem Singh, Prabin K. Bora and S. Birendra Singh
WAP Based e-Kiosk for Educational Institution
A Web Based Industrial Training Management System
Amir Ngah, Choo Boon Sze, Masita A.Jalil, Noor Azliza C.Mat
Sumazly Sulaiman, Suzuri Hj Hitam
Concrete and Abstract Terms Processing in the Human Brain
Ales Grmela, Nikos Mastorakis
Multiestimation-Based Adaptive Control of Robotic Manipulators WithApplications to Master Slave Tandems
A. IBEAS and M. de la SEN
A multiestimation adaptive control scheme whichIncorporates model reduction issues
A. Bilbao-Guillerna, M. De la Sen, S. Alonso-Quesada and A. Ibeas
Adaptive synchronous vibration controller asvc for magnetic bearing systems
Esref Turker, Lijiang Qin, Alan Harvey
Bluemin: A Suite for Management of PC Clusters
Implementing heuristic testing selection Goga Nicolae
Probabilistic testing coverage Nicolae Goga
The following papers belong to: WSEAS MCBC-MCBE-ICAI-ICAMSL,Puerto De La Cruz, Tenerife, Spain, December 19-21, 2003
conversion technology for visual and auditory web contents
Heesook Shin, Soosun Cho, Dongwoo Lee, Eunjeong Choi, Dongwon Han
an approach for the constitution of a risks business memory
Rachid CHALAL, Abdessamed Réda GHOMARI
Hai Jin, Hao Zhang, Qincheng Zhang, Baoli Chen, Weizhong Qiang
Recognition of Musical Instruments by Statistical Classification
Giovanni Costantini, Daniele Casali
Advanced multimedia technologies for e-learning Vladimir Uskov
Mohammed Aljohani
Speech Noise Reduction Using Adaptive Spline Neural Networks
Giovanni Costantini, Daniele Casali
Adaptive Room Acoustic Response Simulation: a Virtual 3D Application
Giovanni Costantini, Daniele Casali
Minimizing Total Cost For A Gaussian Distributed Filling Production System
A. A. Moreb, M. S. Aljohani
Exact Solution for the Optimal Economic Design of X-Charts Problem
Mohammed S. Aljohani, Ahmad, A. Moreb
optimal allocation of nuclear detector’s time for radioactive samples
Comparison of Monitors for Digital Diagnosis of Medical Images
Miew Keen Choong, Rajasvaran Logeswaran, Zaharah Musa, Aziah Ali
an artificial vision system for identify and classify objects
J.N. Rodríguez, L. Acosta, A. Hamilton, J.A. Mendez, L. Moreno
A Cluster-based Streaming Caching Proxy Framework
Hai Jin, Kaiqin Fan, Jie Chu, Gang Chen
Using speech processing in a tutorial system for dyslexic readers
Sánchez, J., Estévez, J., Moreno, L., Sigut, J., Muñoz, V., Aguilar, R., Merino, C.
a contribution of open source technologies to support distributed digital libraryΤs repository and index services
Helder Zagalo, Joaquim Martins, Pedro Almeida, Joaquim Pinto
Using Frames and Jess with Servlets for Stock Market Prediction Based on Fundamentalist Analysis with Fuzzy-Neural Networks
Renato de C. T. Raposo, Adriano J. de O. Cruz , Sueli Mendes Giselle Nunes Hamano, Leandro Barbosa da Silva
Analyzing Changes between Two Sets of Polygons using Plane Subdivision
Matej Gombosi Borut Οalik
a simple diagnostic method for memory testing
A Cryptanalytic Attack on RC4 stream Cipher
Optimal Camera Calibration for 3D Object Tracking
Keon-jik Lee, Byeong-jik Lee, Seong-woon Kim
Violeta Tomasevic, Slobodan Bojanic, Octavio Nieto-Taladriz
Adaptation Neighborhoods of Self-Organizing Maps for Image Restoration
Admissible solution of an N-periodic Leontief dynamic model
Begoña Cantó, Carmen Coll, Teresa De Lima, Elena Sánchez
Experimental Evaluation of an Approximation Algorithm for Scheduling Independent Tasks onto a Computational Grid
Noriyuki Fujimoto and Kenichi Hagihara
Aziah Ali, Rajasvaran Logeswaran, Michel R M Bister
Tor A. Kwembe
Recognition of Musical Chord Notes
Grid Share Han Yu
Mathematical algorithms for optimizing phosphorus level in chicken diet
Roadway Profile Modeled by Polynomials to Minimize Earthwork Cost
M. S. Aljohani, A. A. Moreb
Giovanni Costantini, Daniele Casali
Visual Interaction through Hand Gesture Recognition using Hausdorff Matching
Elena Sánchez-Nielsen,Luis Antón-Canalís,Mario Hernández-Tejera
DASH: A New High Speed Genomic Sequence Search and Alignment Tool
Greg Knowles Paul Gardner-Stephen
preserving for posterity sound quality with multimedia
An algorithm to hide information in binary images
Theoretical Framework for Artificial Music Critics
Distributed Virtual Music Orchestra
Lamberto Tronchin Valerio Tarabusi
Joan-Josep Climent, Javier Santacruz, Leandro Tortosa, Antonio Zamora
Analysing trends of quality data by means of new pre-processing methods
M. Reuter, S. Bostelmann
Penousal Machado, Juan Romero, Asís García, Iván González, Manuel Lagos
Dmitry Vazhenin, Alexander Vazhenin
Zeljko Panian
Form analyse optimisations for hymnal computer musi
Chang-Jun Ahn
A New Translation Template Learning Based on Hidden Markov Modeling
NGUYEN MINH LE, AKIRA SHIMAZU, and SUSUMU HORIGUCHI
An Extranet-based Customer-centric Enterprise Model
Nicolae Goga, Maria Goga
integrating xml with heterogeneous relational databases using gui-based xml middleware approach
Lee ching Kum and Sai peck Lee
SIMULATED ANNEALING METHOD IN LARGE SCALE SYSTEMS
Iterative Decoding with LDPC based Unitary Matrix Modulation with Splitting over the Coherence Bandwidth for OFDM
Ross Barnard
Extended Molecular Computing Model
NO PAPER NO PAPER
NO PAPER NO PAPER
Personalized Campaign Management System Based on User Preference
Kang Soo Song, Chi-Hwa Song, Won Don Lee
Human Behaviour Modelled as a Statistico-Deterministic Turing Machine.
Modeling the interaction between HIV-1 and the immune system
Federico L. Biafore, Carlos E. Luján, Carlos E.D'Attellis
Olgierd Unold, Maciej Ttroc, Tadeusz Dobosz, Alicja Trusewicz
Evaluation of Transform Based Image Coders, Using Different Transforms and Techniques in the Transform Domain
José Salvado, Bruno Roque
Systems Theoretical Modelling of the 20th Century Music (An Endeavour to the Categorization)
Noriyuki Akasaka
Hung-ju Chen
NO PAPER NO PAPER
A Synchronous Positioning Control Method at Pressure Control between Multi-AC Servomotors Driven in Injection Molding Machine
Feature extraction techniques using adaptive wavelets for signal classification
human capital accumulation and migration: a brain drain or a brain gain?
An hybrid system for 3D location in medical interventions
Nacim betrouni, Jean Rousseau, Salah Maouche
Heteroscedastic Linear Models for Analysing Process Data
Ilmari Juutilainen, Juha Röning
Atrificial Nueron Learnable to Threshold Functions
a high throughput solution for portfolio var simulation
Victor Varshavsky and Viacheslav Marakhovsky
Programmable Network Management based on the Web Services paradigm.
Dimitris Alexopoulos, John Soldatos
Design and Evaluation of a Visual Framework for Facilitating Re-engineering and Re-use of Relational Databases
H A Ramadhan and H Al-Lawati
Ana B. Alonso-conde, Rafael A. Moreno-vozmediano
a practical algorithm to identify varma models for economic data
Celina Pestano-Gabino and Israel Cruz-Báez
chaotic dynamics of a generalized cobweb model
Risk Evaluation Using a Fuzzy Logic Model
Simulation of the 3d space equilibrium of gravitating, rotating and magnetized matter
Numerical Algorithms in Time Series Models. The case of Banana Production in Canary Islands
González-Concepción, Concepción and Gil-Fariña, María Candelaria
Organization of Spatiotemporal Activity Through@STDP as a Mechanism for Coding �Temporal Sequences in the Hippocampal Model
Motoharu Yoshida and Hatsuo Hayashi
Designing a Computer Software Program for Complex Border Detection. Biological Applications.
Daniel Firka, Melina Rapacioli, Federico Fuentes, Ana Ortalli, Viviana Sanchez, Gabriel scicolone, Carlos Datellis, Vladimir Flores
Amaury Caballero, Syed Ahmed, Salman Azhar
Surface simplification based on a statistical approach
Gholam Reza Zandesh
Falk Huettmann
Approach to Dynamic Division of Web Page
Vladimir Savchenko Maria Savchenko Olga Egorova Ichiro Hagiwara
overcoming barriers to effective technology transfer in iran automotive industries
Towards a Marine Environmental Information System (MEnvIS) for the Northwest Atlantic: Experiences and suggestions from a multi-disciplinary GIS conservation
A design of the transcoder to convert the VoiceXML documents into the XHTML+Voice documents
Jieun Kim, Jieun Park, Junsuk Park, Dongwon Han
EUNJEONG CHOI , SOOSUN CHO, DONGWOO LEE, HEESOOK SHIN, DONGWON HAN
Recognition of Patterns of Infant Cry for the Early Identification of Hypo acoustics and Asphyxia with Neural Networks
Orion F. Reyes-Galaviz & Carlos Alberto Reyes-García
Avain Yeh
Avain Yeh
Dynamic Modeling of the Pinna for Audio Spatialization
Armando Barreto and Navarun Gupta
All for one: A Hybrid Translation Synthesis Framework
Christos Malavazos, Vassilios Antonopoulos, Ioannis Triantafyllou, Georgios Karagiannis, Stylianos Piperidis
Using Sharable Ontology to Retrieve Information through the Headline of Business News
Using Sharable Ontology to Retrieve Information through the Headline of Business News
Specification of the UFT Web-Based Fitness Tracking Software
Steven Arnold, Cathy Osterhout, Chul Yim, Sergiu Dascalu
Irena Atov
J. N. Fidalgo
html transcoding approach for small screen devices
V. Arnau; I. Marín
lp-based algorithm for optimization in multiservice ip networks
Neural Networks Applied to Spatial Load Forecasting in GIS
Heesook Shin, Soosun Cho, Dongwoo Lee, Eunjeong Choi, Dingwon Han
Fast nonrigid matching of multimodality medical images
G. Palos, N. Betrouni, V. Devlaminck, J. Rousseau
Fast analysis of highly repetitive sequences in human chromosomes using a novel search algorithm
Study of the cardiorespiratory interaction: a non-linear approach.
Ernesto Pereda, Julian Gonzlez, Dulce Mª De La Cruz, Luis De Vera
Music: a powerful tool for exaltation of the poetic word Luciano Simoni
Stanislaw Sieniutycz
Performace of Parallel 3D Iterative Reconstruction Algorithms
J.R. Bilbao-Castro, J.J. Fernandez, J.M. Carazo, I. Garcia
Optimization of multistage electrochemical systems of fuel cell type by dynamic programming
Implantation of a Project Management System following the ISO 10.006 in the Public Administration
Ramiro Concepción; Vicente Rodriguez; Joaquín Villanueva; Gemma Martinez; F. Javier deCos
Hierarchy of Evolutionary Levels in Knowleddge Management
Adriano Mones, Francisco Ortega, Nieves Roqueñi, JoseM Mesa, Valeriano Alvarez
An Architecture of a Multi-Agent System for Power System Operation
Alexandre Rasi Aoki, Ahmed Ali Abdalla Esmin, and Germano Lambert Torres
Alessandro Genco
Enrique Peacock-Lopez
Towards a knowledge acquisition mixed approach for strategic decision support systems
Abdessamed Réda Ghomari, Rachid Chalal
VHDL Modeling of Boolean Function Classification Schemes for Lossless Data Compression
K.T. THO, K.H. YEOW, F. MOHD-YASIN, M.S. SULAIMAN, M.I. REAZ
Development and implementation of signal processing and high performance computing algorithms for 3D audio
A. González, A.M. Vidal, J. González, G. Piñero, J.J. López, M. de Diego, M. Ferrer, P. Zucarello, L. Fuster, F. Martínez, P. Alonso, J.M. Badía
INVITED PAPER: HAREM: The Hybrid Augmented Reality Exhibition Model
Ecological model of competitive species and the role of intraspecies interaction in the formation of spatio-temporal patterns
molecular neuron realization
Reidun Twarock
NO PAPER NO PAPER
Redwood: A Visual Environment for Software Design and Implementation
Brian T. Westphal, Frederick C. Harris Jr., Sergiu M. Dascalu
Piotr Wąsiewicz, Andrzej Dydynski, Grzegorz Tomczuk, Jan J. Mulawka, Andrzej Plucienniczak
Mobile Agents for Resource Discovery in a Distributed Computing Virtual Community
Francesco Agostaro, Alessandro Genco, Salvatore Sorce
The protein stoichiometry of viral capsids via tiling theory
Traffic optimization with iterative weighted scheduling method
Timo Hamalainen, Jyrki Joutsensalo, Kimmo Kaario, Ari Viinikainen
Maneuvering Target Tracking
Traffic regulation in the urban transportation network
Sub-optimum Signal Linear Detector Using Wavelets and Support Vector Machines
Jaime Gomez, Ignacio Melgar, Juan Seijas, Diego Andina
Electre and AHP MCDM methods versus CP method and the official choice applied to high-speed railway layout alternative election
José M. Antón, Juan Bta. Grau, Diego Andina
Behzad Moshiri AND Farhad Besharati
Automated vulnerability management of computer systems
H.T.Tian L.S.Huang Z.Zhou J.L.Shan
Imed Kacem, Mahjoub Dridi
A High Performance Approach to Congestion Control of Differentiated Service Networks
A Low-Cost Speech Synthesis Method Bálint Lükõ
New software supporting the sugarcane breeding program in Cuba
Saddys Segrera, Ibis Jorge, Félix González, Víctor Caraballosa
Fuzzy Second-Order Sliding Mode Control Applied to Active Queue Management
MAHDI JALILI-KHARAAJOO and ALIREZA DEHESTANI
The Evolution of Haplotype Distributions in Random Mating Populations: A Random Set Approach
Amir Raji-Kermany and Charalambos D. Charalambous , Donal Hickey
MIMO Hinf Control Design Based on Genetic Algorithms. Application to a Flight Control System.
Manuel J. Lopez, Luis Garcia
A Novel Hybrid Pulse Excitation - Coded Excitation Scheme to Improve the Signal to Noise Ratio in Ultrasound Imaging
N. Asadi, S. K. Setarehdan, and H. Soltanianzadeh
Forecasting volatility with support vector machines: an international financial markets study
Fernando Pérez-Cruz , Julio A. Afonso-Rodríguez and Javier Giner
The Use of Temporal Database Concepts in the Design of the InterTimetabling System
Philippos Pouyioutas, Soulla Louca, Maria Poveda-Pouyiouta
Nonlinear Optimal Power System Voltage Regulator Design
MAHDI JALILI-KHARAAJOO
Proposal for an automated 3D biliary tree hierarchical structure analysis system using 2D MRCP image series
Rajasvaran Logeswaran, Aziah Ali
A Novel Approach for Chattering Minimization in Sliding Mode Control
Mohammad Reza Rafimanzelat and Mohammad Javad Yazdanpanah
Computer Evaluation of Exercise Based on Blood Volume Pulse (BVP) Waveform Changes
Armando Barreto, Chao Li and Jing Zhai
Everett Igobwa
Rational Model of Theoretical Gentics Karl Javorszky
The Thum Nyatiti and its Music in a Sociocultural Context
Application of the combinatorial sequencing theory for decreasing of the logistic costs in production networks
Oresta Bandyrska, Marta Talan, Volodymyr Riznyk
Free Oscillations of Viscoelastic Rectangular Plate with Rectangular Cutout
BYKOVTSEV A.S.,ABDIKARIMOV R.A.,HODJAEV D.A., KATZ A.A.
A computerized model calculation of emission rate coefficients involving a transient bonding state in semiconductors
Alfred Zehe, Araceli Ramirez, Edmundo Reynoso
MPLS-e2e: an Alternative Protocol for Mapping Level Three QoS into Level Two
Edson Moreira Silva Neto, Sergio Vianna Fialho
Compactly Supported Orthogonal Multiwavelets [email protected]
Avain Yeh
A tracking trajectories of a nonholonomic mobile robot using sliding mode fuzzy controller
R. Ouiguini; R. Bouzid; Y. Sellami
Direct and indirect blind equalizers of noisy fir channels: diterministic methods
Mohammed Elhajjami , Fatiha Mrabti ,Mohcine Zouak
conformational and functional significance of residue proline 17 in chicken muscle adenylate kinase
X. R. Sheng, X. M. Pan, C. Wang, Y. Zhang, G. Z. Jing
Using Sharable Ontology to Retrieve Information through the Headline of Business News
A multi-criterion segmentation and Objects Recognition
Mohamed Sadgal, Aziz El fazziki, Abdellah Ait Ouahman
Ouarda Hachour
Fuzzy Traffic Control of ATM Networks
Activity and structural changes of Horseradish peroxidase: effects of modifications and pH variations
Kourosh Bamdad, Bijan Ranjbar, Minoo Akbari, Masoomeh Khazaei
A Deterministic Model of Illicit Drug Use in a Given Population.
m.z. dauhoo and s. issack
A New design of FPGA for navigation approach of an IAV
A model of educational hypermedia for the generation and evaluation of adapative courses
Amar Balla,Mohamed-Tayeb Laskri
MAHDI JALILI-KHARAAJOO and ALIREZA DEHESTANI
An age-physiology dependent population dynamics model with polygamy
Tchuenche, Jean Michel
Feature Selection for Web Images Soosun Cho
Power-Law Networks in the Stock Market: Stability and Dynamics
Vladimir Boginski, Sergiy Butenko, Panos Pardalos
Derivation of a reversible Hill equation with modifiers affecting catalytic properties
Pål o. Westermark, Jeanette Hellgren-Kotaleski, Anders Lansner
Conversational browser for accessing VoiceXML-based IVR services via multi-modal interactions on mobile devices
Jieun Kim, Junsuk Park, Dongwon Han
Test and Improvement of Robustness for Digital Watermarking
X. Wang, K. Yen, A. Caballero
José Manuel González
Agent-based Approach to Workflow Management
Mathematical Tolls in Economy: Changes in National Debt and Public Expenditure before European Convergence. A Simulation Study with Techniques from Systems Dynamics
Yunhe Liao, Hinny P. Kong
Characterizing the closure of the strata of linear generalized Systems
M.I. Garcia-Planas, M.D. Magret, S. Tarragona
Multi-Tier Agent-Based Architecture For Web Information retrieval
Internet Multi-Tier Information Retrieval Agent System Architecture
N. A. EL-RAMLY1 , H. M. HARB2 , M. A. ABD-ELWAHED1, A. M. TOLBA1
Evaluation of Schemes and Algorithms For Real-Time Control Protocol (RTCP) Scalability Problems
Nabawya Elramly1, Hany Harb2, Aziz Habib1, and Omar Essa1
A.f.k. Zehe, A. Ramirez
Statustical research technique of perturbed trajectories of vehicles motion in atmosphere
Sokolov Nikolay Leonidovich, Udaloy Valeriy Alekseevich
On Proposing a Markup Language for Statecharts to be used in Performance Evaluation
Ana Amaral RenΆ Veloso Nandamudi Vijaykumar
Sliding Mode Congestion Control in Differentiated Service Communication Networks
Borland pascal tools for bootstrapping dependent data
Population dynamics system of cereal sunn pest (Eurygaster integriceps Put.)
bahram tafaghodinia, morteza esmaili, ghadir nouri-ghanbalani
An Agent-Based Approach to Implement an EBXML- Based Platform for B2B Ecommerce
Boughaci Dalila, Drias Habiba
Vibration of eukariotic cells in suspension induced by a low-frequency electric field: A mathematical model calculation
Mahdi Jalili-Kharaajoo
Improved Load Balancing in Distributed Service Architectures
Li-choo Chen, Rajasvaran Logeswaran, Aziah Ali
Proposing a New Architecture for Mobile Information and Consultation Support Systems
An Option Pricing Framework for Valuation of Football Players
Radu Tunaru, Ephraim Clark, Howard Viney
Organization of an intellectual searching to support vehicles control
Bocharov Lev Aleksandrovich, Sokolov Nikolay Leonidovich, Udaloy Valeriy Alekseevich
A fuzzy global efficiency optimization of a photovoltaic water pumping system
K. BENLARBI*, L. MOKRANI**, M. –S. NAIT-SAID*
More Scalable and Management Distribution Based Scheme for Real-time Control Protocol (RTCP)
Nabawya .Elrmly1, Hany Harb2, Aziz Habib1, Omar Essa1
Different Learning Structure Based Information Technology in STAGE
Farzan Rashidi, Nasrollah Eskandari, Farhad Besharati
Evaluation of Meta-Benchmarking Practices of Distributed Data Mining to Facilities Management
Proposing a New Architecture for Mobile Information and Consultation Support Systems
MAHDI JALILI-KHARAAJOO
Hearing System Model and Sound Quality Estimation
Miroslav Balík
Some special clique problems Renate Winter
On Disease Modelling From ViewPoint of Cells Population Dynamics
Vasilij P. Marzeniuk, Alexander G. Nakonechny
Michael Bank, Uri Mahlab
A Fuzzy Fusion Strategy for the Multimodel Approach Application
Ltaief Majda, Abderrahim Kamel, Ben Abdennour Ridha, Ksouri Mekki
A New Technique of Validities' Computation for Models' base
Talmoudi Samia, Abderrahim Kamel, Ben Abdennour Ridha, Ksouri Mekki
Optimized structure for multichannel digital reverberation
Order of z-domain model of switched circuit
Ekaterina Kozlova
S. Uatrongjit
Predator-prey models with diffusion and time delay
Agent-based Approach to Workflow and Supply Chain Management
Yunhe Liao, Hinny P. Kong
Dalibor Biolek, Viera Biolkova
An educational hypermedia model for the generation and evaluation of adaptive courses
Amar Balla,Mohamed-Tayeb Laskri
Stohastic prorgamming method for Asian options pricing
Context Sensetive Reasoning Based Information Technology for Intelligent Agents
Farzan Rashidi, Nasrollah Eskandari
Adaptive error gains controller using fren for discrete-time nonlinear plant
Irina Kozlova, Manmohan Singh and Alan Easton
Tunable CDTA-based ladder filters
Large k-1-Smith numbers Omar Kihel
Izebe Egwaikhide
A novel MAC layer adaptation for General Packet Radio Service-Satellite mode (GPRS-S) data communication
Vishwas Lakkundi, Miroslav Kasal
More Scalable and Management Distribution Based Scheme for Real-time Control Protocol (RTCP)
Nabawya .Elrmly1, Hany Harb2, Aziz Habib1, Omar Essa1
Dalibor Biolek, Viera Biolkova
The following papers belong to: WSEAS ICOPES-ICOSSE-AMCOS-ISCOCO 2003, New York, USA, December 27-29, 2004
Systems Security in Energy Trading & Risk Management: A Power Utility Focus
Design of a Voice Support Browser having Contents Converter
Dongwoo Lee, Soosun Cho, Heesook Shin, Eunjung Choi, Dongwon Han
Koutsoupias Nikos
A New Protocol for Anonymous WEB Transactions Yuval Elovici
Web Access Data Visualization with Data Analysis Methods
On Algebraic Expressions of Generalized Fibonacci Graphs
Mark Korenblit and Vadim E. Levit
Designing Direct Manipulation User Interfaces by Using Interaction
Jaime Mu±oz Arteaga, Carlos Alberto Reyes GarcΊa and Hector G. Pώrez Gonzάlez
An Improved Method of Pre-Deblurring Digital Images Towards the Pre-Compensation of Refractive Errors
MIGUEL ALONSO JR. and ARMANDO BARRETO
Design and evaluation of intermediate retransmission and packet loss detection schemes for MPEG 4 transmission
Nithish.M, Ramkumar.J, Ramakrishna.C, Lakshmi Priya.T.K.S
Khaled E. A. Negm
Using Wavelet and DLDA for Iris Recognition
Asnat Dadon-Elichai
Adaptive Binomial Congestion Control Algorithm based on the Loss Rate
ramanathan palaniappan, ramkumar jayaseelan, vikram chandiramani, vimal kumar selvam
Application of an amplitude tracking algorithm to a robot of limited resources locked in a bound space
Mario Bustillo, Edgar Coraza, Alfred Zehe, Araceli Campeche, Italo Cortez
Implementation of Secure Mobile Agent for Ad-Hoc Netwoks
Byungjun Son, Gyundo Kee, Hyunsuk Won, Yillbyung Lee
Towards the Integration of XML Security for Secure Open Location-Based Services
Namje Park, Kiyoung Moon, Sungwon Sohn
Performance Analysis of LAN Network Using Fuzzy Logic
V. Jawahar Senthilkumar, S. Karthik, S. K. Srivatsa
A Secure Policy Driven State based Roles Wrapper for Distributed Applications
vibratory motions on a helical trough Diana Ioana Popescu
Khaled E. A. Negm
Ellida M. Khazen
Total Solution for Secure Group Communication in Changing Topoligical Networks
V. Jawahar Senthilkumar, S. Karthik, S. K. Srivatsa
Statistical analysis of intelligent classifier on breast cancer data
I.Rojas, O.Valenzuela , L.Marquez, M.Pasadas
A novel approach to ARMA time series model identification by neural network
O.Valenzuela , I.Rojas , L.Marquez, M.Pasadas
Secure Mobile Code Computing in Distributed Environment
Reduction of Dimensionality in Choosing Robust Optimal Control in Linear Systems
Alexandre Grebennikov
The Study of the Approximation Quality of GR-Method for Solution of Dirichlet Problem for Laplace Equation
One approach for development of jini-based distributed environments
Oleg Starostenko, Alfred Zehe
ARMA models and forecasting techniques for some nonstationary components
Voget Raquel, Tinnirello Alicia
A Cooperative Search Method for the Weighted Max-Sat Problems
Dalila BOUGHACI and Habiba DRIAS
FAULT DETECTION AND ISOLSTION IN THE POWER PLANT CONTROL SYSTEM
Matei Vinatoru, Eugen Iancu, Angel-Cristian Vinatoru
Human Error Control in the Collaboration Workflow Modeling Tool Based on GEMS Model
Sang-Young Lee, Cheol-Jung Yoo, Ok-Bae Chang
A new approach to failsafe projects in mechanical field: experimental results
Gianfrancesco Maria Repici, Aldo Sorniotti
Universal and Novel N x N Bit Vedic Multiplier
Konstantin Starkov
A grid support infastructure for mobile services
Himanshu Thapliyal, Vishal Verma, Hamid R. Arabnia
RMI based distributed database model for multi - area power system
K. Nithiyananthan, V.Ramachandran
Localization of periodic orbits of a polynomial system by a finite set of polynomials
Performance Analysis of Satellite Network Protocol using Evolutionary Programming
S. Karthik, V. Jawahar Senthilkumar, Dr. S. K. Srivatsa
Marco Ballette, Antonio Liotta
Adaptive and Efficient Image Retrieval with One-Class Support Vector Machines for Inter-Query Learning
Iker Gondra, Douglas Heisterkamp
Specifying Broadcast Communication in E-LOTOS Monika Kapus-Kolar
Han Yu
Byung-yun Lee
A polynomial model for the level variations of the caspian sea using evolutionary design of Generalized gmdh-type neural networks
M.E. Felezi, N. Nariman-zadeh , A. Darvizeh, A. Jamali, A. Teymoorzadeh
An implementation technique to find 3D mask patterns of higher order local autocorrelation
Motofumi Suzuki Yoshitomo Yaginuma Noritaka Osawa
Dynamic modeling of Unified Power Flow Controller For A Simple Power System
Subhransu sekhar Dash ,.R.P.Kumudini Devi ,K.Kuppusamy , B.K.Panigrahi
new considerations of the distributed computing applications
Design and Implementation for a SyncML Synchronization Server using the Session Manager
Web Services Deployment and Security Chakib Chraibi
Energy management system and fuzzy control of voltage and reactive power in subtransmission system
Ricardo Carnevalli, Bernadete Mendonύa Neta, Ricardo Brito, Joe Morra, Ariovaldo Garcia, Petr Ekel, Marcio Junges, Daniel Guidoni, Reinaldo Palhares
Stochastic Dynamic Generation Models in Electricity Markets
J.K. Wu, Y. Liang, J.Long
Direct and indirect blind equalizers of noisy fir channels: diterministic methods
Mohammed Elhajjami , Fatiha Mrabti ,Mohcine Zouak
Ezendu Ifeanyi ARIWA
Alexander Zemliak
Objective functions for systolic arrays Dragan Randjeloviό
Autometrics and BioVirtual Management Network [ABMN]:Analysis of e-learning and Biometric Collaborative Partnership for Small and Medium Enterprises [SMEs] in UK
Computer Simulation of a Double Avalanche Region IMPATT Diode
Alexander Zemliak, Roque De La Cruz
Comparative Analysis of the Different Design Strategies for the Analog Electronic System Design
Conversational browser for accessing VoiceXML-based IVR services via multi-modal interactions on mobile devices
Jieun Kim, Junsuk Park, Donwon Han
Image Texture Classification using Gray Level Co-occurence Matrix and Neural Network
the Share of Grid Han Yu
Hsiaotang Hsu
Quadripartite Rotating Key for Secure Wireless Data Transmission
TOMOYUKI NAGASE, MASAYA KOMATA AND TAKASHI ARAKI
Audio-on-demand system using rtp protocol based on jmf api
Ibrahim Aref - Abd Rahman Ramli - Mohamed Derahman - Syed Al-Haddad
Ant colony system hybridized with simulated annealing for flow-shop scheduling problems
Feng Yuanjing Feng Zuren
Optimal Hedging Strategy for Value-at-Risk under Mean-Reversion Asset Markets
Tudor Barbu
AJAY SHARMA
Theory prime implicates of first order formulas
A Computer Vision System for Graphical Object Recognition
Multicriteria resource allocation with applications to power system problems
Petr Ekel, Mario Horta, Joel Pereira Jr., Roberto Berredo, Reinaldo Palhares
Robust fuzzy enhanced maneuverability law: relevance to autonomous underwater vehicle guidance
Deepak Vijayarani ponraj, Ananth kumar Venkateswaran
The Generalised Mass-Energy Equation Δ┤E = Ac2 Δ┤M; its mathematical justification and application in General physics and Cosmology.
Manoj K Raut and Arindama Singh
MartΊn L≤pez Morales
Evaluation of Schemes and Algorithms For Real-Time Control Protocol (RTCP) Scalability Problems
N.A. Elramly1, H.M Harb2, A.S Habib1, and O.S Essa1
More Scalable Scheme Based on Management Distribution for the Real-time Control Protocol (RTCP)
N.A.Elrmly1, H.M.Harb2, A.S.Habib1, O.S.Essa1
On the Solvability for Parabolic Equations with one Space Variable
Internet Multi-Tier Information Retrieval Agent System Architecture
Multi-Tier Agent-Based Architecture For Web Information retrieval
Efficient Probabilistic Fault-tolerant Scheduling Algorithm for Real-time Tasks in Heterogeneous Multi-Processor Systems
MOSTAFA M. SYIAM,ZAKI T. FAYED,SHYMAA M. ARAFAT,NORAN W. HOSSAM EL DIN
Robert Kitt
Market Resistance and Anti-Social-Percolation
The following papers belong to: WSEAS MMACTEE-WAMUS-NOLASC 2003, Vouliagmeni, Athens, Greece, December 29-31, 2003
The dynamic relation between trading volume and stock volatility: evidence for the G7.
Karanasos and Aris Katsaklas
Pareto-Zipf’s Law in Variability of Financial Time Series
Tom Erez, Sarit Moldovan, Sorin Solomon
Testing for Changing Persistence in U.S. Treasury On/O SpreadsffUnder Weighted-Symmetric Estimation
L. Vanessa Smith, Demosthenes N. Tambakis
Takuya Iimura
Vasilis Kallinterakis
Nicolas MILLION
Menelaos Karanasos
Bargaining,Nontatonnemet, and Decreasing Density of Wealth Distribution
The impact of heterogeneous traders’ interaction on stock returns when a subset of them is prone to herd behaviour: a literature review of the incumbent herding literature and a proposed method for modelling this interaction
Central Bank's Opportunism and the FisherE¤ect: a threshold cointegration investigation
Nonlinear Properties, Complexity, and Emergencein the Governance of the World Trade Organization
Roger W. Clark, George C. Philippatos
On The Returns Generating ProcessAnd The Profitability Of Trading RulesIn Emerging Capital Markets
John Hatgioannides and Spiros Mesomeris
The statistical properties of long-memory and exponential acd models
Nikoletta Lekka
Self-Adaptive Fitness Formulation: Theory and
A Reappraisal of the Inflation-Unemployment Tradeoff
Marika Karanassou, Hector Sala, and Dennis J. Snower
CSFB's Currency Risk in Emerging Markets Model (CREMM)
R. FARMANI*, J.A. WRIGHT, G.A. WALTERS and D.A. SAVIC*
Interacting two country business fluctuations. Euroland and the USA
Toichiro Asada, Carl Chiarella, Peter Flaschel, Reiner Franke
Nonlinear Phillips Curves, Complex Dynamics and Monetary Policy in a Keynesian Macro Model
Peter Flaschel, Gang Gong, Willi Semmler
Chaos Generator via SCR Relaxation Oscillator
Martin Lopez Morales
Dietmar Leisen
Masking System Design for Gray-Level Images Using Finite Time Synchronization of two Chaotic Lorenz Systems
Leonardo Acho Zuppa , Julio C. Rolón Garrido, and Víctor Hernández Rosas
A chaotic oscillator using the Van der Pol dynamic immersed into a Jerk system
Leonardo Acho Zuppa, Julio C. Rolón Garrido, and Sinuhé Benítez Escobar
Identification of typical trading days in the Athens Stock Exchange using intraday data
A. Sfetsos and C. Siriopoulos
Sinuhe Benitez, Leonardo Acho, Julio C. Rolon G.
Calculation of the axial component Bz at any point inside a magnetic field coil for plasma torches.
Halis Abderrahmane, Zehar Khaled, Benarioua Younes, Bouzit Nacereddine.
On the Solvability for Parabolic Equations with one Space Variable
Mixed Lognormal Distributions for Financial Applications
A Real-Valued PR Block Filter Bank Hideo Murakami
Secure Communication via a Chaotic Jerk System
Hénon Mappings and Wada Lakes Ralph W. Oberste-Vorth
Distimulus chromatic measurement systems
Aktül Kavas
Nicolas Marguet, Leonardo Acho Zuppa, Julio Cesar Rolón Garrido
Statustical research technique of perturbed trajectories of vehicles motion in atmosphere
Udaloy Valeriy Alekseevich, Sokolov Nikolay Leonidovich
D. Tomtsis, V. Kodogiannis, P. Chountas
Investigation of ýndoor propagatýon models at 900 1800 and1900 MHz bands
Quantum model of intermittency yuriy n. zayko
Shuhrat Kuvandikov
A design of the transcoder to convert the VoiceXML documents into the XHTML+Voice documents
JIEUN KIM, JIEUN PARK, JUNSUK PARK, DONGWON HAN
A New Hybrid Algorithm TS+SS for the Weighted Max-Sat Problem
Boughaci Dalila, Drias Habiba
Conversational browser for accessing VoiceXML-based IVR services via multi-modal interactions on mobile devices
Jieun Kim, Junsuk Park, Dongwon Han
Enhanced flicker removal through stationary block re-examination
Kin Keong Wong, Amitabha Das and Man Nang Chong
Application of magnetic methods for the analysis of the financial market
M. Toorani, A. Lakis
HTML transcoding approach for small screen devices
A. M. Selvam
Hybrid finite element in non-linear structural dynamics of anisotropic tubes conveying axial flow
An Approach to Dynamic Division of Web Pages for Displaying on Small Screen Devices
Eunjeong Choi, Soosun Cho, Dongwoo Lee, Heesook Shin, Dongwon Han
Conversion technology for visual and auditory web contents
Heesook Shin, Soosun Cho, Dongwoo Lee, Eunjeong Choi, Dongwon Han
Heesook Shin Soosun Cho, Dongwoo Lee, Eunjeong Choi, Dongwon Han
Quantumlike Chaos in the Frequency Distributions of Bases A, C, G, T in Human Chromosome1 DNA
Active RLC Circuit Model of the Second-order Dynamical System with Piecewise-linear Controlled Sources
Jaromir Brzobohaty, Jiri Pospisil, Zdenek Kolka, Stanislav Hanus
Carlo Artemi
Ahmed El-kashlan
Direct and indirect blind equalizers of noisy fir channels: diterministic methods
Mohammed Elhajjami , Fatiha Mrabti ,Mohcine Zouak
A Fundamental Frequency Estimation Method for Non-sinusoidal Signal Based on Numerical Differentiation
Simulation of inluence of an " opinion souce " over an electorate
Load Frequency Control by Optimization and Eigenvalues
Maneuvering Target Tracking
Proposing a New Architecture for Mobile Information and Consultation Support Systems
MAHDI JALILI-KHARAAJOO
Active Queue Management: A New Robust Fuzzy Second Order Sliding Mode Control Applied to
MAHDI JALILI-KHARAAJOO, ALIREZA DEHESTANI and HASSAN MOTALLEBPOUR
Farhad Besharati and Nasrollah Eskandari and Faezeh Besharati
Design a Nonlinear Fuzzy PID Controller for Control of Nonlinear HVAC Systems
Farzan Rashidi, Aminollah Kermanpour
Design a Nonlinear Adaptive Controller for Power System Stabilizer
Mehran Rashidi, Farzan Rashidi, Hamid Monavar
Ali Al - Haj
terraza virginie
Agent-based Approach to Workflow Management
Robust adaptive filtering with variable forgetting factor
Navigation strategy for car-like mobile robot among irregular obstacles
Hung-ching Lu and Chih-ying Chuang
A Parallel Distributed Arithmetic Implementation of the Discrete Wavelet Transform
Modeling Asymmetric and Seasonal effects in CAC 40 Volatility
Yunhe Liao, Hinny P. Kong
Zoran Banjac, Branko Kovaϋeviό, Mladen Veinoviό, Milan Milosavljeviό
Electrical Engineering and Electromagnetics
NONE NONE
B Lawrence
Efthimios Kappos
Reaching extreme events with conditional and unconditional models
Lampros Kalyvas, Costas Siriopoulos, Nikolaos Dritsakis
Lorenz and R÷ssler Systems with Piecewise-Linear Vector Fields
Jiri Petrzela, Jiri Pospisil, Zdenek Kolka, Stanislav Hanus
Identification Process, Design and Implementation Decoupling Controller for Binary Distillation Column Control
Sutanto Hadisupadmo, RJ.Widodo, Harijono AT, Tatang HS
Wavelet Exploratory Analysis of the FTSE ALL SHARE Index
Constantinos Vorlow, Antonios Antoniou
Solutions of the Generalized Verhulst Equations and Other Related Dynmaic Equations
Control-transverse and Graph Dynamics and relations to Backstepping
Yves Kuhry
numerical simulation of coupled fields
a multi-factor concept on guiding constraint relaxation in distributed constraint satisfaction
Endogenous Fluctuations in a Cournotian Monopolistic Competition Model with Free Entry and Market Power Variability
an inverse problem for the heat transfer in electric cables
Daniela Carstea, Ion Carstea
Daniela Carstea, Ion Carstea
A Novel Hybrid Pulse Excitation - Coded Excitation Scheme to Improve the Signal to Noise Ratio in Ultrasound Imaging
Naser Asadi, S. K. Setarehdan, and H. Soltanianzadeh
Indirect Neural Control: A Robustness Analysis Against Perturbations
ANDRÉ LAURINDO MAITELLI and OSCAR GABRIEL FILHO
Nonlinear algebraic identifiability and equalizability
S. M. Rezaul Hasan
The Interval Digital Images Processing
El asmi Sadok and Negy Youssef
Similarity Searches in Heterogeneous Feature Spaces
TILMANN STEINBERG, FILLIA S. MAKEDON, JAMES C. FORD, YUHANG WANG
Design and Simulation of a 4 GHz Folded-Cascode CMOS LC Quadrature VCO for RF Image-Reject Transceivers
Aarão Lyra, Benjamin René Callejas Bedregal, Roberto Callejas Bedregal and Adrião Duarte Dória Neto
Control of Nonlinear Systems via Temporal Difference Learning Based Intelligent Controller and Context Reasoning
Javad Abdi, Farzan Rashidi
a speech analysis technique based on a modeling of the masking properties of the peripheral auditory system
Ouni Kaïs Ellouze Noureddine
Farzan Rashidi
Farzan Rashidi
Christian Kuhn
Speed Control and Torque Ripple Minimization of Switch Reluctance Motor Using Genetic Algorithm
Robust Control of Nonlinear HVAC Systems via Emotional Critic Based Intelligent Controller
subband crosscorrelation analysis based speech classification in noisy environment
Zied Lachiri Noureddine Ellouze
Maternal and Fetal ECG Separation using Pitch Synchronous Wavelet Expansion
Afef Elloumi Zied Lachiri Noureddine Ellouze
Applied wavelet techniques in image coding standards
Dragorad Milovanovic, Zoran Bojkovic
a hierarchical clustering method based on the computation of gravity
Dynamic Data Visualization (DDV)
Image Quality Indices Based on Fuzzy Discrimination Information Measures
Ioannis K. Vlachos, George D. Sergiadis
Hybrid Wavelet-Genetic Algorithms for optimal design of high level radioactive waste repository
Hesham Nasif, Noha Shabaan, and Atsushi Neyama
Nazar Younis, Raied Salman
Evolutionary Neural Networks for Timeseries Prediction
Adam V. Adamopoulos, Efstratios E. Georgopoulos, Spiridon D. Likothanassis
Software Development to Control the Scorbot ER VII Robot With a PC
António Ferrolho and Manuel Crisóstomo
Eung-Nam, Ko
periodic oscillatory solution in delayed competitive-cooperative neural networks: a decomposition approach
Jinde Cao and Kun Yuan
analysis of responses of three-dimensional spiking oscillators to pulse-train input
Hidehiro Nakano and Toshimichi Saito
Experimental Analysis of Changes in Uncertainty and Robustness in the Kind of Inverted Pendulum Fuzzy Controller
Dragan Z. Saletic, Dusan M. Velasevic, Nikos E. Mastorakis
An Error Sharing & Classification Agent Running on Multimedia Collaboration Environment
Ioannis E. Pountourakis
Hinny P. H. Kong
Numerical method for solving an elliptic equation Olga Martin
A WDMA protocol for a New Control Architecture with Propagation Delay Analysis
An alternative WDM Architecture and a new MAC Protocol Analysis
Ioannis E. Pountourakis, Alexis Stavdas
Mobile Commerce Applications: An Engineering Perspective
Partial Differential Equations Involving Subcritical,Critical & Supercritical Nonlinearities
Sebastian Lorca & Pedro Ubilla
Computational Intelligence and Active Networks
Fuzzy Traffic Control of ATM Networks
Multiple Solution For An Asymptotically Linear Problem
A .M Micheletti & C.Saccon
BEHZAD MOSHIRI and MAHDI JALILI-KHARAAJOO
Active Queue Management: A New Robust Fuzzy Second-Order Sliding Mode Control Algorithm
MORTEZA MOSAVI, MAHDI JALILI-KHARAAJOO and ALIREZA DEHESTANI
A Linear Programming Approach for Calculation of All Stabilizing Parameters of Lead-Lag Compensator for Continuous-Time Plants
FARDAD ZAND and MAHDI JALILI-KHARAAJOO
Determination of All Stabilizing Constant Feedback Gains for Open-loop Unstable Second-order Systems with Time Delay
KARAM SHABANI and MAHDI JALILI-KHARAAJOO
MAHDI JALILI-KHARAAJOO and FARDAD ZAND
Slow Time Variant Image VisualizationRaied Salman, Nazar Younis
uncertainty analysis in the prediction of human operator violation using neural networks
Zhicheng Zhang, Frώdώric Vanderhaegen, Patrick Millot
a method to design chaotic conditionally reset linear systems
Cherif Aissi and Demetrios Kazakos
An improved realization of the chuaΤs circuit using RC-op amps
Cherif Aissi and Demetrios Kazakos
On Constrained Optimization Approach to Object Segmentation
Chia Han, Xun Wang, Feng Gao, Zhigang Peng, Xiaokun Li, Lei He, William Wee
On Simulating D Ψ Distributions Ion Mierlus Mazilu
Ontology-based Image Retrieval
ARION Ψ An Ancient Greek Music Composer
Wei Zheng, Yi Ouyang, James Ford, Fillia S. Makedon
Dionysios Politis, Konstantinos Vandikas, Nikolaos Gekas, Konstantinos Daglis
Similarity Searches in Heterogeneous Feature Spaces
Tilmann Steinberg, James Ford, Yuhang Wang, Fillia Makedon
Nonlinear Control of Rigid Manipulators Based on Approximate Solution of HJB Equation
ASADOLLAH GHAZAVI, HOSSEIN ROUHANI and MAHDI JALILI-KHARAAJOO**
Adaptive Control of SVC and UPFC in Power System
D. Karras
D. A. Karras
Yuanjin Zheng
A.B Bhattacharya , D.B Mirajkar
Efficient Neural Network Modeling Based On Dataflow Computing Languages
A combined SVM regression methodology for modelling robotic manipulators inverse dynamics
Adaptive Integrated RF Transceivers for Wireless Communications: Invited Paper
V. VeerakumarNonlinear electromagnetic wave propagation in isotropic and anisotropic antiferromagnetic media
Effective Flicker Removal through Repetitive Corrections
Kin Keong Wong, Amitabha Das and Man Nang Chong
The following papers has been submitted to the correcponding conferences of 2002. They published with 2003 WSEAS Editions though.
The following papers belong to the 2002 WSEAS Int. Conf. on Electronics, Control & Signal Processing and2002 WSEAS Int. Conf. on e-activitiesSingapore, December 9-12, 2002
A fast motion estimation method using an enhanced motion vector and DC matching methodology
Enhanced motion vector, Fast motion estimation, DC matching, Video compression, Video coding.
A Biometric Based E-Security System For Internet-Based Applications
Electronic Commerce Security, Biometrics, Biometric Signature, Iris Recognition, Digital Signatures, DNA, RSA, and DSA.
A Cascaded RLS-LMS Predictor And Its Application To Lossless Audio Codecs
Audio coding, Lossless coding, Predictive coding, Adaptive filtering, LMS algorithm, RLS algorithm.
A case study: How to maximize the food safety?
Haccp, Food safety, Amt´s, Automated Monitoring, Case Study, Optimization
Decision-Directed Adaptive Algorithms for Mobile Rad
Channel Estimation; Least Mean Square(LMS); Recursive Least Square (RLS).
A Criterion on Selecting the Expansion Point in RCL Model Reduction by Using Krylov-subspace Methods
Interconnect,Reduction,Krylov,Expansion,Inductor
A Cryptographic File System supporting Multi-Level Security
Cryptography, Access control, MAC, RBAC, Blowfish
A Customisable Report Generator Component System using XML-driven, Component-based Development Approach
Report model, Report schema, Report generator, XML, Component-based development, HTML report format
a free-form snake-based algorithm for lane detection
Lane detection, Snake, Autonomous guided vehicle
A fully integrated cmos pll for frequency synthesizer using gm-c filter
Phase-Locked Loop, Operational Transconductance Amplifier, Gm-C Filter.
a grid architecture for e-service: its components and composition
E-commerce automation, Architecture, Semantics, Workflow, Integration, Composition.
A Modeling and Analysis Methodology for DiffServ QoS Model on IBM NP architecture
QoS, DiffServ, OPNET, Modeling, Simulation, FSM, CLS-40.
A Modified Kangaroo Model For Long Lived Transactions Over Mobile Networks
Sagas, Kangaroo transactions, hop, Joey transaction, Joey infiltration, Joey infiltration manager
a new adabtive nonlinear multistage parallel interference cancelation in multiuser detection in cdma
Code division multiple access (CDMA), Multi-user detection (MUD), Parallel interference cancellation (PIC), Steepest descent method and Hyperbolic tangent.
A new approach to image segmentation using genetic algorithm with mathematical morphology
Genetic algorithms, Image segmentation, Object extraction, Mathematical morphology, Optimization.
A new neural network structure for camera calibration
Camera calibration, Neural network, Multilayer perceptrons, Projection, Back-projection
A Novel Framework For Business To Consumer E-Commerce
E-commerce, E-Trust, Third Party, E-Security, and Framework
A Novel Image Processing Approach For Qualitative Road Traffic Data Analysis
Image Processing, Transportation, Pattern Recognition, and Segmentation
A novel wide operating range technique of delay-locked loop with frequency selection block
Delay-locked loop, Frequency selection block, Voltage controlled delay line.
A Perfect Reconstruction Theory of ISITRA
Bino’s Model of Multipliplication, Subband Decomposition, ISITRA, ISITRA-1, Member Condition, Quadrature Mirror Filter, Perfectly Reconstuctible Filter Set, Framework of PRF Sets.
a reference model for e-commerce
E-Commerce,Reference Model,Ontology Knowledge,Classifications,Integration
A robust algorithm for blind separation of convolutive mixture of sources
Blind source separation, Convolutive mixture, Singularity, Minimal distortion principle
a robust and real-time multi-feature amalgamation algorithm for fingerprint segmentation
Biometrics, Image processing, Fingerprint, Segmentation, K-nearest neighbor, K-means classifier.
A Robust Fuzzy Credit Assignment Cerebellar Model Articulation Controller (FCA-CMAC) with Fast Learning Applied to Control System
FCMAC, Fuzzy logics, Concept mapping, CMAC, Credit assignment, Robust
A Segmentation-Based Triangular Mesh Generation Scheme For Mesh-Based Video Coding
Video coding, Mesh, Segmentation, Image contour, Motion
A Simpler Method of Reconstructing Charge Collection Probability for the Determination of Junction Depths in Semiconductor Devices
Electron beam application, Electron microscopy, Matrix inversion, Probability, Semiconductor device modeling, Simulation
A Simplified Methodology For The Synthesis Of Adaptive Flight Control Systems
Adaptive-equivalent systems, Invariance, Attitude control, Launch Vehicle, Flight simulation.
A SIP Load Balancer for Performance Enlargement on the Enterprise Network
SIP, PROXY, LOAD BALANCE, DNS SRV
A smoothed likelihood approach to image segmentation
edge location estimation, image segmentation, likelihood, rates of convergence, smoothing
A Single Input – Multiple Output Space-Time Channel
Beamforming; Hyperbolic; Multipath; Macrocell; Space-time Channel; Scatterer
a study of mems electronic interface and control circuit - variable optical attenuator
Digital control, VOA, Optical MEMS, DWDM Optical network, and Electronic circuit
A taxonomy of educational widgets
Taxonomy, Metadata, Design and development, Educational software, Component reuse
A Window-Based Image Processing System For Itelligent Trnsportation System
Image Processing, Transportation, Pattern Recognition, and Segmentation
Accelerating the Convergence of the Dynamic Integrated Systems Optimization and Parameter Estimation Algorithm by Way of Parallel Tangent
Optimal control, Nonlinear systems, Gradient descent,Parallel tangent, Gradient parallel tangent
Accelerating the convergence of the dynamic integrated systems optimization and parameter estimation algorithm by way of parallel tangent.
Optimal control, Nonlinear systems,gradient descent , Parallel tanget, Gradient parallel tangent.
Accurate Estimation of Coded Frame Rate in Realtime Video Coding over Handheld Devices
Rate Control, Realtime, Video coding, MPEG
adaptive beamforming using neural network
Beamforming, Adaptive antennas, Artificial neural network, Interference, Capacity, Wireless communication, training.
adaptive model reference tracking of a robot arm with uncertain dynamics incorporating state constraints
Adaptive Control, Robot Arm, State Constraints, Liapunov Theory, Uncertain Dynamics
An Computational Efficient Method fo Assuring Full Duplex Feeling in Hands-Free Communication
Hands-free, Full-duplex, Half-duplex, Sub-band, Acoustic echo cancellation, AEC, AEC-AG
An Effective Technique For The IF Estimation of FM Signals in Heavy-Tailed Noise
Time-frequency, Instantaneous frequency, Heavy-tailed noise, Estimation
an efficient adaptive approach for real-time dynamic background subtraction using an invariant color model
Adaptive Background Subtraction, Temporal Averaging, Exponentially Weighted Moving Average, Selective Update, Ghost Detection
An LMS Based Algorithm for Reduced Finite Precision Effects
LMS, Finite precision, Quantization, Hands-free, Acoustic Echo Cancellation, DSP
Application in Control of Boiler Using Signal Interpreted Petri Net (SIPN) Method
Discrete event systems, Hybrid systems, Boiler control, Petri net
Application of linear predictor and wavelet transform in partial discharge site location in power cables
Wavelet transform- linear prediction-detection and location-condition monitoring-partial discharge-cable
Application of neural-fuzzy modeling and optimal fuzzy controller for nonlinear magnetic bearing systems
Fuzzy model, Fuzzy-neural control, Magnetic bearing systems, Optimal fuzzy controller
Applying accountability and atomicity to Secure Electronic Transaction
electronic commerce, atomicity, accountability, Secure Electronic Transaction
Approximate symbolic analysis with Interval error estimation
Approximate symbolic analysis, Linear circuits, Computer methods
Automatization of the Shop2box System with Bluetooth
Bluetooth, Security, Shop2boxTM, Electronic Grocery Shopping, Home Delivery, Receiving Box, RFID
autoregressive modeling of the indoor radio propagation at 2.4GHz
AR model, frequency response, CDF
Bayesian restoration of medical X-ray digital images
Bayesian inference, Maximum entropy principle, Inverse problem, X-ray digital image
boundary and local stabilization of the Timoshenko beam
Uniform stabilization, strong stability, Timoshenko beam, exact controllability.
c-iscap(controlled internet secure connectivity assurance platform) : design, implementation and evalutation
IPsec engine, Internet key exchange, Security policy, Security management and evaluation
Click and Brick: Retailing Realities for the FutureE-Commerce, Internet, E-Tailing
Comparison Of Different Coding Schemes In Cdma Cellular System
Convolutional codes, BCH codes, Cyclic codes, Coding gain, Multiple access,Hard decisioning, Soft decisioning, Reverse(Forward) Traffic Channel.
Comparison of Time-Frequency Feature Extraction Techniques for Environmental Sound Recognition
non-speech sound recognition, environmental sound recognition, auditory signal processing, acoustic signal processing, joint time-frequency feature extraction
Computation of Hough Transform using SIMD Extensions
image processing, Hough transform, High performance computing
Compute Efficient Training Method for Gaussian Mixture Model Based Speaker Verification
Speaker Verification, Gaussian Mixture Models, EM Algorithm, K-Means, Log-Likelihood
Constructing Virtual Learning Environment With Streaming Media
Streaming media, Interaction, E-learning, Virtual learning environment, Synchronism
controlled system using fuzzy input adaptive networks
Adaptive network control, Neuro-fuzzy control, Fuzzy input adaptive network , Intelligent control
A new Data Strage System
Sortware,Desy model, Enstore's Architechure,Mbytes/sec
Depth profile determination of Si nanocrystals embedded in SiO2 films by spectroscopic ellipsometry
Nanocrystals ,Spectroscopic ellipsometry, EMA, Depth profile, Si
Design and Implementation of DSA Establishment Mechanism
Diameter, Cms application
design of double density wavelet filter banks
Filter banks, Wavelets, Oversampled filter banks, Double density, Shift invarience
Design of Network-based Connection Traceback System for Current Internet Environment
Hacking, Connection Traceback, Security, Packet Watermark
design of optimal orthonormal wavelet filter banks for image coding
wavelet filter banks, optimization, image coding
Designing EDIFACT message structures with XML schema
electronic commerce, XML, EDIFACT, XML schema, message structure, datatype
Detection of Known FM Signals in Known Heavy-Tailed Noise
Time-frequency, Neyman-Pearson, Instantaneous frequency, Heavy-tailed noise, Detection
Digital Hybrid PLL Frequency Synthesizer for the Ultra-fast Switching Speed
PLL, Frequency synthesizer, Digital look-up table, Switching speed and Synchronization
DSP and FPGA based Implementation of a Video-based Industrial Safety Application
image procesing, video based safety device
effective of ga-nbc using fat
Information filtering, NBC, Genetic algorithms, Baldwin effect, Intelligent agents.
effects of coding artifacts in video quality evaluation
Perceptual visual metrics, Subjective tests, Coding artifacts, Human visual system, Blockiness, Edge
effects of coding artifacts in video quality evaluation
Perceptual visual metrics, Subjective tests, Coding artifacts, Human visual system, Blockiness, Edge
Efficient pixel decimation pattern for faster video encoders
pixel decimation, video encoder, ATM network
E-Government - Integrated Vision and Approach
E-Government,Integrated Vision,Unified Processes,Interfaces,XML
E-Government: Behind the High Tech
E-Government, Government Reform, Citizen-Oriented,
Electric Power Quality : Types , and Measurements
Power Quality , Harmonics , Overvoltage , Disturbances ,Measurement
electronic commerce in iran a survey of business use of the internet
Internet,Iran,Electronic commerce,
e-Surveys: The SAGE Experiencee-Surveys, e-Marketing, e-Government, e-CRM
Exploiting Temporal Consistency to Improve Stereo Results
Temporal filtering, Stereo vision, Matching, Area-based, Real-time, Disparity, 3D
Fast analysis of blocks with current conveyors
Modified nodal analysis, Matrix-stamp, Mason-CoatesΣ flow graph, Current conveyor.
Feeling information extraction from characters
Feeling information, Characters, Image processing, Vector field, Fourier transform, KL expansion, Linear multiple regression model
Fingerprint Identification Using The Galerkin Finite Element Method
Fingerprint, Finite Element, Image Retrieval, Content-based, Database.
F-Mail Communication System for Users with Disabilities
E-Activity, People with Special Needs, Self-Explanatory Component Technology, Multiple Interface, Multimedia for Communication, Multiple View, Multimedia Message, Multimedia Hieroglyph, Multimedia Word
Forward Error Correction with Reed-Solomon Codes for Wireless ATM Networks
Burst error, FEC, Link availability, LMDS, Modulation, Wireless networks
Forward Error Correction with Reed-Solomon Codes for Wireless ATM Networks
Burst error, FEC, Link availability, LMDS, Modulation, Wireless networks
Fundamental Principles of Safety Relevant System Design
Fail-safe technique, safety relevant electronic system design, quiescient current principle, redundant system design, watch dog function, diversity, tolerance zone management, fail-safe comparator, safety relevant microcomputer system SIMIS.
Fuzzy c-Means Clustering Designed FLC for Air-Conditioning System
Fuzzy logic controller, Fuzzy c-means clustering, Air conditioning system.
Fuzzy Logic Based Yaw Steering of a Micro-satellite in a Low Earth Orbit to Compensate for Earth Rotation Effect
Micro-satellite. Attitude Control, Fuzzy Logic, Remote Sensing.
Generating and Testing Halftoning Filters Co-Evolutionarily
Co-evolution, Digital halftoning, Genetic algorithms, Software testing, Test image generation
Genetic Algorithm Utilization of Timing Attack Prospect for RSA Cryptoanalyst.
Cryptography, cryptanalysis, genetic algorithms, timing attacks, RSA, key search.
Genetic-Algorithms-Based Fuzzy Call Admission Control for CDMA Cellular Systems
call admission control, Code Division Multiple Access, fuzzy logic control, genetic algorithms
Glosim: Global System Image for Cluster Computing
Cluster, Single System Image, Global Working Process, IPC
GPS Based Azimuth/Gradient Determination for Land Vehicle
GPS, Attitude Determination, interferometry, land vehicle
HDL Synthesis and Simulation of SLMS Adaptive Filter Algorithm for Echo Cancellation of Speech-Band Data Transmission
LMS Adaptive filters, SLMS algorithm, Echo cancellation, HDL Simulation, High speed architecture, FPGA implementation
high performance adaptive kalman equalizers in dsss receivers to combat worst channel fading and isi
Kalman Equalize Learning Rates Spread Spectrum Bit rate
Hybrid System Modeling Using Impulsive Differential Equations
Hybrid systems, Impulsive differential equations, System theory
Implementation and Comparison of different Algorithms in Path Planning
Motion planning, path planning, trajectory planning, visibility graph approach, frame buffer approach, algorithms.
Improving Communication in e-Commerce Applications
- e-commerce, communication, compression techniques
Incorporating Pattern Prediction Technique for Energy Efficient Filter Cache Design
Cache, Filter-Cache, Energy Efficient Cache, Pattern Prediction, NFPT, Hit-Miss Pattern
Influence of colour spaces on the performance of real time colour set detection in video images
Artificial Neural Networks, Binary Morphological Operations, HSV, RGB, YCbCr, YIQ
Information Retrieval in WPANs by Mobile Agents
Mobile agents, Bluetooth, WPAN, information-retrieval, Aglets, ubiquitous computing
Integrating E-Activities with Wide Area Management Information Systems
mamangement information schemes, e-commerce, distributed systems, middleware
Intelligent Control of Multivariable Process
immune algorithm, pid tuning, multivariable system, autotuning
interactive robot usher architecture organization
Mobile robot, Architecture, Path-tracking, Decision-making, Interactive, AI.
ITEM Lab: structure and research activity in the QoS-aware network
Remote experiences, Metadata, Quality of Service, Standards, Profile.
Lossless Audio Coding Using A Cascaded Rls-Lms Predictor
Audio coding,Lossless coding,Adaptive filter,
management method of transport connection in diameter-based authentication, authorization and accounting system
Diameter-Based AAA, Failover State Machine, Peer State Machine, Transport Management
Mechanical properties of skin in health and disease evaluated by viscoelasticity skin analyzer
Human skin viscoelasticity, Speed of shear vawe propagation, Age-place dependence, Anisotropy, Hydrating creams, Radiation.
medical informatics: intelligent patient monitoring in the OR
medical informatics, patient monitoring, temporal reasoning, theory of evidence
Methodology of development of high-tech profitable Mission Control Center for automatic space vehicles
Modeling, Control operations, Optimization, Methods, Hierarchical systems, spacecraft
Middleware Issues for Mobile Business and Commerce
M-commerce; Middleware; Distributed systems
model based recognition of occluded curved objects
Range image segmentation and representation, Curvature operators, Model-based recognition
Modified VLSI Implementation for Sequential LDPC Decoder
LDPC codes, Sequential architecture, VLSI implementation, PLR algorithm
multi-channel receiver module for IR wireless link
Receiver, Noise figure, Wireless communication, BER, Auto gain Control.
Multi-Dimensional Perfect Sequences
sequence design, perfect sequence, orthogonal transform, spreading spectrum
new image processing techniques based on assessment of image information content
Keywords: pixel information content, image information content, image understanding, image analysis, image segmentation, image description, regions of interest and salient features localization.
nonlinear Filters as Edge Enhancers And their Applications To Wounds
Keywords: Wounds(Injuries), edge detection , EDER, two dimensional distance.
Nonlinear Filters As Edge Enhancers And Their Application To Wounds
Keywords: Wounds (Injuries), edge detection , EDER, two dimensional distance.
On the Evaluation of Recovery Functions in E-commerce Systems
E-commerce, Security evaluation, Electronic document, Cryptographic key, Recovery, Encapsulation
onibell's model of malaria actionMalaria,Menace,Lipophilicity,Baffling,Society
On-Line Robot Navigation in an Unknown TerrainRobotics, Navigation, Simulation
Optical Property profiles of SiO2 films Containing Si Nanocrystals Formed by Si+ Implantation
Si nanocrystal, Depth profile, Optical constant, implantation , Ellipsometry
Optical Remote Sensing of Oil in the Marine Environment
Optical Measurement,Mirine Emvironment,Peak,Planktonic Algae
optimal boundary control of a tracking problem for a parabolic distributed system using hierarchical fuzzy control and evolutionary algorithms
Boundary Optimal Control Hierarchical Fuzzy Control Evolutionary Algorithms Distributed Systems
Optimal Generation of DSP Architectures from Behavioral Description
ASIC Design, DSP Architectures
Optimized MAP turbo decoder for 3rd generation W-CDMA systems
Turbo decoder, MAP algorithm, Low power, Interleaver, SISO, ACS
Optimizing the Design of IIR Filter via Genetic Algorithm
IIR filter, Genetic algorithms, Mixed-criterion, H2 norm, ∞ norm, GA filter
PanoVi: A muliti-camera panoramic movie system by using client-side image mosaicking
Panorama movie, Image Mosaicking, Texture Mapping, DirectX, Virtual Reality
Parameter Tuning of PID Controller Using Immune Algorithm and Reference Model
immune algorithm, pid tuning, fuzzy system, autotuning
Parameter Tuning of PID Controller Using Immune Algorithm and Reference Model
immune algorithm, pid tuning, fuzzy system, autotuning
Parameter Tuning of PID Controller Using Immune Algorithm and Reference Model
immune algorithm, pid tuning, fuzzy system, autotuning
Peculiarities of spacecraft “Ocean-O” control in geomagnetic storms
Control, Spacecraft, Modeling, Geomagnetic storms, Aerodynamic moment, Solar Array.
Peculiarities of spacecraft “Ocean-O” control in geomagnetic storms
Control, Spacecraft, Modeling, Geomagnetic storms, Aerodynamic moment, Solar Array.
personal identification using fingerprint verification technique
fingerprint, minutiae,bifurcations,biometrics,
personal identification using fingerprint verification technique
Fingerprints, Minutiae, Matching, Ridges,Identification
point averaging of the position components with using of fuzzy system, before and after s/a is turned off
Point averaging - Low cost GPS receiver - Fuzzy system - S/A error
Point Target Detection using Wavelet in InfraRed image sequence
Wavelet,Temporal Multiscale Decomposition, Signal to Clutter plus Noise Ratio (SCNR)
Portuguese E-Parliament System as a Case Study of the FloWPASS - Framework to Workflow Process Automation Systems
E-Parliament, XML, Workflow Systems, WPA, TEXTML Server, Web-Services, .NET Framework
power conversion efficiency of airborne parametric array
Parametric Array, Ultrasonic, Audio Beam
Powertrain Hybrid System Optimization Using Dynamic Programming
Nonlinear Hybrid System, Powertrain, Modeling, Control, Dynamic Programming, Optimization
prediction of errors and improvement the position accuracy on low cost gps receiver with adaptive neural networks
Improve the position accuracy - Low cost GPS receiver - Neural network
Protecting Mobile Agents against Malicious Host Attacks
Mobile Agents, Agent Security, Malicious Host, Threat diagnostic tree.
reduction of coding artifacts using recursive line filtering based on a fuzzy model
coding artifacts, post-processing, algorithm, fuzzy logic
relation between video bitrate and frame size in arbitrary downsizing transcoding
Arbitrary downsizing transcoding, bitrate, frame size
Relation Between Video Bitrate And Frame Size In Arbitrary Downsizing Transcoding
Arbitrary downsizing transcoding, Frame size, Bitrate
Reliability of Optical Wireless Links
Optical Wireless Links, Free Space Optics, Atmospheric Transmission Medium
Research on Parallel Computing Model of BSP in the NOWs adapt Environment
BSP model,NOWS,Parallel computing,Cost formula,Accelerated ratio,Linear
Risks, assets and security in view of E-activities design and implementation.H.
Assets, E-activity, Risk Assessment, Security
robust adaptive fuzzy controller design for wing rock syetems
Fuzzy control, Robust control, Adaptive law, Neural network, Limit cycle, Wing rock system
robust output tracking of siso nonlinear systems with partially known uncertainties
Robust output tracking, Uncertain nonlinear systems, Input/output linearization, Lyapunov method
Robust tracking and disturbance rejection in linear hybrid systems
Hybrid systems; Tracking; Disturbance rejection; Robust control; Servomechanism problem; Linear systems.
Rule-Based inspection of wafer surfaceWafer map editor, Rule-based, Dct, ADC, SSA
Sample Size and Optimal AR Order Selection for Natural Signals
AR Modelling, Optimal AR order, AR order criteria, Near optimal AR order, Sample size, Natural signals
Secure Cooperative Software Development for Handwritten Character Recognition
Cooperative software development, Secure development environment, Pattern recognition
secure mobile commerce based on xml security
XML Security, Wireless Devices, Mobile Commerce, Java
security management system for iIntrusion detection
Security Management, Intrusion Detection, Policy, JSP
simplified algorithm of generalized predictive control based on neural networks
Generalized predictive control, Neural-networks, Nonlinear, Real-time
Statistics of feature extraction by topographic independent component analysis from natural images
Independent component analysis, Topography, Natural images, Higher-order statistics
Steps Toward e-governance: Analyzing necisity of e-dentity of citizen in Bangladesh
e-governance, birth registration, social security, Immunization, health , Vital Statistics
Steps Toward e-governance: Analyzing necisity of e-dentity of citizen in Bangladesh
e-governance, birth registration, social security, Immunization, health , Vital Statistics
Study of interface trap generation caused by dynamic Fowler-Nordheim (FN) stress on nMOSFETs
Key-Words: nitrided oxide, dynamic Fowler-Nordheim stress, interface trap generation, DCIV technique, power law behavior.
texture classification using wavelet packets with genetic algorithm as a tool for threshold selection
Wavelet transform, Image texture , Feature extraction, Genetic algorithm, Multi-resolution analysis, Texture classification
the design and analysis of an expansible digital pulse compressor for coherent integration radar in time domain
Pulse Compression, Radar, FIR filter, FFT, DSP
The Efficient Authentication and Key Exchange Protocol suitable for Mobile Environments
Key exchange, Password Authentication
The levels of communication in PLC (Programmable Logic Controller) systems And - where each one is used
Industrial Ethernet, Profibus, AS-interface, Triaxial Networks, twisted-pair network, Optical network
The Multimedia Messaging Center (MMC) – An Innovative Solution to Distance Collaboration and E-Learning
MMC, JoinNet, Encryption, Authentication, QoS, Firewall, Recording, Playback, MCU Relay
The Simplified Action of Intelligent Fuzzy Control For A Multivariable Industrial Process
intelligent control, fuzzy systems, multi-variable system, industrial process, non-linear system, computer applications
Time-Frequency Analysis of Ultrasonic Echo for the Nondestructive Evaluation of Material Damage
Time-Frequency Analysis, Wavelet Transform, Ultrasonic Echo, Attenuation, Velocity
Trusted Authentication between User and System
Authentication, Trusted Path, E-Commerce, Internet server
Unequal Error Protection Codes for Wavelet Image Transmission over W-CDMA, AWGN and Rayleigh Fading Channels.
Unequal error protection codes, Embedded zero-tree wavelet transform, Two dimensional wavelet packet transform, Wide-band code division multiple access, Additive white Gaussian noise, Rayleigh fading channel.
Unequal Loss Protection For Data-Partitioned Mpeg-4 Video Over The Packet Erasure Networks
Video, Transmission, Network, Unequal Error Protection, Forward error correction, MPEG-4
Using speech annotation for home digital image indexing and retrieval
Speech Recognition, Speech Signal Processing, Spoken Document Retrieval, Image Retrieval
Value Chain Formation for e-Learning Outsourcing Services
E-Learning, Chasm crossing, Virtual classroom, Integrated collaboration, Web conferencing
Video Object Segmentation With Robust Reference Frame Generation
Video object segmentation, Change detection, Reference frame, Disoccluded regions, Edge-linking
Video Quality Assessment Using Radial Basis Function Neural Network
visual quality, perceptual metric, radial basis function neural network
video quality evaluation with multiple coding artifacts
Perceptual visual metrics, Subjective tests, Coding artifacts, Human visual system, Blockiness, Edge
Web-based Access Control in E-commerce Networks
Security, E-commerce, Access Control, Authentication
Wireless PKI-based roaming services without the use of WIM, USIM smartcard
Public key infrastructure, Roaming protocol, Smartcard, Certificate, Public key, Secret key
The following papers belong to2002 WSEAS ICAMSL-ICAI-MCBC-MCBEPuerto De La Cruz, Tenerife, Spain, Dec. 19-21, 2002
A Connectionist Model of Partial Tracking in Musical Signals
Connectionist systems, Partial tracking, Music transcription, Neural networks
A Data Mining Approach based on Votes Strategies to Classify Biological Sequences
Classification, Data Mining, Votes Strategies, Biological Sequences, Discriminant Substrings, Primary Structures.
a graph partitioning system for natural unbalanced partitions
Partitioning, Netlist, Network, Metis, Large Scale Computing
A Machine Learning Based Approach for Web Image Classification
Image classification, Machine learning, Analysis of web documents, Bayes classifier, Decision tree
A Mathematical Model of Tissue Replacement During Epidermal Wound Healing
Macrophage-Derived Growth Factor (MDGF), Epidermal Wound Healing, Neovascularization, Angiogenesis
A Multi-window Fractional Evolutionary Spectral Analysis
Time-frequency analysis, Evolutionary spectrum, Fractional Gabor expansion.
A New Mapping Method for Matching Stereo Images
Image processing, Linear stereo vision, Obstacle detection, Real-time processing, Stereo matching
a new multistage search of algebraic celp codebooks based on trellis coding
trellis, algebraic codebook, speech coding, CELP, G.729.
A New Systematic Determination Approach of a Models’ Base For the Representation of Uncertain Systems
Key-Words: - Models’ base, Multimodel, Uncertain Systems, Numerical Data Classification, Kharitonov’s Algebraic Approach.
A Novel Adaptive Algorithm for Fingerprint Segmentation
Fingerprint, Image processing, Segmentation, Support vector machine
A Novel Design of A Generational Garbage Collector
Garbage collection, Generation scavenging, Heap management, Reference Counting
A novel use of residual noise model for the Parallel Model Combination
Parallel Model Combination; Additive noise; Convolutive noise; Residual noise models; Pseudo clean speech models
A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria
myxobacteria, fruiting body, cooperation, cheating mutants, altruism
A Repulsive Clustering Algorithm for Gene Expression Data
Microarray, Gene expression data, Repulsive clustering algorithm
A stock's price volatility model using data from the order book
Volatility, Forecasting, Paris Bourse, Stock's price, Regression, Brownian motion, Order book, Bid, Ask
A Vector-Predictive Multi-Mode Matrix Quantization Approach for Parametric Speech Coding
Vector quantization, Predictive quantization, Multi-mode quantization, Matrix quantization, Index assignment, Speech coding.
Abstract Procedure Description: An Improved Notation for Writing Abstract Test Suites
Protocol testing, Conformance testing, Abstract test suite, Tree and tabular combined notation, TTCN
AMANDA, Array MANagement DAtabase: a tool for the management of microarray experiment dataAMANDA, Array MANagement DAtabase: a tool for the management of microarray experiment data
Bioinformatics, Microarrays, Gene expression, Data management, LIMS, Database
An Option Pricing Framework for Valuation of Football Players
Asset pricing, Geometric brownian motion; Jump-diffusion, Ito's lemma, Poisson process
Analysis of Clock Interconnects at Multi-Ghz Frequencies Incorporating Inductance Effect
Delay model, interconnect inductance, parasitic extraction, RLC, inductance
Application of distributed expert systems to the advanced control of smart houses
Distributed and intelligent control, Artificial intelligence, Expert systems, Home automation, Smart house
Application of the epidemic model to forecast the number of POS in the portuguese banking sector
Point-Of-Sale (POS); Technological Diffusion; Epidemic Model; Portuguese Banking Sector.
Application of uncertain temporal relations algebra to diagnostic problems
Temporal Diagnostics, Temporal Scenario, Temporal Relation, Uncertainty, Probability
Applying Scaled Conjugate Gradient for the Classification of Infant Cry with Neural Networks
Acoustic features, Infant cry, Linear prediction coefficients, Pitch, Artificial neural networks, Scg.
Assessment of Role of Exclusion and Partition in HPLC of Macromolecules by Computer Processing of Experimental Data.
computer aided data processing, high performance liquid chromatography
Automatic chorus segmentation of music documents using self-similarity
Automatic audio segmentation, Self-similarity, Chorus detection, Audio thumbnail
Automatic e-commerce using a mobile agent model
e-commerce, mobile agents, framework, sell, buy, automatic negotiation
Bayesian Metanetworks for Mobile Web Content Personalization
Probabilistic reasoning, Bayesian networks, Profiling, Personalization, Mobile commerce, Location awareness
BezierPkg: An Interactive Tool for Generation of Smooth Surfaces
CAD, CAGD, B\'ezier curves and surfaces, Solid Modeling, Geom view, Visualization
Biology Utilising in Multi-Agent System
Software agents, flexible manufacturing system, scheduling, dominance hierarchies
Block-Oriented-Model in Speech Coding
Block Oriented Model, Nonlinear, Speech Coding
Comparison of audio signal codings for Zipf analysis
Medical audio signal codings, Zipf law, Inverse Zipf law, clustering methods
Complex activity and stochastic resonance in the hippocampus
Hippocampus, Network model, Chaos, Complex activity, Stochastic resonance, Memory recall
Computer Models of Sympatric and Allopatric Speciation
Computer Modeling, Evolution, Speciation, Sympatric, Allopatric
Control of a Car-Like Vehicle with a Reference Model and Particularization
Kinematic Control, Wheeled Mobile Robots, Line Tracking
cost-effective migration to all-ip third-generation wireless communications infrastructure
All-ip 3g, Wireless multimedia, Cdma2000 1xev-do, Ran,Qos
Data Fusion. Properties of Common Documents Distributions
metasearch, data fusion, overlap
Decision Fuzzy Making Methodology for Apllication on Productive Chain
Heuristic Planning, Modelling, Simulation, Decision Net, Fuzzy Set
Defining Producer's and Consumers's Risk: Classical, Average, and Posterior Risk
Producer’s Risk, Consumer’s Risk, Posterior Risk, Bayesian Risk, Uniform Distribution, Triangular Distribution, Beta Distribution
Design Of Acoustical Spatialisation In Peculiar Italian Theatres
Acoustical design, Spatialisation, Sound quality, Measurements, Simulation
Determination of Sound Source Obstruction in Virtual Scenes
Interactive Virtual Scenes, Sound Source Obstruction, Hardware Accelerated Processing
Developing and Realization of Computer-Aided Pricing System Providing Efficient Price Management for Russian Enterprises
Price, Computer-Aided System, Price Management, Sale Cannels, Consumer Parameters, Maneuverability of Price.
Development of Intelligent Techniques for Distribution Systems Reconfiguration
Operation, Systems Recovering, Decision Support, Specialist Systems, Intelligent Systems.
Digital Library Middleware Web Services: Module to Access a Z39.50 based Virtual Union Catalogue
Web Services, Z39.50, bibliographic systems, digital library, middleware
Dynamic neural network modelling of somatosensory pathways relating to feedback control of anaesthesia
Somatosensory pathways,neuronal modelling,anaesthesia,feedback control
Elliptical Fourier Descriptors for shape retrieval in biological images
Elliptic Fourier Analysis, Image retrieval, Pictorial database, Features extraction, Freeman encode.
Emotion Recognition in spontaneous emotional utterances from Movie Sequences
Emotion Recognition, Bayesian classifier, Radial basis functions, Formant bandwidth
Enhanced Best Effort QoS Routing with Multiple Prioritised Metrics Using the Analytic Hierarchy Process (AHP) Concept
QoS routing, Best effort, Routing algorithms, Multiple prioritised metrics, Internet, Communication networks, Analytic hierarchy process (AHP), EBQRMPM, EBQRMM.
Enhancing News Reading Experience through Personalization of Content and Services Using Intelligent Agents
Intelligent Agent, J2EE, Personalized News, Smart Downloader, News Tracking, News Summary
Experiments with Cellular Automata in Traffic Modeling
traffic simulation, cellular automata, self organization
extracting of specific knowledge through rbf-fuzzy networks and genetic algorithms
Fuzzy logic, Neural networks, Genetic algorithms, Neuro-fuzzy models, Radial basis functions, Supervised learning algorithm
Facial Features Tracking applied to Drivers Drowsiness Detection
Facial Features Tracking, Driver Drowsiness, Colour Segmentation, 3D Recover, Eye Blinking
Fault-Tolerant Ethernet for Process, Machinery and Drives
Fault-Tolerant Ethernet, process control, redundancy, control network
FPGA Realization of Fuzzy Based Subway Train Braking System
VHDL, FPGA, Fuzzy logic, Fuzzy controller, Braking system
Fuzzy average to estimate a situation of a complex system of bioavailability
Nonheme-iron availability, Calcium, Ascorbic acid, Fuzzy sets
Fuzzy Control in Multi-Component Energetic Systems
fuzzy control, energetic systems, complex systems, hierarchical fuzzy model
Hardware Architectures for Mobile Robots
Hardware Architectures, Mobile Robots, CAN field bus, RT O.S.
Harmonic response of wind instruments via BEM
Woodwinds Physical models Bem Input impedance Radiation
html page transcoding technique for mobile devices
Html page, Document transcoding, Hand-held devices, Mobile web
Human Behaviour Modelled as a Statistico-Deterministic State Machine: Proof by Induction of the Absence of 'Free Will' and Consideration of Some Implications for the Justice
Turing machine, Behaviour, determinism, Free will, Nerve synapse,Criminal justice
Hybrid Fuzzy Model Reference Learning Control for Missile Autopilot Design
Fuzzy logic, Adaptive fuzzy, Neural networks, Missile control
hybrid mobile security protocol: formal verification using a new modal logic
Formal methods,Verification logic,Hybrid security protocol,3G mobile
Immigration in the context of Strategy: Some outcomes from the case of Israel.
Migration Strategy Geography Demography Israel Palestine
Improving the Interleaved Signature Instruction Stream Technique
Error detection, Embedded signature monitoring, Reliability, Fault-tolerance, Microprocessors
incremental hough transform: an improvement algorithm for digital devices implementation.
Hough transform, Incremental Hough transform, straight-line segment extraction, FPGA.
Individual-based simulations of the War of Attrition
game theory, animal contests, war of attrition, evolutionarily stable strategy, simulations
influence of directivity in the evaluation of sound quality in theatres
Room acoustics, Auralization, Baloons, Directivity, Sound quality
Instantaneous Frequency Estimation Using a Least Squares Time-Frequency Method
Signal processing, Instantaneous frequency, Time-frequency analysis, Evolutionary spectrum.
Intelligent Agents in Bioinformatics
Intelligent Agents, bioinformatics, Multi-Agent, Drug Discovery
Intelligent System for Trucks Move to Attend the Distribution Network
Operation, Trucks Move, Support to Technical Decisions for Heuristic Search, Intelligent Systems.
ip-based wcdma solution for advanced wireless services provision
3G, all-IP WCDMA, UMTS, RAN, QoS, OSS, Wireless Multimedia, Mobile Internet
Least Squares Multi-window Evolutionary Spectral Estimation
Time-frequency signal analysis, Evolutionary spectrum, Multi-window Gabor expansion.
low delay 16 kb/s wideband speech coder with fast search methods
Low Delay CELP, G728, Backward LPC analysis, Algebraic Codebook
LP-based Graphical Visualisation of the Vocal Tract
Speech Processing, Speech Production Model, Linear Prediction, Vocal Tract Model
LP-based Graphical Visualisation of the Vocal Tract
Speech Processing, Speech Production Model, Linear Prediction, Vocal Tract Model
Making Interactive Electroacoustic Music with Computer through the Use of RTMix -- a Real-Time Interactive Electroacoustic Music Performance, Composition, and Coaching Interface
Computer, Music, Interactive, RTMix, Linux, Electroacoustic, Open-source, Art, Computer-aided.
Managing total security services
Total security, Security market, Threat scenario, Security operation, Threat model
Mathematical Models of Acid-Mediated Tumor Invasion
Mathematical Models, Tumor Invasion, Glycolytic Phenotype
Matlab Knowledge-Based Expert System for Voltage Control in an Interconnected Power Network
Expert System, Knowledge-Based, Power System, Voltage Control, Reactive Power, Matlab.
Methods for parallel simulations of surface reactions
Simulation methods, Large scale simulations, Parallelism, Dynamic Monte Carlo, Cellular Automaton, Modeling surface reactions
Mining SNP associated with disease to annotate non-documented transcription factor binding sites localizable at the related genes
Genome annotation, Orthologous, Paralogous, Pseudo genes, Transcription factor binding site, SNP
Mining SNP associated with disease to annotate non-documented transcription factor binding sites localizable at the related genes
Genome annotation, Orthologous, Paralogous, Pseudo genes, Transcription factor binding site, SNP
Modeling stock price volatility using data from the order book
Volatility, Forecasting, Order book, Geometric Brownian motion, Price vector
Modelling vaccine effects on HIV-1 viral dynamics
Mathematical models, integro-differential equations, HIV-1 vaccine, virus progression, time delays, CTL, eradication
Multilevel Rendering of Document Images
Multilevel rendering, color dropout, adaptive thresholding
Multi-Ranking Method for Fuzzy FMEA
FMEA, linguistic ranking, fuzzy logic, fuzzy numbers, risk priority number
Music Content Description Schemes and the MPEG-7 Standard
music description, MPEG-7, standard, melody, rhythm, instrument.
Noise-induced synchronization and coherence resonance of homoclinic chaos
Synchronization, Noise, Homoclinic chaos
nonlinear analysis of brain activity in cirrhotic patients
Nonlinear analysis, Surrogate series, Slope asymmetry, Hepatic encephalopathy
nonlinear analysis of sleep stages using detrended fluctuation analysis: normal vs. sleep apnea
Detrended-fluctuation-analysis (DFA); Electroencephalogram (EEG); Sleep apnea; Scaling exponents; Non-linear dynamics
nonlinear discontinuous attitude control of an underactuated satellite using two wheels
Underactuated, Brockett integrator, Discontinuous control, 3-axis stabilization, Reaction wheel, Satellite.
Nonlinear Feedback Control of a Dynamical Model of HIV-1
Nonlinear feedback control, HIV-1 infection, antiretroviral therapy.
NONLINEAR FILTERS AS EDGE ENHANCERS AND THEIR APPLICATION TO WOUNDS
Keywords: Wounds (Injuries), edge detection , EDER, two dimensional distanceKeywords: Wounds (Injuries), edge detection , EDER, two dimensional distance
novel wavelet based speech enhancement technique
Speech Enhancement, Wavelet Transform, Spectral Subtraction, Wiener Filter
On the computation of macroeconomic dynamic equilibrium via wavelets
Dynamic equilibrium, Galerkin methods, Collocation methods, Wavelets.
On the weak and numerical solutions of the forward problem in EEG
Bioelectric Potentials, Boundary Element Method, Forward Model, Spherical Head Model
Operational Risk Management Expert System
Decision support systems, Expert systems, Fuzzy logic, Knowledge-based systems, Operational risk, Risk management
Optimal multidrug chemotherapy taking into account drug resistance stemming from gene amplification
Infinite dimensional systems, Optimal control, Biomedical modeling
Output-Based Objective Speech Quality Measure
Speech Processing, Speech Quality, Objective Quality Measure, Self-Organizing Map
Performance analysis of the static use of locking caches
real-time systems, cache memories, locking cache, schedulability analysis, performance
pitch detection of musical sounds noticing minimum output of parallel connected comb filters
Transcription, Comb filter, Parallel connected comb filters, Minimum output
Pitch Estimation of Song Sounds Using Parallel-Connected Comb Filters and Singular Value Decomposition
Musical transcription, Pitch estimation, Comb filters, Singular value decomposition
Planning And Creativity Within A Poetic Path: Music
Musical composition, Engineering and Music, Europe Piano Concerto.
Power Systems Contingency Analysis Software for Education, Research, and Training
- Power Systems, Contingency, Planning, Software, Education.
Predicting the Stock Market Using Clementine
Stock Market, Prediction, KDD, Data Mining
Prediction of epileptic seizure onset
Intracranial EEG, Epilepsy, Wavelet Analysis, Epileptic seizure, Prediction
Prediction of hematocrit time evolution
Long range dependence, fARIMA models, blood elements, prediction
Prediction of Malignant Melanoma Incidence
Epidemiology, Melanoma, Modelling, Regression, Prediction, Incidence, Statistics.
Projective and affine spatial operators for regions
Projective space, Affine space, Invariants, Spatial operators, Geographic information systems
Protein docking by exhaustive search
protein-protein complexes, docking prediction, sampling rigid motions
Pseudo-Articulatory Basis in Speech Recognition
Pseudo-articulatory representations (PARs), Hidden Markov models (HMMs), Resynthesis, Phonotactic, Sonority
Quality of Service and High Availability in Corporation-Wide Control Networks
Multiprotocol Label Switching (MPLS), Fault-Tolerant Ethernet (FTE), process control, traffic engineering, wide-area networks (WAN)
query processing in an object data model with dynamic roles
Object-orientation, Dynamic object roles, Conceptual modeling, Databases
Recognition of greek sign language using geometrical properties of alphabet letters and Hidden Markov Models
Hidden Markov Models, sign language, sign language recognition, gesture recognition.
reduced complexity and high quality 8 kb/s cs-acelp speech codec
Speech processing,AbS coding,CELP-based coder,CS-ACELP algorithm,DCR test
Reengineering UMAS Knowledge Acquisition for Controlling Network Resources
Intelligent Agents, Knowledge Engineering, Neuro Fuzzy Logic
Robust Underwater Imaging with Fast Broadband Incoherent Synthetic Aperture Sonar
Incoherent Synthetic Aperture Sonar, Robust Acoustic Imaging, Array Signal Processing.
Sinusoid Modeling and Noise-excited LPC Reconstruction of Speech Synthesis
speech, Analysis, synthesis, sinusoidal model LPC model
Speaker Indexing in a noisy environment. -Investigation of 3 types of noise-
Speaker tracking, Speaker indexing, corrupted speech
Special Correlation of Dinucleotide Repeats in Human chromosome 21
Microsatellite, Dinucleotide, human, Chromosome 21, Correlation
Speech Coding Parameters and Their Influence on Speech Recognition
speech recognition; speech coding; quality evaluation; SNR; codec
Spike detection using wavelets
wavelet, spike, electroencephalogram, multiresolution analysis, epileptic patients.
Strategic analysis of market segments through self-organizing ANNs considering multiple attributes
Strategic analysis, competitiveness, marketing, clients’ clustering, 2-tuple models, fuzzy linguistic representation, Kohonen’s self-organizing maps, fuzzy operators, multi-expert decision making.
Studies in the Statistical Modelling of Dialogue Turn Pairs in the British Nationa Corpus
Statistical language modelling, Dialogue, British National Corpus (BNC)
Study comparative between the algorithms of Monsen and Hallberg
Bioavailability of iron, Preschool, Dietary inquiry
Symbolic and Fractal Methods in Exploration of Sleep Dynamics
Fractal Dimension, Symbolic Dynamics, Waveform, Time Series, EEG, Sleep, Hypnogram
The Lomborg Debate and the Nature of Science Education
Scientific Method, Rhetorical Argumentation, Critical Thinking, Global Environment, Statistics, Economics, Engineering, Sustainable Development, Lomborg.
The Performance And Throughput Of OPC With Cryptography
Cryptography, Security, OPC, IDEA, COM, DCOM, Automation Interfaces
Thermal Inactivation Parameters for cod pepsin, cod pepsinogen and porcine pepsin
pepsin, pepsinogen, inactivation, rate constant, porcine, activation free energy, activation enthalpy, activation entropy, cod
time delay estimation and adaptive frame length iterations for noise robust pitch extraction
Pitch Detection, Noise Robustness, Time Delay Estimation
Tragedies or Statistics: When a Warless Society Goes to War
War, Civil Military Relations, Warless Society, Canada
Transport Process Automation with Industrial Forklifts
Transport Process, Industrial Forklift, Hardware and Control Architectures, Teleoperation
Two-dimensional replacement-repair warranty policyWarranty, Fail, Repair, Replace, Maintenance
UMAS Learning Requirement for Controlling Network Resources
Intelligent Agents, Knowledge Engineering, Neuro Fuzzy Logic
Using the MPEG-7 Standard for the Description of Musical Content
Music Description, MPEG-7, Music Content Analysis, Melody, Rhythm, Instrument.
Valence topological charge-transfer indices for dipole moments
Dipole moment, Molecular charge distribution, Transdermal drug delivery
Visually augmented POMDP for indoor robot navigation
Robot localization, Partially Observable Markov Decision Processes, Topological maps, Natural landmarks and Artificial vision.
XML Proxy to Access Z39.50/MARC Capable Systems
Z39.50 protocol, XML, MARC, gateway, proxy, digital library
The following papers belong to2002 WSEAS MMACTEE-WAMUS-NOLASC,Vouliagmeni, Athens, Greece, Dec. 29-31, 2002
1/f noise of digitally-disordered Davydov beta kinks
1/f noise, solitons, multifractals, biological systems
a novel method for radar pulse tracking using neural networks
Pulse, Tracking, Pri, Dynamic structure, Neural network
A Recovery Technique of Agents in Multi-Agent Based Fault-Tolerant Systems
fault-tolerance, distributed computing system, multi-agent system
An Alternative Formulation and New Algorithms for Computation of the Design and Performance of Switched Reluctance Motors.
Keywords: Switched Reluctance Motors, Mathematical modeling, Non-linear systems, Design.
Application of a parametric robust control to the stabilization of an electric power generator
Quadratic stabilization; Optimisation Hinf; Uncertain system;Riccati equation
Application Of The Wavelet Bases In 2d Or 3d Scattering Problems By Bodies And Screens
Haar’s wavelets functions , linear Battle-Lemarie wavelets functions ,scattering problems
Class numbers in the imaginary quadratic field and the 1/f noise of an electron gas
Electronic circuits, number theory, quantum statistical mechanics, 1/f noise
Comparative Study Between Known and Novel attitude controllers for an underactuated satellite
Underactuated, Time varying, Discontinuous control, 3-axis stabilization, Reaction wheel, Satellite.
computation of structural decomposition for linear singular systems
Computation; MATLAB programs; Singular systems; Structure decomposition; Structure properties
Computing of temperature field created by alternating cuurent in finite cylinder
Alternating current, Finite cylinder, Temperature field, Finite difference method, Incompressible liquid
Correlation Properties Of Binary Sequences Generated By The Logistic Map-Application To DS-CDMA
Correlation properties, Kneading sequences, DS-CDMA, Spreading sequences.
Crosstalk Identification and Modified Crosstalk Model
xDSL, Crosstalk Model, Crosstalk Identification, Multiple Linear Regression
DC harmonic distortion minimization in series connected converters with AC filters under unbalanced power supply
Harmonics,Overlap angles,minimization,Firing angles,Commutation impedances
Development of Intelligent Techniques for Distribution Systems Reconfiguration
Operation, Systems Recovering, Decision Support, Specialist Systems, Intelligent Systems.
Dynamic Economic Load dispatch-An Efficient Quadratic Programming Based Approach
Dynamic Economic Load dispatch (DELD), Transformation of variables technique, quadratic programming.
Experimental and numerical simulations of impacts in vibrations of slender systems
Experiment, Forces, Impact, Numerical simulation
Fractal dimension of transdermal-delivery drug models
Fractal dimension, Percutaneous absorption, Percutaneous enhancer, Transdermal drug delivery, 4-Alkylaniline
Horseshoes as Projective Limits
complex analytic dynamical systems, Henon mappings, horseshoe mappings, projective limits
Intelligent Agents Embedded with Computational Techniques for Power Systems
Intelligent Agents, Computational Techniques, Gas Insulated Substations
Job Grouping with Minimum Setup in PCB assembly
Job grouping, Mimimum feeder setup, Flexible manufacturing, Printed circuit board, Setup strategy, Heuristics
Lagrange Multipliers and Other Sensitivity Indices Applied to Voltage Collapse Analysis
Sensitivity analysis, Voltage collapse analysis, Lagrange multipliers
mathematical modeling of crude oil flow meter based on passive fiber optic components
Flow meter, Optical flow sensor, Optical sensors, Fiber optic sensors, Fiber bragg gratings, Crude oil metering, High accuracy flow instruments, Fiber bragg grating, Flow sensor
mathematical modeling of olfactory sensor based on passive fiber optic components
Olfactory, Optical Sensor, Artificial Nose, Fiber Optic Sensors, Fiber bragg gratings, Sensor arrays, Smell detector, Chemical sensor, Optical nose.
Means of Certification of Transducers in Mass Production
sensor, transducers, certification, spectral analysys
Methodology of development of high-tech profitable Mission Control Center for automatic space vehicles
Modeling, Control operations, Optimization, Methods, Hierarchical systems, spacecraft
Micro opto-electronic devices for optical cross-connect
Micro opt-electronic, polarization, 2-D optical cross-connect.
MMDS and scattering from multilayer cylindrical structure
the modification of the method discrete sources, multiplayer scattering problems.
Modular forms and Ramanujan sums for the analysis of 1/f noise in electronic circuits
Electronic circuits, number theory, signal processing, 1/f noise
multiphase flow metering technique based on passive fiber optic components for oil producing wells
Multiphase flow meter, Optical flow sensor, Optical sensors, Fiber optic sensors, Fiber bragg gratings, Oil well multiphase metering, Oil well test separator, Multiphase liquid level, Fiber bragg grating flow sensor
Noise reduction of partial discharge signals using linear prediction and wavelet transform
Wavelet transform- linear prediction-detection and location-condition monitoring-partial discharge-cable
Numerical Simulation Of Dielectric Heating In High-Voltage Insulationsn
Coupled Problems; Finite element method
On Local Solvability for Nonlinear Parabolic Equations
Estimates, Solvability, Equations, Parabolicity, Solution, Problem.
On the Cauchy Problem for Higher Order Parabolic Equations
estimates,solvability,equations,parabolicity, anisotropic
on the linear quadratic minimum-fuel problem
Minimum-Fuel Hamilton-Jacobi-Bellman Riccati Dc motor Programming Problem
Parsing Spice Netlists Using a Typed Functional Language
Spice Netlist, Parsing, Scanning, Functional Language
Peculiarities of spacecraft “Ocean-O” control in geomagnetic storms
Control, Spacecraft, Modeling, Geomagnetic storms, Aerodynamic moment, Solar Array.
Processing of short reactions with proportional weighting.
sensor, transducers, certification, spectral analysys
Radon Measure Model For Edge Detection Using Rotational Wavelet
edge detection, wavelet, Dirac function, Radon measure
relationship between delay and system contents in multiserver queues with geometric service times
Discrete-time queueing, Multiserver system, Geometric service times, Analytical techniques, Generating functions
Robust Multi-GHz Electromagnetic Analysis of High-Speed Interconnects and Integrated Passives
Integral equation solvers, Broadband electromagnetic modeling, High-speed interconnects, Integrated passives
Rota meets Ramanujan: probabilistic interpretation of Ramanujan-Fourier series
Number theory, probability, Fourier series, Ramanujan sums
Self-Organization of Fluidice Matrix
:-digital, neural, transduction, geomancy, hypnosis, torsion, bioplasma, fluidice, esp/pk. fuzzy logic.
Some Peculiarities Of Operative “Okean-O” Control
Control, Spacecraft, Modeling, Geomagnetic storms, Aerodynamic moment, Solar Array.
Teaching Graphic in Mathematics Paper to be send later
Some properties of Boolean functions and design of cryptographically strong balanced Boolean functions
Boolean function, total and conditional entropy (of function), balancedness, non-linearity
the continuous-time hinf model matching problem with the two degrees of freedom static output feedback via lmi optimization
Model Matching Problem, Linear Matrix Inequalities, Hinf Optimal Control Problem, Two Degrees of Freedom Static Output Feedback
the discrete-time hinf model matching problem with the one degree of freedom static output feedback
Model Matching Problem, Linear Matrix Inequalities, Hinf Optimal Control Problem, One Degree of Freedom Static Output Feedback
The scale free intrnsic time, prime number distribution and the 1/f noise
1/f noise, number theory, differential equations
Water Purificatiopn System
Uncertainty And Sensitivity Analysis For The Safety Assessment
Uncertainty, sensitivity, wavelet, repository, Monte CarloGood to drink better water
Wavelet-based Solution to Time-Dependent Non-Linear Two-Point Initial Boudnary value Problems with Non-Periodic Boundary Conditions Involving Composite Media
Wavelets, Multiresoltion, galerkin Method, Connection Coefficients, Difference Formulation, Composite Media
Wavelets for Elliptical Waveguide Problems
Wavelets, Elliptic cylinder, Waveguide, Mathieu wavelets
Working Out Of Spectral Analysis
sensor, transducers, certification, spectral analysys
Abstract Keywords Pages Paper Number
6 454-109
8 454-184
6 454-176
5 454-118
9 454-183
8 454-184
In this paper, we present a learning algorithm used to implement associative memories on BSB-type neural networks with bipolar states. Both learning and recall can be implemented by parallel computation, with time saving. The learning algorithm, used to s
BSB Neural Networks, Associative Memories, Learning
In this paper, we apply a modified version of Context Based Emotional Temporal Difference Learning (CBETDL) to heating, ventilating and air conditioning (HVAC) control problem whose multivariable,
HVAC-Emotional Learning-Context
A procedure is proposed for molecular classification. It uses a similarity matrix based on the graphs generated by each molecule. This procedure is applied to the classification of five aliphatic alcohols. The similarity index results from dividing this n
Multilayer perceptron, Feedforward backpropagation, Cluster analysis, Split decomposition, Molecular classification
This paper presents character segmentation scheme using heuristic method based on distinctive features. Heuristic method is used for classifying the line edge pattern of connected Thai characters. Moreover, this method is also used for reduction of proces
Segmentation,Thai,Handwritten,Heuristic,Connected
In this paper we apply a modified version of context based brain emotionallearning (CBBEL) to Switched Reluctance Motor (SRM). Our proposed solution, which is biologically motivated, can achieve very robust and satisfactory performance. The results show s
Switch Reluctance-Emotional Learning-Speed Control
In this paper, we apply a modified version of Context Based Emotional Temporal Difference Learning (CBETDL) to heating, ventilating and air conditioning (HVAC) control problem whose multivariable, nonlinear and non minimum phase nature make the task very
HVAC-Emotional Learning-Context
8 454-185
8 454-186
4 454-187
7 454-182
9 454-183
4 454-108
In this paper, we apply a modified version of Context Based Emotional Temporal Difference Learning (CBETDL) to heating, ventilating and air conditioning (HVAC) control problem whose multivariable, nonlinear and non minimum phase nature make the task very
HVAC-Emotional Learning-Context
In this paper, we apply a modified version of Context Based Emotional Temporal Difference Learning (CBETDL) to heating, ventilating and air conditioning (HVAC) control problem whose multivariable, nonlinear and non minimum phase nature make the task very
HVAC-Emotional Learning-Context
The paper presents the application of self-organization neural networks for the prediction of breakdown voltage in a point-barrier-plane air gap.
self-organization Map, neural networks, breakdown voltage, point-barrier-plane air gap
This paper describes a new approach to short-term load prediction in electric power systems. The approach is based on application of a chaotic time series and artificial neural network. The daily power system peak loads are described by chaotic time serie
Short term load forecasting, Time series, Multiplayer perceptron (MLP), Chaos, Attractor, Lyapunov exponent
In this paper we apply a modified version of context based brain emotionallearning (CBBEL) to Switched Reluctance Motor (SRM). Our proposed solution, which is biologically motivated, can achieve very robust and satisfactory performance. The results show s
Switch Reluctance-Emotional Learning-Speed Control
A novel cellular neural network (CNN) for edge detection in grayscale intensity images is proposed. It is based on space-invariant templates, where only the sign of the input template is allowed to change from cell to cell. When compared with existing cel
Cellular Neural Networks, Edge Detection, Image Processing
5 454-175
9 454-132
6 454-133
6 454-134
5 454-124
Abstract:As a network begins losing nodes or links eventually there is a loss in its effectiveness. Thus, communication network must be constructed to be stable as possible ,not only with respect to the initial disruption, but also with respect to the pos
Combinatorial Optimisation, Graph Theory, Network Connectivity , Network Stability, Communication Networks.
The Internet can provide a powerful and yet economical network environment for information sharing and collaborative computation. Its unpredictable nature, however, has deterred its massive use as the platform for serious timely applications. Meanwhile it
buffer overflow, Internet, adaptive, Neural Network Controller, safety margin D
The purpose of this study was to compare predictive performance of MRA, ANN, and ANFIS for residential housing sales at small to moderate data sample size; and to demonstrate the application of neuro-fuzzy approach for expressing the imprecision in the wa
Pricing Model, Predictive Performance, Multiple Regression Analysis, Artificial Neural Network, Adaptive Neuro-Fuzzy Inference System
We present a new neural model, which extends the classical competitive learning (CL) by performing a Principal Components Analysis (PCA) at each neuron. This model represents an improvement with respect to known local PCA methods, because it is not needed
Principal Components Analysis (PCA), Competitive learning, Unsupervised learning, Dimensionality reduction, Multisensor image processing, Dimensionality estimation
In this paper, calculation of parameters of low-pass ladder networks with mixed lumped and distributed elements by means of artificial neural networks is given. The results of ANN are compared with the values that are desired. It has been observed that th
Lumped and distributed elements, artificial neural networks, back propagation
3 454-144
6 454-145
5 454-123
6 454-114
5 454-143
6 454-158
The backpropagation algorithm can be used to train multilayer networks. Backpropagation is an approximate steepest descent algorithm, in which the performance index is the mean square error. It is realized of a two layer perceptron to approximate any func
Backpropagation, Perceptron, Training set, Weights, Biases, Learning Rate
This paper presents the application of a new version of Fuzzy ARTMAP neural network named ordered fuzzy artmap for evaluating on-line short term load forecasting. Fuzzy ARTMAP can operate in off-line or on-line modes. In the on-line mode, the network must
Power Systems, Load Forecasting, Short Term, Ordered Fuzzy ARTMAP, Neural network
In this paper, calculation of parameters of low-pass ladder networks with mixed lumped and distributed elements by means of artificial neural networks is given. The results of ANN are compared with the values that are desired. It has been observed that th
Lumped and distributed elements, artificial neural networks, back propagation
This paper introduces two Universal Learning Networks (ULNs) based speed control system for a DC motor drive. The Universal Learning Network Identifier (ULNI) is trained off-line using the forward propagation algorithm to emulate the dynamic behavior of a
Universal Learning Networks; Neural Networks; DC Motors; PV Generators; Power Converters
In this paper, calculation of parameters of low-pass ladder networks with mixed lumped and distributed elements by means of artificial neural networks is given. The results of ANN are compared with the values that are desired. It has been observed that th
Lumped and distributed elements, artificial neural networks, back propagation
As reliance on computers and networks increases, so does the need to provide appropriate security measures. One component of network security is the use of intrusion detection systems. These systems monitor the network in order to detect misuse or anomalo
Intrusion detection, Misuse detection, Anomaly detection, Evolving connectionist systems
6 454-122
4 454-120
6 454-149
6 454-151
6 454-152
8 454-101
RetinotopicNET is an efficient simulator for neural networks with retinotopic-like receptive fields. The system has two main characteristics: it is event-driven and it takes advantage of the retinotopic arrangement in the receptive fields. The dynamics of
Neural simulator; Retinotopy; Receptive fields; Event-driven; Spikes
This paper presents a non supervised neural method in order to construct the lithologic facies of the wells RHA6 and RHA8 situated in the south of Algeria (Sahara). Our objective is to facilitate the expert work in geological domain and to permit them to
Lithologic facies, Well log's data, Non supervised neural method, Self organised map, Classification
A procedure is proposed for molecular classification. It uses a similarity matrix based on the graphs generated by each molecule. This procedure is applied to the classification of five aliphatic alcohols. The similarity index results from dividing this
Multilayer perceptron, Feedforward backpropagation, Cluster analysis, Split decomposition, Molecular classification
When training simple sigmoidal feed-forward neural networks on binary mappings using gradient descent algorithms with a sum-squared-error cost function, the learning algorithm often gets stuck with some outputs totally wrong. This is because the weight u
Learning, Gradient descent, Evolution, Binary mappings, Sigmoid prime offsets, Target offsets.
In the paper using of the artificial neural networks for determination of coefficients of state equations of shipΤs motion in a horizontal plane and influence of neuronΤs activation function for quality of shipΤs motion modelling is presented. The recurre
Ship, Neural networks, Modelling, Identification.
Neural Networks and Fuzzy Inference Systems are becoming well-recognized tools of designing a controller capable of perceiving the operating environment and imitating a human operator with high performance. The motivation behind the use of neuro-fuzzy app
Artificial Neural Networks, Fuzzy Inference Systems and Neuro-fuzzy Control Architectures
7 454-182
5 454-142
8 454-222
5 454-225
5 454-226
5 454-227
This paper describes a new approach to short-term load prediction in electric power systems. The approach is based on application of a chaotic time series and artificial neural network. The daily power system peak loads are described by chaotic time serie
Short term load forecasting, Time series, Multiplayer perceptron (MLP), Chaos, Attractor, Lyapunov exponent
In this paper, calculation of parameters of low-pass ladder networks with mixed lumped and distributed elements by means of artificial neural networks is given. The results of ANN are compared with the values that are desired. It has been observed that th
Lumped and distributed elements, artificial neural networks, back propagation
Abstract. This paper presents a new method to analyse neural networks so as to achieve close into their internal functionality. To this purpose, a new training sets consisting of a limited number of noisy edge patterns is proposed to analyse the problem o
Edge detection, additive noise, generalization, neural networks, digital image processing.
In this paper, a hybrid model is introduced which combines a linear regression model in parallel with a nonlinear regression model such as the Modified Probabilistic Neural Network (MPNN). In this hybrid model, the linear regression model provides a reaso
Image modeling, Artificial neural network, statistical image modeling, hyperspace modeling
In this paper, a hybrid model is introduced which combines a linear regression model in parallel with a nonlinear regression model such as the Modified Probabilistic Neural Network (MPNN). In this hybrid model, the linear regression model provides a reaso
Image modeling, Artificial neural network, statistical image modeling, hyperspace modeling
In this paper, a hybrid model is introduced which combines a linear regression model in parallel with a nonlinear regression model such as the Modified Probabilistic Neural Network (MPNN). In this hybrid model, the linear regression model provides a reaso
Image modeling, Artificial neural network, statistical image modeling, hyperspace modeling
8 454-185
7 454-228
5 454-102
6 454-232
9 454-214
In this paper, we apply a modified version of Context Based Emotional Temporal Difference Learning (CBETDL) to heating, ventilating and air conditioning (HVAC) control problem whose multivariable, nonlinear and non minimum phase nature make the task very
HVAC-Emotional Learning-Context
This paper proposes the use of neural networks as a tool for studying navigation within virtual worlds. Results indicate that the network learned to predict the next step for a given trajectory. The analysis of hidden layer shows that the network was able
Neural network, Spatial cognition, Virtual environment
The scale independence in visual recognition tasks is still one big problem in neurocomputing today. This paper presents a method of obtaining scale independence in a purely feed-forward way, being able to account for ultra-rapid visual categorization. I
Scale independence; Rank order coding; Feed-forward; Receptive field;
The human ability to recognize objects; even by observing their crude outlines or edges, has not so far been matched by intelligent machines. The superiority of human perception is even more evident when it comes to recognizing faces. Face recognition has
Keywords: Image Processing, Segmentation, Face Recognition, Neural Networks, Back Propagation Model.
COGS, University of Sussex, Brighton BN1 9QH, UK
UNITED KINGDOM
The most important issue in Information Retrieval systems is the representation of the information that the documents and/or queries withhold. A new architecture for classification systems is introduced trying to improve the discrimination capacity of the
Information Retrieval, Classification, Self-Organizing Maps, Alignment, Name Entities
5 454-224
8 454-213
4 454-211
5 454-103
8 454-186
In visual surveillance applications, automated detection of suspicious user behavior is of great practical interest. Correct detection of suspicious human behavior is usually difficult due to randomness in human movements. In this paper Neural Network (NN
Artificial neural network, Modified Probabilistic Neural Network, Automated visual surveillance, Human activity recognition, Clustering, Self organising map
This study introduces a new approach on automatic tropical cyclone (TC) detection in satellite images. Traditional TC identification is highly dependent on human subjective justification on vast supply of information. In the proposed system, it automates
Tropical cyclone identification Wavelet analysis Neural ntwork Genetic algorithm Image acquisition system Signal processing Weather forecast
The paper presents the application of self-organization neural networks for the prediction of breakdown voltage in a point-barrier-plane air gap.
neural networks, self-organization map, breakdown voltage prediction, poit-barrier-plane
The scale independence in visual recognition tasks is still one big problem in neurocomputing today. This paper presents a method of obtaining scale independence in a purely feed-forward way, being able to account for ultra-rapid visual categorization. I
Scale independence; Rank order coding; Feed-forward; Receptive field;
In this paper, we apply a modified version of Context Based Emotional Temporal Difference Learning (CBETDL) to heating, ventilating and air conditioning (HVAC) control problem whose multivariable, nonlinear and non minimum phase nature make the task very
HVAC-Emotional Learning-Context
4 454-187
6 454-208
3 454-233
8 454-207
3 454-234
6 454-105
5 454-104
The paper presents the application of self-organization neural networks for the prediction of breakdown voltage in a point-barrier-plane air gap.
self-organization Map, neural networks, breakdown voltage, point-barrier-plane air gap
Abstract: - A general-purpose procedure for scaling engineering drawings, suitable for video and fixed-grid low-resolution presentation media, is described in this paper. The proposed method is based on the separate processing of scaleable (layout) and no
Drawing, Wavelet, Neural, Symbol, Clustering
In this paper, a Cellular Neural Network for an Associative Memory able to detect discrete-time sinusoidal signals is designed by considering a consolidated synthesis technique. An effective robustness analysis of the synthesized cellular associative memo
Cellular Neural Networks, Signal Recognition, Associative Memories
How natural systems function and organize themselves is a very attractive and challenging problem. This problem is extremely complex studying living organisms involving a great number of biomacromolecules and cells performing a very specific role in organ
adaptive systems, neural flows, Lyapunov function, Gradient flow
In this paper, a Cellular Neural Network for an Associative Memory able to detect discrete-time sinusoidal signals is designed by considering a consolidated synthesis technique. An effective robustness analysis of the synthesized cellular associative memo
Cellular Neural Networks, Signal Recognition, Associative Memories
The problem of correctly diagnosing different types of ailments has been tackled with different artificial intelligence techniques since its inception. Both heuristic and statistically based algorithms have been discussed in the past. In this paper we est
Pattern recognition, majority decision, neural networks, multi-layer perceptrons, self-organizing maps.
The scale independence in visual recognition tasks is still one big problem in neurocomputing today. This paper presents a method of obtaining scale independence in a purely feed-forward way, being able to account for ultra-rapid visual categorization. I
Scale independence; Rank order coding; Feed-forward; Receptive field
7 454-129
5 454-131
7 454-141
5 454-138
5 454-146
5 454-137
6 454-125
In this paper, the physical model of semi-active quarter-coach suspension was established based on the theories of resemble and model testing. According to the characteristics of time-varying of parameters and time-delay of the semi-active suspension, On
Physical model,, Fuzzy, GA, EA, Judger, Experiment
Abstract The objective at this paper was to delineate a diagnosis system that translates the interactive effect of the calcium and the ascorbic acid intake on non-heme iron absorption from the meals. It was used the fuzzy arithmetic mean, an extension of
Non-heme iron availability, Calcium, Ascorbic acid, Fuzzy sets
A dynamic scalar-tuning fuzzy control system is proposed. A fuzzy control system with two-input and one-output variables is considered to directly control the plant, and a dynamic scalar-tuning mechanism through a fuzzy inference method is proposed to upd
Fuzzy system; Scaling factor; Genetic Algorithms.
Abstract: We have entered the era of artificial intelligence (AI) revolution (L. A. Zadeh) but still donΤt know what it is exactly. We try to measure the AI value, but donΤt know what and how to measure. Intelligence is a fuzzy term. It is natural to star
Key-Words: artificial intelligence, natural intelligence, fuzziness, definition and knowledge.
In the paper applying of genetic algorithms to designing of a fuzzy autopilot for track-keeping control of underwater vehicles is considered. For the tracking of desired trajectory, the way-point line of sight scheme is incorporated and three independent
Underwater vehicle, Autopilot, Fuzzy logic, Genetic algorithms, Track-keeping control
Abstract: We have entered the era of artificial intelligence (AI) revolution (L. A. Zadeh) but still donΤt know what it is exactly. We try to measure the AI value, but donΤt know what and how to measure. Intelligence is a fuzzy term. It is natural to star
Key-Words: artificial intelligence, natural intelligence, fuzziness, definition and knowledge.
:- Genetic Algorithm (GA) and Singular Value Decomposition (SVD) are deployed for optimal design of both Gaussian membership functions of antecedents and vector of linear coefficients of consequents, respectively, of ANFIS networks which are used for mode
Anfis, Explosive Cutting Process, Genetic Algorithms, SVD
5 454-135
5 454-136
9 454-229
7 454-116
9 454-210
Abstract: - Does the artificial system have intuition? Is it possible to create an artificial system with intuition? What is intuition? Different authors give different answers. This article is a preliminary approach to the problem of the natural intuit
Key-Words: - artificial intelligence association, intuition, intuitive knowledge, motivation, and
Abstract: - Does the artificial system have intuition? Is it possible to create an artificial system with intuition? What is intuition? Different authors give different answers. This article is a preliminary approach to the problem of the natural intuit
Key-Words: - artificial intelligence association, intuition, intuitive knowledge, motivation, and
The aim of this work is to suggest a fuzzy approach for poverty studies and apply this methodology, based on Fuzzy Poverty Index, to calculate those indexes for each municipality of Rio de Janeiro State (Brazil). Also apply several methods of spatial anal
Fuzzy sets, Poverty, Spatial analysis
A dynamic scalar-tuning fuzzy control system is proposed. A fuzzy control system with two-input and one-output variables is considered to directly control the plant, and a dynamic scalar-tuning mechanism through a fuzzy inference method is proposed to upd
Fuzzy system; Scaling factor; Genetic Algorithms
Abstract: - Bounded rationality and satisficing models have shown good performance in reflection of uncertainties and complexities in real world problems of decision making and control. The emotional learning algorithm is such an appropriate method in mul
Emotional Learning, Prediction, Decision Making, Portfolio Selection, Takagi Sugeno FIS, ELFIS
6 454-167
4 454-119
6 454-206
6 454-106
6 454-115
This paper present the comparison of three Neuro-Fuzzy architectures applied for modeling a non-linear real system: Adaptive Neuro Fuzzy Inference System, Artificial Neural Networks Based Fuzzy Inference System and Babuska Neuro Fuzzy Modeling and Identif
Fuzzy Hybrid Systems, Neuro-Fuzzy Modeling Identification, Fuzzy Clustering, Variable Selection, Non-linear Modeling, Time-Delay Systems
Notions of identifiability, controllability and stabilizability play crucial roles in the problems of systems analysis and design. The situation complicates if these concepts should be applied in real world when a system designer is always confronted wit
Fuzzy systems analysis, Identifiability, Stabilizability, Controllability, Reachability
:- In this paper, a hybrid approach using Genetic Algorithm (GA) and Singular Value Decomposition (SVD) is proposed for optimal fuzzy rules selection and also optimal design of both Gaussian membership functions of antecedents and vector of linear coeffic
Anfis, Genetic Algorithms, SVD, shells, orthotropic
The concept of target tracking, a part of Level 1 data fusion, is to combine measures from various sensors to form a coherent picture of the scene. One of the major concerns with this problem is the association of the various measurements with the existi
Fuzzy logic, Data fusion, Data association, Chi-squared metric, Target tracking
Abstract: The purpose of this study was to compare predictive performance of MRA, ANN, and ANFIS models for residential housing sales at small to moderate data sample size; and to demonstrate the application of neuro-fuzzy approach for expressing the impr
Key-Words: Pricing Model, Predictive Performance, Multiple Regression Analysis, Artificial Neural Network, Adaptive Neuro-Fuzzy Inference System.
9 454-164
7 454-117
7 454-219
6 454-107
9 454-221
8 454-202
In this paper, we developed a fuzzy model for an automotive engine. The fuzzy model presented by a set of rules based on the Takagi-Sugeno type. The Gustafson-Kessel (GK) algorithm applied to determine the antecedent membership functions and east-square e
Fuzzy Logic, System Identification, Modeling, Industrial Processes, Nonlinear Systems
A dynamic scalar-tuning fuzzy control system is proposed. A fuzzy control system with two-input and one-output variables is considered to directly control the plant, and a dynamic scalar-tuning mechanism through a fuzzy inference method is proposed to upd
Fuzzy system; Scaling factor; Genetic Algorithms
The purpose of this paper is to establish sufficient conditions for the global asymptotic stabilization of linear time-invariant SISO systems by means of Mamdani type fuzzy logic controllers in the continuous and the discrete cases. The fuzzy controllers
Mamdani type fuzzy logic controllers, linear SISO systems, global asymptotic stability, circle criterion
The concept of target tracking, a part of Level 1 data fusion, is to combine measures from various sensors to form a coherent picture of the scene. One of the major concerns with this problem is the association of the various measurements with the existi
Fuzzy logic, Data fusion, Data association, Chi-squared metric, Target tracking
The PLIR system is an experimental high precision retrieval system based on the theory of the plausible reasoning of Collins and Michalsky. The PLIR system retrieves documents through plausible inferences. These inferences could be considered as sources o
Plausible Reasoning, Dempster-Shafer Theory of Evidence, Plausible Inferences, Information Retrieval and High Precision Information Retrieval
Many computer aided instruction systems present instruction linearly, and do not distinguish among different categories of the students. Students in these systems have little control over the curriculum to adjust them to their individual needs. These syst
Interactive Tutoring System, Intelligent Tutoring System, Plausible Reasoning, Uncertain Decision-making
6 454-150
5 454-155
4 454-126
4 454-127
5 454-121
6 454-216
The structure and shape of the polypeptide chain of proteins are determined by the hybridized states of atomic orbitals in the molecular chain. The calculated s ratio in the sp^n hybrid orbitals is computed from the fractal dimension D of the tertiary str
Fractal hybrid orbital, Fractal dimension, Fractal theory, Protein conformation, Structural class, Gaussian chain
In real-life situation, fruitful and joyful marriage often occur between two individuals of similar status in the society such as maturity, status in the society and neighboring localities. Similar principle can be applied in selecting the parents for rep
Genetic Algorithm, Selection Operators, Genetic Recombination, and Correlation
In the paper nonlinear discrete-time control systems are considered. Using methods taken from functional analysis sufficient conditions for local controllability are formulated and proved. Moreover, several remarks and comments concerning controllability
Diascrete-time systems, nonlinear systems, algebraic methods, controllability, infinite-dimensional systems,
In the paper distributed parameter systems are considered. Using methods taken from functional analysis necessary and sufficient conditions for approximate controllability are formulated and proved. Moreover, several remarks and comments concerning contro
Infinite-dimensional systems, distributed parameter systems, controllability, rank conditions, eigenfunctions computations.
Abstract:- Velocity of propagation into earth layers and the depth of interfaces between them are determined from ground probing radar using genetic algorithms. The method is novel and robust. It can tolerate errors and uncertainties in the delay times ob
Genetic algorithms, ground prbing radar, GPR, radar processing
Partitioning problem in codesign is of great importance since it can widely influence the characteristics of the system under design. The numerous constraints imposed by the environment and/or the underlying target architecture, in addition to its NP-Comp
Optimization, Codesign, Partitioning, Genetic Algorithms
5 454-179
6 454-180
6 454-203
7 454-204
6 454-205
5 454-209
The computation of fuzzy Ö-testors is an exponential complexity process, the unique available algorithm consists in verifying the definition on all the feature subsets. Since it does not exist an algorithm to compute fuzzy Ö-testors in this paper a geneti
Genetic algorithms, Fuzzy Ö-testors, Feature selection
In this paper, a new method based on a combination of evolutionary techniques, which allows improving efficiency of the supervised classification model ALVOT, is presented. In order to get a better efficiency at ALVOT classification stage it is necessary
Genetic algorithms, Evolutionary strategies, Feature selection, Sample reduction
Nowadays new services and new network architectures require definite contracts between users and TC (Telecom Operator) or ISP (Internet Service Provider). These contracts, known as SLA (Service Level Agreement), rely on capabilities of new networks (PIP,
Innovative network paradigms, Automatic Resource Management, Closed Loop Negotiation, Elastic Network.
Information technology infrastructure is the basis for information systems used in business processes in a company. Therefore it is expected to be robust and operate smoothly without interruptions. Here we look at the skills and knowledge that are needed
Information technology infrastructure, Development, Skills, Knowledge
A broad class of natural and man-made systems exhibit “complicated” behavior that is produced by nonlinearity in the dynamics. Trying to understand those dynamics is difficult because, typically, a time series is all that is available to the analyst. The
Internet traffic modeling, nonlinear dynamics, recurrence quantification analysis
Turbo codes have become part of the third generation W-CDMA systems because of their extraordinary coding performance. However, decoder implementation in commercial systems suffers from power, latency and complexity limitations. Here, we address new optim
Turbo decoder, MAP algorithm, Low power, Interleaver, SISO, ACS
6 454-153
6 454-215
8 454-168
6 454-217
9 454-218
In this paper we investigate the behaviour of specific evolutionary algorithms on permutation problems. We show difficult instances of the traveling salesman problem and present a new very fast evolutionary algorithm for noncircular permutation problems.
Evolutionary algorithms, Permutation problems, Global optimization, Operational research, Traveling salesman problem, Single-machine total weighted tardiness problem
Data-mining is a constantly growing area. More and more domains of the daily life take advantage of the available tools (medicine, trade, meteorology…). However, such tools are confronted to a particular problem: the great number of characteristics that q
-mining, Satisfiability, Optimization, Genetic Algorithms, Ant Colony Systems.
This paper deals with the problem of chose local control actions in power systems. The planning scenario is considered, and the aim of the study is to determine the most effective actions to lead the system to a better operating point. The tool of analysi
optimization techniques, lagrange multipliers, tangent vector
UML, emerging as the industry standard for object-oriented modeling, it needs a well-defined semantic base to support formal verification and validation tasks. Our aim beeing to give system designers a life cycle of software development as complete as pos
Object oriented modeling language (UML), Formal language (OF-Class), Verification and validation, Reactive system, Class diagram, Object diagram, Activity diagram.
In this paper, we present a novel approach for unsupervised image segmentation based on the Markov Random Field (MRF) and the Ant Colony Optimization (ACO) metaheuristic. MRF provides a convenient tool for modeling prior distributions of image, which enco
Image, Segmentation, MRF, Ant Colony Optimization, Max-Min Ant System, Local search.
6 454-220
8 454-223
4 454-230
5 454-231
5 454-235
A new set of criteria for evaluation of medical websites on the Internet is proposed in this paper. These criteria are classified into two main categories: content and design criteria. They were used by expert urologists and engineers in order to evaluate
Internet, Medical Websites, Medical WebPages, Evaluation Criteria, Quality Control
Abstract: In this paper, we present a novel approach for unsupervised image segmentation based on the Markov Random Field (MRF) and the Ant Colony Optimization (ACO) metaheuristic. MRF provides a convenient tool for modeling prior distributions of image,
Key-Words: Image, Segmentation, MRF, Ant Colony Optimization, Max-Min Ant System, Local search.
Voronoi network is used to simulate the microstructures of ZnO varistors, grains are represented by space-filling Voronoi polygons of different sizes and shapes with a variable number of neighbors. The geometry and topology of Voronoi networks closely res
ZnO Varistor, Voronoi Network, Simulation, Chaotic Property
To solve NP-complete problems such as Max-Sat, different approaches exist in the literature, each one presenting advantages and weaknesses. In this paper, we present an adapted genetic algorithm (AGA) for one of the most important theoretical problem: Max
Optimization, Satisfiability, Maximum Satisfiability, Genetic Algorithms, Scatter Search
This paper introduces a novel operator to produce the better solutions from bad solutions to improve the efficiency of the ATPG by reducing the total number of test patters in VLSI test applications. This operator is proven to be generic when the fitness
Genetic algorithms, ATPG, Mutation, Crossover, Selection
9 454-212
5 454-156
8 454-130
6 454-139
6 454-140
This paper introduces three new position variable structure controllers design methods for robot position systems with parameter perturbations. The first method considers a relay type discontinuous sliding mode controller which employs well-known equivale
Sliding mode conditions, relay control, PD-controller, equivalent control, Lyapunov full quadratic form, robot position control, parametric perturbations, stability conditions.
In this paper, a new recombination method is proposed for multiparent recombination of genetic algorithm by using the approach of experimental design. The proposed approach applies the search techniques of experimental design to explore the solution space
Experimental Design, Orthogonal Latin Square, Multiparent Recombination
Efficient multiprocessor task scheduling is a long-studied and difficult problem that continues to be a topic of considerable research. This NP-hard problem was traditionally solved using a combination of search techniques and heuristics. These solutions
Genetic Algorithm Multi-processor Task Scheduling Inter-processor Delay
One of the approaches used in Evolutionary Algorithms (EAs) for problems in which the environment changes from time to time is to use techniques that preserve the diversity in population. We have tested and compared several algorithms that try to keep the
Dynamic environments, Genetic operators, Hypermutation, Random immigrants, Diversity, Memory, Genetic algorithms
This paper presents an evolutionary model for non-routine designing based on hierarchical co-evolution. It examines some of the ways that design knowledge required by evolutionary processes have been approached to date. It then discusses how the hierarchi
Evolutionary design, Hierarchical co-evolution, Non-routine design
7 454-147
5 454-179
6 454-180
6 454-148
5 454-174
5 454-236
9 454-169
Particle Swarm Optimization is a novel algorithm where a population of candidate problem solution vectors evolves "social" norms by being influenced by their topological neighbors. Until now, an individual was influenced by its best performance acquired i
Particle Swarm Optimization, Evolutionary Computation, Optimization
The computation of fuzzy Ö-testors is an exponential complexity process, the unique available algorithm consists in verifying the definition on all the feature subsets. Since it does not exist an algorithm to compute fuzzy Ö-testors in this paper a geneti
Genetic algorithms, Fuzzy Ö-testors, Feature selection
In this paper, a new method based on a combination of evolutionary techniques, which allows improving efficiency of the supervised classification model ALVOT, is presented. In order to get a better efficiency at ALVOT classification stage it is necessary
Genetic algorithms, Evolutionary strategies, Feature selection, Sample reduction
In many application oriented optimization problems heterogeneous data types can be found. For example the set of parameters, that are to be optimized, could consist of a mixture of Boolean, integer- or real numbered values, permutations, selections from e
Evolutionary computation, Genetic algorithms, Evolution strategies, Hybrid
In this paper, we describe knowledge acquisition for the construction of an extended enterprise memory. Our purpose is to verify the applicability of an existing knowledge acquisition method (commonKads) for the case of virtual organisations. The enterpri
Virtual enterprise, Enterprise memory, Knowledge management, Tacit knowledge, CommonKads
This paper introduces a novel operator to produce the better solutions from bad solutions to improve the efficiency of the ATPG by reducing the total number of test patters in VLSI test applications. This operator is proven to be generic when the fitness
Genetic algorithms, ATPG, Mutation, Crossover, Selection
Parallel evolutionary algorithms have been developed to reduce the running time of serial evolutionary algorithms. Two major paradigms for parallel programming, Message Passing and Shared Memory, are implemented and their performance observed. Message Pas
Parallel Evolutionary Algorithms, Messages Passing clusters
6 454-157
6 454-159
9 454-161
9 454-162
8 454-163
8 454-166
In this paper, a Taguchi Genetic Algorithm with the new evolutionary operation called Taguchi Transformation is proposed. The approach integrates Taguchi method into the crossover operation to improve the searching efficiency. The proposed algorithm has a
Experimental Design, Taguchi Method, Quality Engineering and Genetic Algorithm
The paper introduces an approach to designing cellular automata - based multiprocessor scheduling algorithms, in which extracting knowledge about scheduling process occurs and thisknowledge can be potentially used while solving new instances of the sch
cellular automata, genetic algorithms, multiprocessors, scheduling, immune system
Parallel Evolutionary algorithms have been developed to reduce the running time of serial Evolutionary Algorithms. Two major paradigms for parallel programming, Message Passing and Shared Memory, are implemented and their performance observed. Message Pas
Parallel Evolutionary Algorithms, Message Passing Interface
Parallel Evolutionary algorithms have been developed to reduce the running time of serial Evolutionary Algorithms. Two major paradigms for parallel programming, Message Passing and Shared Memory, are implemented and their performance observed. Message Pas
Parallel Evolutionary Algorithms, Message Passing Interface
Experimental design techniques present a more balanced alternative to the one-factor-at-a-time approach to fermentation improvement, since it reduces number of trials, cost and consequently creates models correlating relationships between variables and re
bioinformatics GP knowledge discovey experimental design
The paper studies and designs an genetic algorithm (GA) of the bilevel linear programming problem (BLPP) by constructing the fitness function of the upper-level programming problem based on the definition of the feasible degree. This GA avoids the use of
bilevel linear programming,genetic algorithm, fitness function, numerical results,efficiency
4 454-128
7 454-154
8 457-135
6 457-173
In the paper distributed parameter systems are considered. Using methods taken from functional analysis necessary and sufficient conditions for approximate controllability are formulated and proved. Moreover, several remarks and comments concerning contro
Infinite-dimensional systems, distributed parameter systems, controllability, rank conditions, eigenfunctions computations.
In this paper, we propose a new genetic local search GLSDC suitable for coarse grained parallel computers. In each generation, the proposed method applies a local search to all individuals. Then the search area of the local search is slightly narrowed by
Genetic local search, Parallel computation, Function optimization, Real-coded genetic algorithm
2D models, 2D systems, second-order systems, state space, system theory
Nonlinear circuits, chaotic phenomena, hyperchaotic multi-scroll attractors
9 457-182
4 457-224
5 457-241
4 457-282
9 457-323
3 457-344
Time Delay System, Lyapunov-Krasovskii functional, Leibniz-Newton formula, stability and alpha-stability, linear matrix inequalities LMI’s, integral evulating, Schur complement.
Approximate symbolic analysis, linear circuits, computer methods
Asynchronous Adder, Statistical Probability, Estimated Carry, Multiple Carry Prediction
Dynamical systems, piecewise-linear, modeling, topological conjugacy
Chaos, Parameters Reconstruction, Variables Reconstruction, Observability
High-order linear systems, linearization, feedback.
7 457-392
5 457-152
W-Cdma, Cac 4 457-181
6 457-199
5 457-219
4 457-228
5 457-272
6 457-361
Fault detection, Fault identification, Wavelets, Fisher linear discriminant, Stochastic processes.
Density function approximation, Error rate estimation, Pseudo-error monitor
Service design, New telecommunications services, Service engineering, Service creation, Uml
Space-Time-Codes, MISO, MIMO, Diversity, OFDM, B-FWAUmts, W-Cdma, Cac
Voice over IP, VoIP, H.323, CompactPCI
Software radio, Beamforming, Antenna array, Smart antenna, DSP, Instruction cycle time, Sampling rate.
5 457-117
6 457-185
9 457-187
6 457-204
6 457-257
6 457-265
Underwater vehicle, Autopilot, Artificial intelligence, Track-keeping control
Shape, Description, Parameter, Prototype, Distance, Reference distance, Similarity, Identification
Parallel Automata, Conflicts in Parallel Automata, Extended-Finite-states-Machines, Timed Automata
Optimal control, Nonlinear System, Controllability, Eigenvalues, Stability
Electronic throttle control, Drive by wire, Sliding mode control
Formal methods; Hybrid automata; System specification; Requirements verification; Hybrid systems
5 457-408
6 457-437
6 457-449
8 457-453
5 457-454
5 457-455Tae Kyoon Kim, Eun Jung Kwon, O-Hyung Kwon 4 457-283
tactile recognition, description, parameter, prototype, classification, class, nucleus
Underwater vehicles, Identification, Modelling, Simulation
formal methods, hybrid automata, system specification, requirements verification, hybrid systems
CORBA, Humanoid Robot, Teleoperation, Internet, Obstacle Avoidance
Gait transition, humanoid robot, Evolutionary Algorithms.
Human-machine systems, Virtual reality, Tactile display, Piezoelectric actuator, Matrix-typed, Striped texture, Optimal pitch, Perceptible pin-stroke
5 457-327
6 457-330
5 457-345
8 457-398
6 457-441
4 457-159
6 457-210
6 457-231
5 457-261
8 457-373
IP QoS, Intserv, Diffserv, RSVP, RSVP aggregation, Mobility support.
Wireless lan (wlan) , Firewall, Ipsec-vpn, Qos
RISC processor, Structural Model, MIPS.
Approximate string matching, processor arrays, parallel architecture, hardware engineering, VLSI
Web-based management systems, Multimedia servers, DVBQoS Routing, MPLS
UMTS, QoS, Power allocation
Multicast, DiffServ, priority dropping, video, MPEG4IP, experiments
DiffServ, RED, TCP friendly, TCP, UDP, Simulation
Traffic shaping, scheduling, SoC, Traffic Management, QoS
6 457-375
6 457-377
6 457-381
4 457-101
5 457-146
6 457-223
4 457-270
Optical packet switching, MAN, bundling, interface. Network Demonstrator, Optical Packet Switching, Timeout Parameter
4G, WLAN, GRPS, DVB-T, Measurement-Based
MAC, QoS, PONs, access, simulation results
Modeling, Control operations, Optimization, Methods, Hierarchical systems, spacecraft.
Natural gas, Pipeline networks, Nonlinear optimization, GRG method, NP-complete
Number Sequences, Different Probability Distributions, Chaos, Topological Conjugacies
Modelling, Simulation, Microsystems, Equivalence, energy domains, Design
4 457-273
4 457-429
4 457-220
6 457-239
5 457-359
5 457-389
5 457-458
Modelling, Simulation, Mechatronics system
Cave Symbols, Acetylene electromagnetic spectrum, Color vision, Speleology, Geology
Machine vision, Shape analysis, Segmentation, Morphology, Identification, Classification, Histological images, Colon
Complemntary codes, Welti Codes, Image Watermarking, Orthogonal arrays, data hiding.
Image Segmentation, Support Vector Machines, Color Spaces, Medical Imaging, Statistical Learning,
Steganalysis, Data hiding, Steganography, Watermarking, Statistical modeling, Neural network classification.
4 457-461
6 457-145
6 457-148
4 457-252
3 457-284
PSOLA, pitch alteration , spectrum distortion , pitch synchronous, pitch compression
Industrial Process, Monitoring, Intelligent Control, Baking Oven
Skid steering, Unmanned vehicle navigation, Fuzzy control, Computational complexity
Riccati differential equation, Hamiltonian system, optimal control problem, optimal cost, linear systems
Control, Spacecraft, Modeling, Geomagnetic storms, Aerodynamic moment, Solar Array.
6 457-316
4 457-348
4 457-435
6 457-134
Fail-safe technique, safety relevant electronic system design, quiescient current principle, redundant system design, watch dog function, diversity, tolerance zone management, fail-safe comparator, safety relevant microcomputer system SIMIS, computerized
Dual dynamic programming, Dual feedback control, Optimal control problem, State constraints, Sufficient optimality conditions.
Unmanned underwater vehicle, Non-linear control, Inverse dynamics, Depth controller
SystemC, energy consumption, low power, simulation, C++, modeling, object-oriented languages
4 457-137
6 457-194
4 457-218
8 457-324
5 457-353
8 457-383
Multiplier, Design for Testability, soft IP core, testing.
group communications, multicast, data aggregation, protocolo design, statistical analysis, simulations.
Visual Basic for Applications (VBA), ArcGIS, Windows Objects (COM), GIS, Cartographic Viewer
Design style, form feature, geometry, topology, shape analysis.
Vhdl, Vlsi, Cad Systems, Hardware, Logic Synthesis, Boolean Expressions, Digital Circuits.
Synchronous sequential circuits, Logic design, Formal specification, Functional correctness, Automatic verification, Software tools
3 457-438
8 457-445
4 457-447
6 457-129
9 457-175
6 457-202
Turning, Measuring, Thermic deformation, Accuracy, Variation, Parameters
Color in Music, Psychoacoustics, Scales and Perception
Telemedicine, Multimedia, ISDN, Videoconference, Image processing, Telediagnosis, Electromiography
Broadcasting, Video streaming, Network performance model, Video-on-demand
CVE, videoconferencing, awareness management
Video-on-demand, Application-layer, Protocol, Distributed, Hypercube, Self-recovering
6 457-203
6 457-240457-368
4 457-388
6 457-390457-413
4 457-462
Video compression, 3D-DCT, Video sequences cut, Transparency reduction, Compress ratio, NRMSE, Modification of 3D-DCT encoder
Logarithmic Diagonal Search, Motion Estimation, Block matching algorithms, Three-Step Search, Full Search Algorithm, Low bit rate Video Coding
Computer vision, neural network, motion detection, background behavior, statistical learning
Content-based image retrieval, MPEG-7 visual descriptors, similarity calculations, feature
: homomorphic deconvolution, characteristic system, cepstrum analysis,
3 457-464
6 457-166
9 457-180
5 457-186
6 457-197
6 457-230
Image Compression, Support Vector Learning, JPEG, Quadtrees, Edge Detection
Multicarrier CDMA, Carrier frequency offset, Multiuser detection, Rayleigh fading channel
Mobile agent, routing agent, load balancing, diffusion, data communication.
Adaptive modulation, MIMO system, Linear prediction, Quadrature amplitude modulation
Mobile ad hoc networks, Location-aware routing, Location-aware services, Jini technology, Wireless networks
Mobile handset, Head phantom, Radiation pattern, Method of moments, Absorbed power
9 457-304
6 457-340
7 457-446
6 457-465
6 457-131
5 457-147
6 457-382
MANET, Multi-hop, Routing, Power-Awareness, AODV, PAOD, OPNET
Formal methods, verification, modal logic, wireless communications, 3G mobile, security protocol.
network, acoustic, underwater, wireless, UWALAN, MFSK, spread spectrum, routing, fading
Wireless ad hoc networks, MANETs, network emulation, network simulation, HSSR
Temporal Databases, Spatial Analysis
Key-words: Single-stage, Mesh, Reconfiguration, Sort, Diameter
Java; Bytecode; Profiling; Instrumentation; Portability
6 457-402H.-J. Nern, T. Atanasova, G. Agre, J. Saarela 457-478
5 457-183
5 457-351
6 457-407
Key-Words: - Safety critical software, process assessment, software reliability, safety-critical systems, real-time embedded systems, processes/base practices, TQM model, Quality factors, Quality criteria, Quality metrics.
Solar Power Inverter, DC-to-AC Converter, Photovoltaic systems, Power electronics, Inverter topology
Loss Allocation, Bilateral Transactions, Power Pools, Simultaneous contracts, Multiple wheeling transactions
Absorbing boundary conditions, Lossy media, Finite-difference time-domain (FDTD) method, Ground Penetrating Radar.
4 457-468
6 457-127
7 457-278
7 457-279
5 457-334
5 457-335
6 457-399
6 457-405
Insulator string, Genetic algorithm, Stray capacitance, Cap-and-pin type porcelain insulator
Steganography, Watermarking, Binary images, Security, Data hiding
Boolean functions, Balanced functions, SAC-functions
Cryptographic algorithms, New security architectures
Public-Key, Cryptosystem, Elliptic Curves, Key Exchange, Signature Scheme
Steganography, Data hiding, Security, Gray-scale image, Watermarking
E-commerce, Cryptographic key, Recovery, Key encapsulation, Secret designation, Security evaluationMultimedia watermarking, Cryptography
6 457-130
4 457-163
6 457-205
5 457-286
6 457-439
9 457-176
6 457-179
3 457-184
Switched-capacitor integrators, Operational amplifiers, Gain- and offset- compensation, Filters
Modelling, Dynamical system, Current mode.
PWM converter modelling, averaged characteristic coefficientsinverter control, mains coupling filter
Key-Words: - Full-order canonical model of boost PWM converter, Discontinuous conduction mode, Averaged characteristic coefficients
Variable structure PD-controller, sliding mode, Lyapunov full quadratic form, robot tracking control
Multiresolution, Coding, Wavelet, Multimedia
Papoulis-Gerchberg algorithm, band-limited signal extrapolation
6 457-191
4 457-214
6 457-253
7 457-309
5 457-332
Transform domain lms, Optimum step-size, Time-varying channel, Minimum mse
Sample and hold; Periodic signal; CMOS Integrated Circuits; Time resolution; Repeated sampling
Perfect decoupling, Feedforward, Measurable input signals, Geometric approach, Fixed poles
Change detection, Signal segmentation, Impulse invariant transformation, Akaike information criterion, Vibration structures, Earthquake ground motion
Equivalent-Circuit, Transistor, Small-Signal, Condition Number, Optimization, Measuremenst Errors.
5 457-360
4 457-160
4 457-161
6 457-236
6 457-262
6 457-267Cristian Lambiri, Dan Ionescu, Bogdan Ionescu 457-289Fatih Haciomeroglu, Michael Devetsikiotis 457-370
457-372
6 457-459
Vector quantization, Predictive quantization, Multi-mode quantization, Matrix quantization, Quantizer design, Parametric speech coding
TCP, Bandwidth Estimation, Wireless Links, Fairness
TCP, Mathematical Model, Bandwidth Estimation, Wireless Links, Fairness
In/ip convergence, Next generation servicesIP routers, address lookup, IPv6
Storage Area Network (SAN),iSCSI,IP,QoS,Fibre Channel,Virtual Private Network (VPN)
ATM network, PNNI routing, Saturation routing, Overhead, Comparative Analysis.
6 457-125
6 457-172
6 457-193
5 457-238
5 457-460
4 457-217
Ship, Neural Networks, Modelling, Identification
Large-scale circuits, Locally connected circuits, Cellular Neural Networks, Associative memories
Neural networks, Adaptive learning rate, Text-to-phoneme mapping, Phoneme accuracy
Hybrid Connectionist, Artificial Neural Networks (ANN) and Human Machine Interaction (HMI).
Intrusion detection, Neural network, Singular value decomposition
Geospatial Information, Cartographic Metadata, Cartographic Databases, Cartographic Normalization, Formats, Cartographic Representation.
5 457-245
7 457-250
7 457-266
4 457-288
5 457-329457-331
6 457-395
8 457-409
Web services, WSDL, SOAP, Hardware community, Hardware interpreter, Java
Mobile agents, Distributed database, Heterogeneous database, Classification, Aglets, XML
Evaluation of availability, Network availability, Dependability,N-tier client/server architecture
Virtual networks, ATM, LANE, Shared server, Model, Loading
Algorithm, network, path recovery, protocol, routing, switching
mobile ad hoc networks, backup, route recovery, routing protocols, real time
Queueing theory and ommunications, Non-preemptive priority scheduling
6 457-463
5 457-165
6 457-281
7 457-410
5 457-456
7 457-457
Statistical network model, Hyperbolic distribution, Anomaly intrusion detection, Internet services
Triangular norms, H-function, H-implication
Keywords:-Liquid-Liquid Extraction; Mass Transfer; Fuzzy Numbers; Triangular Memberships Function; RDC Column; Convex Set.
System identification, Modeling, Evolutionary computation, Genotype, N-ary tree, Descriptive Takagi-Sugeno fuzzy systems
Feature selection, input contribution measurement, fuzzy modeling, feature analysis
Critical Infrastructure, Complex Network, Fuzzy modelling, CIP/CIIP
6 457-128
6 457-154
4 457-158
6 457-168
4 457-200
5 457-260
6 457-285
Wavelets, Filter banks, Chebyshev polynomials, Wavelet design
Maximally linear, MAXFLAT, digital differentiators, digital filters
ARC filters, Multi-loop feedback structures, Current followers, Current conveyors.
Legendre polynomials, Spherical harmonic, Compact support wavelets, Legendre wavelets
Filters, Current mode, Synthetic elements, Gyrators
CDBA, Ladder Filter, Leap-Frog, SFG Simulation
Switched-capacitor integrators, Operational amplifiers, Gain- and offset- compensation, Filters
9 457-171
6 457-211
6 457-264457-421
6 457-248
9 457-450
6 457-451
6 457-126
Constraints, ODMG, Object-orientation, Database modeling, Object algebra.
Healthcare, Medical record, Distributed database, Replication, Security, Data access
Database security, Access control, Requirements engineering
Eurico Borges, Anália Lourenço, Orlando Belo
photovoltaic nanostructures, photoexcitation, thermal escape
Quantum wells, photo-generation, recombination, p/i/n solar cells, thermionic currents
Fermi level, quantum well, nanostructures
evolutionary design, hierarchical co-evolution, non-routine design
4 457-144
6 457-1535 457-195
5 457-271
6 457-362457-428
7 457-229
Depth First Search, Breadth First Search, Heuristic Search Algorithms, Space of Configurations, Euclidian Distance Heuristic.
Keywords: Collective decision-making, individual learning, collective learning, temporal, nonmonotonic, logic.
Case-Based Reasoning (CBR), Intelligent Systems, Machine Learning, Case-Base Maintenance
Artificial Immune System, Clonal Selection, Affinity Maturation, Multi-modal Function Optimisation
vulnerability, Vulnerability Markup Language, XML, security assess, self-managing,
4 457-269
5 457-274Carlos Aguilar I., Miguel S. Suarez C., J. Humberto Sossa 457-280
19 457-326
4 457-374
6 457-196
5 457-242
incomplete trust, e-commerce, electronic transaction, trust evaluation, risk analysis
Key Recovery, Key Management, Archived and Communicated Data, Intranets, Cryptography
MANET, routing protocol security, authentication, certification services
Optical wireless link, free space optics, quantum key distribution, single-photon detector
Sequential Digital Circuits, Test Sequence Compaction, Test Generation, Genetic Algorithms
Advanced Technologies in Education, Scenario Analysis, Computational Geometry, Knowledge Representation and Visualization, Modeling History
5 457-246
6 457-346
5 457-393
8 457-394
6 457-404
Computational Geometry, Coherence, EEG, Algorithm, Power Spectrum, Signal Processing.
Model-based diagnosis, Multi-agent, Collective decision-making, Temporal, Nonmonotonic Reasoning, Events.
Sequential Digital Circuits, Low Power Consumption, Sequence Compaction, Test Generation, Genetic Algorithms
Sequential Digital Circuits, Sequence Compaction, Test Generation, Genetic Algorithms.
Key-Words: - Reinforcement learning, Markov chain, learning automaton, adaptive critic, learning algorithm, stationary random policy, stationary pure policy.
5 457-149
4 457-174
6 457-177
6 457-306
4 457-113
4 457-192
3 457-263
Boost converter , Limit cycles, Strange attractors, Poincarι maps, Bifurcation diagram.
Videogrammetry, Calibration, Radial Distorsion, Geometric Distorsion, Digital Video
Micro opt-electronic, polarization, 2-D optical cross-connect
Analog circuits design, bandgap reference, low powerE learning, Hermann diagram
Education, Instructional technology, Computer, Internet, Video
EMC education, Information technology, Mini projects, Practical approach
9 457-277Boyan Bontcev, Dessislava Vassileva 457-290
7 457-387Rafael T. de Sousa Jr, Alexandre C. V. de Oliveira, Regina Tsujiguchi, Vinicious M. Pacheco, Cl 457-430
6 457-300
6 457-328
5 457-443
Analog demodulation, analog modulation, DSP, event-driven simulation, remote laboratory, virtual laboratory, Web-based laboratory
Microwave, Measurement, Filters, Remote control, Microstrip
Parameter estimation, Takagi-Sugeno fuzzy models, Nonlinear systems, Time-varying systems, Wavelets.
Time-piecewise DAE, Power system, Transient stability, CCEBC-EEAC, Hamiltonian system
Backward wave oscillation, Traveling wave tubes, Microwave power amplifiers, Electron beams.
4 457-105
5 457-142
6 457-167
4 457-318
7 457-311
7 457-312
Keywords: orthogonal frequency division multiplexing (OFDM); symbol timing; Short-Time Fourier Transform (STFT)
CDMA, Macrodiversity maximal ratio combining, Power control
Combline filters, Resonators, Q-factor, Periodic structures
Code Division Multiple Access (CDMA), Multi-user detection (MUD), Multiple Access Interference (MAI), Optimization, Penalty function, and Steepest Descent (SD).
LDPC codes, Parallel architecture, VLSI implementation, PLR algorithm
LDPC codes, Sequential architecture, VLSI implementation, PLR algorithm
4 457-314
4 457-315
5 457-442
9 457-244
8 457-308Elham Ashoori, Farhad Orumchian, Babak Nadjar Araabi 457-469
6 457-296
7 457-333
Dwt, Scla, Jpeg2000Ebcot, Jpeg2000, Dmc, Dmb
VoD, RAID, Disk retrieval, Multimedia servers
Queueing system, Weibull distribution, Approximate method, Characteristics of the system, Output process
Entropy Estimation Gradient Prefix tree Suffix tree Finite memory machines Number properties
pattern recognition, shape classification, graphical objects recognition, moments, image interpretation
pattern recognition, supervised classification, unsupervised clustering, image segmentation, uniformity analysis, texture analysis
4 457-365
4 457-366
6 457-391
5 457-170
7 457-237
9 457-317457-416
Cellular Neural Networks, Edge Detection, Image Processing
Hopfield neural networks, associative memories, grey-scale images, finite precision weights.
Face Detection, Skin Color, Multiclassifier, SVMs, Neural Network
fault detection space, interactor matrix, non-square transfer matrix, pseudoinverse,
Discrete event systems, Behavioral approach, Achievable behaviors, Controllability, Supervisory control
Blackboard, distributed problem solving, multistrategy learning system, GBB, Machine learning
6 457-291
5 457-297
5 457-347
5 457-118
9 457-150
6 457-151
: Convolutional codes, BCH codes, Cyclic codes, Coding gain, Multiple access,Hard decisioning, Soft decisioning, Reverse(Forward) Traffic Channel.
Turbo decoder, MAP algorithm, Low power, Interleaver, SISO, ACS
mobile agent security, threat diagnostic tree, and smart object class
Formal verification Assertions Atpg
OpenMP, Task-graph parallelism, Precedence relations, Programming model
Software Quality, Object-Oriented Methods, Web Technology, Software Engineering, Conceptual Modeling, Distributed Repositories
6 457-156
3 457-339V. Ramon Tomas, J. F. Garcia, J. J. Samper, E. Carrillo 457-470
5 457-141
6 457-258
3 457-268
4 457-222
4 457-227
Analysis of algorithms,Data structures, Hashing with separate chain algorithm,Probability distribution,Frequency of access to a key
Information System, Project Management, Rescheduling
Statcom, Transient Stability, Var Injection, Fault Clearing.
Power System Sensitivity Model Adjoint Network Tellegen Losses
blind signature, unlinkability, traceability, one- way hash function
Self-oscillating, Command, Valley-fill, Power-factor-correction, Lamp, Ballast.
Dimming, Lamp, Self-oscillating, Electronic ballast, Automatic control
6 457-275
6 457-380
6 457-138
9 457-234
4 457-254
5 457-256
Review, Electronic Ballast, HID Lamp, Artificial Lighting, Efficacy, Comparison.
valley fill, electronic ballast, and comparison.
Multisite Radar Systems, Multistatic Radars, Multiradar, Netted Radar Systems, Information Fusion, Decentralised Signal Processing,
ISDN, RADIUS, AAA dynamic profile reverse RADIUS protocol
KeyWords: Wavelength Division Multiplexing, propagation delay latency, data channel collision.
Keywords: Wavelength Division Multiplexing (WDM), propagation delay latency, synchronous transmission reservation protocol.
4 457-109
6 457-132
6 457-133
9 457-325
6 457-364
6 457-259
5 457-376
Lithologic facies, Well log's data, Self organising map of Kohonen,Classification, Labels, Underground cores
Hybrid cost function, RBF neural network, classification, accelerated training
Neural Networks, Self-organising Map, Fault diagnostic
Target recognition, SAR Imagery, Neural Network Classification
BSB Neural Networks, Associative Memories, Learning
Keywords: WDM, MCA, tuneable receiver, electronic processing bottleneck, receiver collision, average rejection probability, Erlang-B formula.
Time parallelization, MPI, reservoir simulator
6 457-397
4 457-103
5 457-313
5 457-367
6 457-112
9 457-305
5 457-411
6 457-201
Intelligent Agents, Fuzzy Logic, Conflict Resolution
Active inductor, cascode topology, high quality factor, dual band filtering, high selectivity.
Phase-Locked Loop, Operational Transconductance Amplifier, Gm-C Filter.
Data Warehousing, Lineage Tracing Query, Tag, Performance Analysis
Real-time database, Concurrency control, Hard real-time transaction, Transaction scheduling, Priority inversion, Schedulability analysis
Content, Management, Workflow, Style, Logic, Developing, Internet
Space-vector, DQ transformation, Multi-phase AC machines
6 457-225
6 457-232
6 457-349
4 457-369
6 457-188
4 457-251
Electromagnetic compatibility, EMC, Electromagnetic interference, EMI, Interference statistics, Market surveillance, Radio Interference
Interpoly-oxynitride, high-density plasma, RTA, N2O, 10-year lifetime, effective barrier height
Dispersion Relations, wave-guides, Ferroelectric, nonlinear magnetostatic surface waves.
Heater resistor, Isolation resistance, Dielectric rigidity, Tester, Digital Signal Processor
, Partitioning, Optimization, Genetic Algorithms, Taboo Search, Parallel Architectures
GRASP, Meta-heuristics, Surface Mount Technology, TSP
7 457-356
5 457-162
7 457-221
7 457-355
9 457-249
4 457-276
Hidden Markov Model Full design Training Evolutionary algorithm Genocop
Intrusion detection system,Network security, Idwg, Idxp, Idmef, Iap, Idp
access control, key distribution, CRT, hash function, cryptosystem
Security Protocols, Protocol Verification, Verification Logics, Authentication, Mobile Security
Concept level hierarchy, data mining, generalized association rules, pattern growth methods, rule generation, rule pruning
Power Quality, Voltage Imbalance, Electromagnetic Compensator, Harmonics, and Power Converters
4 457-298
6 457-342Sergei N. Khotiaintsev, Eugene D. Belyavskiy, Victor Garcia-Garduno, Ivan V. Shevelenok 457-433
6 457-108
8 457-384
8 461-117
TLM method, Microwave applicator, Cavity, Real excitation, Wire node, Resonant frequency
Dispersion relation; Phase constant; Attenuation constant; Reduced temperature ; Power flow.
Program design, programming methods
information technology, distance education, teaching and learning materials, didactic concept, didactic concept
Accurate modeling and analysis of large-scale interactive distributed information systems is a challenging research problem. This paper presents a novel modeling approach that can accurately be used to design and analyze large-scale distributed informatio
Performance modeling, Performance Functions, Modeling of large distributed systems, Hierarchical Modeling, Video on demand modeling
6 461-118
5 461-119
6 461-120
6 461-121
4 461-122
4 461-125
6 461-129
Common-base and common-gate transimpedance preamplifiers for p-i-n photodiode receiver circuits have been widely used. In this paper, we explore the design of high-performance optical transimpedance preamplifiers based on new submicron common-base and com
Transimpedance Preamplifiers, Optical Receivers, Low Noise, Optical Communication
High gain, wide bandwidth, low noise, and low-power transimpedance amplifiers based on new BiCMOS common-base topologies have been designed for fiber-optic receivers. In particular a design approach, hereafter called “total-FET approach”, added a new dime
High Gain, Low Noise, Optical Receivers, Transimpedance Amplifiers
The multimodel approach is a research subject which is recently developed for modeling, analysis and control of complex non linear and non stationary systems. This approach supposes the definition of a base of local models. Each local model can describe t
Multimodel, Validity Fusion, Fuzzy Supervisor, Models’ Base, Uncertain Systems
the main idea of the multimodel approach is to represent a complex system by several models having each a given validity'domain chiffred by a validity’degree. These validities'degrees are exploited in the fusion step of the base'models in order to obtain
Multimodel Approach - Uncertain Systems - Validity Computation - New Approach - Residues
In this paper a current controller based on space voltage vector PWM scheme is presented for induction motor drives. The design consists of a modified continuous state feedback control. This controller guarantees global asymptotic stability for the syste
: robust control, induction motor, current control, PWM
In this paper a current controller based on space voltage vector PWM scheme is presented for induction motor drives. The design consists of a modified continuous state feedback control. This controller guarantees global asymptotic stability for the syste
: robust control, induction motor, current control, PWM
This paper describes how to verify get level arithmetic designs as RT level. In our method, each bit of output is represented by a multiplexer based structure of linear integer equations, and RT level properties are directly applied to this representation
Arithmetic circuit verification, Linear TED, Equation solving, Canonical form
6 461-131
7 461-132
6 461-135
6 461-136
5 461-137
6 461-138
This paper presents a comparative study on image coders using the discrete cosine transform and the discrete wavelet transform, addressing in particular the JPEG-like and the EZW based image coders. We compare and evaluate the JPEG Baseline Image coder (u
Image Coding, JPEG-Like Architectures, Discrete Cosine Transform, Discrete Wavelet Transform, EZW Coding.
This paper discusses a methodology how the E-government systems can streamline new/old systems and processes – around the ‘Life of a Citizen’. E-government systems are discussed, as the systems track a Citizen through the Citizen’s life cycle – within the
-government, Citizen’s Life Cycle, Unified Processes, Data Aggregation
The problem of the image reconstruction of the multi component structure based on indirect boundary observations is considered. The image of the distribution of desired characteristics is described inside the plane domain by a cirtain two-dimensional f
Images Reconstruction, Electrical Tomography, Spline, Regularization
This paper presents a new Unit Commitment (UC) scheduling algorithm. The proposed algorithm is a Genetic Based Algorithm with Two Level Crossovers. One is unit level crossover and the other is population level crossover to obtain a better schedule. The
Unit Commitment, Genetic Algorithm and Two Level Crossover.
In this paper we develop a robust controller based on variable structure systems (VSS) control theory for the stabilization of a class of Underactuated Mechanical Systems. This controller is based on a noncollocated partial feedback linearization of the
underactuated, whiling pendulum, robust control, sliding mode, VSS
This paper presents ‘Sequential Switching Hybrid Pulse Width Modulation (SSHPWM) Inverter based UPS’, which describes a new methodology in the inverter control. In SSHPWM the power switches of a full bridge inverter has to be pulse width modulated at low
Uninterruptible Power Supply, Full Bridge Inverter, Hybrid Pulse Width Modulation,
5 461-139
6 461-140
6 461-141
6 461-142
6 461-143
6 461-144
5 461-145
Direct torque control (DTC) is a relatively novel induction motor control method, that is relatively easy to implement and that enables high performance to be achieved. However, the conventional DTC technique has some drawbacks such as large torque rippl
Induction motor, Stator resistance, Direct torque control, ANFIS
We develop the computation reduction schemes of real root method that is mainly used in the CELP(Code Excited Linear Prediction) vocoder. The real root method is that if polynomial equations have the real roots, it is able to find those and transform them
LSP, CELP vocoder, mel scale, LPC, real root method, computational amount
We develop the computation reduction schemes of real root method that is mainly used in the CELP(Code Excited Linear Prediction) vocoder. The real root method is that if polynomial equations have the real roots, it is able to find those and transform them
LSP, CELP vocoder, mel scale, LPC, real root method, computational amount
Both a self-certified public key and a verifiable self-certified public key need not be accompanied with a certificate to be authenticated by other users. To validate these public keys, it is required that key generation center¡¯s public key trusted by us
Self-certified, Verifiable self-certified, Trusty relationship, Inter-domain, Interoperability
In this paper, we propose authentication and key agreement protocol that requires one modular exponentiation by both user(e.g. mobile devices) and mobile station without exchange of certified public keys in mobile environment. Thus both user and mobile s
Mobile Internet service, Authentication protocol, Key agreement protocol, M-commerce
WTLS as a secure protocol of WAP makes TLS that is used in wireless Internet protocol for TCP security is appropriate to wireless environments [1][2]. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of four protocols,
WTLS, Handshake protocol, Active attack, Elliptic curve cryptosystem
Chaotic digital transmissions have recently emerged as a way to improve the security and privacy of digital transmissions. In this paper, we propose a new approach to estimate the transmitted symbols on the receiver side. This approach, that we call "S
Chaos, Digital Transmissions, Communications, Receiver, Symbolic Matching
6 461-146
4 461-147
5 461-148
4 461-149
6 461-153
4 461-154
7 461-155
This paper discusses the use of the Wireless Application Protocol (WAP) architecture to provide a wireless channel to access the SCADA database operating in the power process plant via Internet network protocol. The WAP architecture enables mini-browser o
Wireless Application Protocol, SCADA system, WML, XML
The paper presents the investigation of the nonautonomous system of two synchronized oscillators with the phase feedback of the second type. It is shown that this feedback leads to a new property and the system allows detecting small signals.
Oscillator , System, Synchronization, Phase feedback.
The generation or control of pleasant prosody parameters is very important for speech synthesis. The methods of prosody control with pitch scaling, duration control and energy control are also prior to synthesize the speech. Duration control among them is
Prosody parameter, CELP vocoder, G.723.1 dual rate ACELP, duration
The conception of control systems is at present based on the principle of decentralized subsystems interconnected with the control centre through a communication channel. With this arrangement it is easy to extend and modify the systems but, at the same
Control, Simulation, ATLAS-system, Servo-system, PL2code
A lot of networks today are behind firewalls. In peer-to-peer networking, firewall-protected peers may have to communicate with peers outside the firewall. This paper shows how to design peer-to-peer systems to work with different kinds of firewalls withi
Firewall, Peer-to-peer, Object-oriented, Action systems, Gnutella
In the most of speaker recognition system, speaker's characteristics is extracted from acoustic parameter by speech analysis and we make speaker's reference pattern. we obtain more exact performance by using dynamic characteristic and constant characteris
Prosodic Information, Speaker Recognition, VQ, Pitch, Cepstrum, Codebook
This paper presents a new approach to robot collision avoidance in dynamic two dimensional systems. Our approach uses the locus of relative velocities in order to define collisions and their resolution. This method enables us to maintain a collision free
Robot control, Multi-robot cooperation, Computational geometry
6 461-156
9 461-157
5 461-158
6 461-160
The Maximum power transfer theorem states that the maximum power will be delivered by a network to a load impedance if the load impedance is the complex conjugate of the impedance of the network, measured looking back into the terminals of the network. In
Maximum Power Transfer Theorem, KVL, KCL, Resistors, Inductors, Network Theorems,Electric Circuits
We present a unifying high-level synthesis of tree-structured and iterative networks for priority resolution modules. Based on the theory of list homomorphisms, we develop standard implementations for tree-structured modules processing the input digits in
High-level synthesis, Combinational circuit, Priority resolution module, Tree network, Iterative network, Functional hardware description
This paper describes an industrial magnetic resonance multiple imaging (MRMI) system that measures nuclear magnetic resonance of several kinds of nuclei simultaneously. We use a new principle of X-ray CT. Then we reconstruct distribution images of nuclear
Magnetic Resonance Multiple Imaging (MRMI), Fast Model Reconstruction (FMR), Image Sensing, Industrial System
The black-box view of an interactive component describes the input/output behaviour based on communication histories. The glass-box view discloses the component's internal state where the inputs effect an update of the state. We formally derive different
This paper presents a novel and efficient method for solving the economic dispatch problem (EDP), based on the Particle Swarm Optimization (PSO) with Direct Search (DS) method incorporated. The heuristic integrates DS method with the PSO and fine tunes e
Particle swarm optimization; Direct search; Evolutionary computation: Heuristics; Economic dispatch
6 461-161
6 461-162
9 461-163
6 461-164
6 461-165
6 461-169
6 461-170
Emerging network technologies such as wireless access technologies, enhanced cable modem and DSL services, and new LAN/WAN standards are creating new service and business opportunities, and are making the business case for true networking convergence. Fro
Integration and Convergence, Emerging Technologies, IP Protocol.
This paper presents a discrete event simulation framework for the systematic investigation of the effect of a condition-based maintenance (CBM) policy on the performance of an aerospace maintenance supply chain (AMSC). The AMSC considered in this paper is
Simulation, Aerospace Maintenance Supply Chain, Condition Based Maintenance
This paper describes a case study for ATM over ADSL probe and related network performance analysis. In this scenario, data traffic leaves customer site as ATM traffic running over ADSL modem links,it gets aggregated via Digital Subscriber Line Access Mult
Residential Broadband, ADSL Access Network, ATM core network, Quality of Service,Internet
The changing incidence of cancer is an increasing problem, and it would be of great benefit to be able to predict future changes. Brown and Maple have previously proposed a method for modelling such data [2]. The model appeared to perform better than exis
Epidemiology, Melanoma, Modelling, Regression, Prediction.
As Third Generation (3G) mobile networks start to be implemented, there is a need for effective network planning. Factors of particular importance include coverage and capacity issues in the planning process for cellular 3G networks. The planning proces
3G, CDMA, Planning, Coverage, Capacity
This paper focuses on design of nonlinear power plant controller using immune based multiobjective fuzzy approach. The thermal power plant is typically regulated by the fuel flow rate, the spray flow rate, and the gas recirculation flow rate. However, Str
Fuzzy control; Power plant control; Immune algorithm, Multiobjective control
The key study problem of level control of boiler (or steam generator) in power plants exists because they are typically non-linear and multi-variable with multiple control objectives. The conventional controls such as PID compensators do not have the flex
Fuzzy control; Power plant control; Immune algorithm, Multiobjective control
6 461-171
6 461-172
6 461-173
6 461-174
6 461-175
7 461-176
We consider a case study of a realistic event-driven control system, with main emphasis on behavioral requirements that define system response to external stimuli. This system operates basically in feed-back but partially in feed-forward mode. Based on th
systems, behavior modeling, statecharts, testing and validation, environment simulation
With the establishment of MPEG-video coding standards, it is expected that many video sequences will be encoded in MPEG formats. However, the implementation of videocassete recording (VCR) functionalities with the MPEG coded video presents some techical c
Multimedia Communications, Interactive Operations, VCR Control
Evaluation of the quality of the surface of some biological or technical object on the reflection measurements is very important problem in different applied arears. The quality usually is characterised by existence of the regular (acceptable)roughness an
Infrared reflectometry, Data processing, Regularization algorithm, Spline, Dental enamel
In data processing it is common to have many data files resulted from using various operations on a given original data file for different purposes. Since each operation has its own algorithm and is designed for carrying out a specific task, each resultan
Neural network, Digital data processing, Data integration, Supervised learning
The concept of ‘learning object’ represents an attempt to enhance the design of Web-based educational contents, focusing on their reusability in diverse learning contexts. The key to reusability is the provision of metadata in standardized formats for fin
Learning technology, Learning Objects, Design By Contract
Properties such as security, performance and robustness characterize the quality of services provided by distributed systems. However, security mechanisms may degrade the system performance due to the security-related processing and the communication of s
Secure group communication, Secure multicast communication, High-performance security mechanisms, Quality of service, Performance optimization
7 461-177
5 461-179
8 461-180
6 461-181
6 461-182
In this paper, we focus on the performance analysis and optimization of secure computer networks. We introduce performance aspects in the examination of secure computer networks and evaluate the impact of security mechanisms by means of queuing theory. Th
Secure computer networks, Security mechanisms, Performance evaluation, Performance optimization, High-performance security mechanisms
In this paper, we briefly discuss two web sampling techniques, stochastic sampling and deterministic sampling. We mention the basic principles and problems of each technique and we consider the problem of sampling a web subgraph about which we do not know
Internet domain Web subgraph sampling
This study is purported for suggesting a new clustering algorithm that enables incremental clustering of numerous documents. The suggested algorithm adopts the natures of the spherical k-means algorithm, which clusters a mass amount of high-dimensional do
Dynamic ART, Vector space model, Concept vector, Fuzzy ART, Vigilance parameter
Optimal Alphabetic binary Trees (OATs) have many applications in computer science. OATs can be found sequentially in O(n log n) time [1]. The advance in parallel computers and the reduction achieved by parallel algorithms justify the need for a parallel i
Optimal Alphabetic Trees- Divide and conquer-NC algorithms-Multiprocessors-Multicomputers-Shared memory- Distributed memory- Hypercube networks.
This research is aimed to the development of a dynamic control to enhance the performance of the existing dynamic controllers for mobile robots. System dynamics of the car-like robot with nonholonomic constraints were employed. A Backstepping approach f
Backstepping. Mobile Robot. Chained form. Nonholonomic Systems
5 461-183
5 461-184
6 461-186
7 461-187
6 461-188
6 461-190
The IEEE 802.11 task group E is currently working on an extension of the MAC protocol which is called 802.11e. Some of the new insertions are the Enhanced Distribution Coordination Function (EDCF) and the Burst Acknowledgment (BurstAck) feature. In this p
IEEE 802.11 protocol, Burst Acknowledgement, Performance evaluation
In this paper, a CMOS custom Integrated Circuit featuring a multi-stage Universal Switched-Capacitor (SC) Filter is Introduced. The network is based on the Generalized Immittance Converter (GIC) configuration, known for its excellent passive and active s
Filter Programmable Switched-Capacitor Vlsi-Chip Low-Sensitivity
Secure mobile multicasting is an emerging technology in this decade. In this paper, the available approaches are evaluated and a novel idea based on Neighborhood concept has been proposed to solve problems in mobile multicast communications. For this prop
Key-words:- Multicast, Mobile, Security, Complexity, Encryption, Neighborhood
The Holy Graal in telecommunications and networking today is the 'all-optical network', where every communication would remain an optical transmission from start to finish. The speed and capacity of such a network - with hundreds, if not thousands, of cha
All-optical transport network, WDM, Optical Cross-connect, MEMS
This paper addresses Digital Library evaluation. Issues regarding the evaluation of Digital Libraries and related work are presented and a method to perform this evaluation is proposed. This includes a model, the PHIMA-U model, which is introduced, includ
Digital Libraries, Evaluation, Models
Digital rights management (DRM) systems have been deployed to support electronic distribution of digital works, which has been recognized by content providers and media distributors as a great business opportunity. DRM systems protect digital goods and co
Digital rights management, Privacy protection, Privacy-enhancing technologies, Anonymous transactions
6 461-191
9 461-192
6 466-240
6 466-106
9 466-1725 466-149
6 466-260
6 466-277
4 466-144
4 466-117
6 466-285
9 466-202
6 466-131
Modern technology provides a great amount of information. But for computer monitoring systems, we need to reduce the number of variables to one or two parameters, which express the quality and/or security of the whole system. This paper presents a princip
Sensor fusion, data fusion, computer monitoring systems, real-time expert systems, computer applications
The paper gives a brief description of detailed modeling and simulation study in industry which uses Robot arms. It presents formulation and application of a strategy for control of Eight robot arms .The system is a projected assembly line for Pipe manufa
Robot ARM Simualtion in 3d Facotry
A new technique called Rank and Proximity Based Crossover (RPBC), to improve the speed and quality of solutions in Genetic Algorithms (GAs) is proposed. In real life, marriages(crossovers) occur between two individuals of similar status in society and us
Genetic Algorithm, Crossover, Fitness, Selection pressure
6 466-262
5 466-200
3 466-154
6 466-234
5 466-268
6 466-294
5 466-239
4 466-287
3 466-255
5 466-290
5 466-132
4 466-261
9 466-114
Internet-based instruction in the form of Web-enhanced courses, and further to that in full-bloom distance- and open-learning education has been in the headlines of the press for quite some time. The initiatives for the development of Web material usuall
Web-enhanced teaching, Internet-based instruction, Distance learning
The problem of how to provide QoS guarantees for multimedia cellular networks has been widely investigated. In his paper, we propose a new framework of QoS provisioning. In this framework, mobile users are categorized into different traffic classes accord
Cellular Networks, Resource Reservation, QoS Guarantee
Low earth orbit (LEO) satellites plays an important role in Earth observation and communication fields. Since communication with LEO has time limitation, it is important to have high data rate transmitters in addition to small volume and lightness propert
Power amplifier, class AB, X-band, low earth orbit satellite, high data rate, intermodulation products.
8 466-182
8 466-186
5 466-124
6 466-247
4 466-153
7 466-2356 466-232
9 466-203
6 466-171
7 466-184
6 466-269
6 466-238
7 466-250
5 466-248
4 466-147
5 466-162
5 466-157
5 466-143
6 466-101
6 466-265
3 466-252
6 466-286
6 466-289
7 466-241
5 466-228
6 466-264
5 466-279
3 466-181
5 466-108
6 466-291
For on-line handwritten character recognition, most of the existing techniques extract discriminatory features from the dynamic or temporal information of the pen movement for efficient and fast classification. We have proposed a new feature extracti
On-line handwriting recognition, Writer adaptation, Feature extraction
The M.Sc. degree project, whose one major part is explained in this paper, has been accomplished at the University of Surrey by the financial support of TUBITAK-BILTEN inclusive to the remote sensing satellite project BILSAT-1*, which is currently being c
Satellite communications, advanced modulation techniques, phase shift keying, little LEO uplink
Abstract: In This paper sample the implementation of an arithmetical logic unit fuzzy, and its application with DC motors. The process of digital control fuzzy, has four blocks to be able to make the automatic control, these blocks are: the fuzzificatio
Fuzzyfication, Defuzzyfication, Control, ALU
5 466-116
6 466-122
8 466-214
7 466-272
3 466-201
4 466-112
3 466-224
4 466-111
5 466-128
6 466-218
3 466-175
4 466-273
5 466-145
3 466-280
3 466-280
This paper describes a development of 3-dimensional spatial position and direction measurements algorithm using a magnetic sensor based on Euler framework. A prototype system that is implementing the algorithm has been designed using PIC (Peripheral Inter
Magnetic Sensor, Dipole field, Virtual Reality, Position, Direction, Euler
This paper describes the application of Emotional Learning Based Fuzzy Controller (ELBFC) to Thyristor Controlled Series Capacitor (TCSC), which might have a significant impact on power system dynamics. The function of an ELBFC is to control a firing angl
TCSC-Emotional Learning
466-198
5 466-188
8 466-185
4 466-233
6 466-237
6 466-213
6 466-242
5 466-292
8 466-135
6 466-249
6 466-164
6 466-197
9 466-243
3 466-254
4 466-225
5 466-133
5 466-258
Spline methods have attracted a large amount of interest by researchers due to their contribution in Mathematics, Statistics and especially in the area of Computer Graphics. The shapes of surfaces are important in determining the pattern of an image and t
Curve-fitting, Splines, Geometric modelling
4 466-288
7 466-115
5 466-121
8 466-199
6 466-230
7 466-244
5 466-174
5 466-275
6 466-127
5 466-2274 466-150
6 466-1058 466-125
3 466-180
8 466-156
7 466-245
6 466-134
6 466-236
4 466-257
This paper presents the experience of an on going project aiming the development of an integrated model for the customer order process, the production order process and the production system of a light metal industry (collapsible tubes). The processes hav
Petri-Nets, Enterprise modelling, Production Planning and Control
Abstract- Load forecasting is an important problem in the operation and planning of electrical power generation. To minimize the operating cost, electric supplier will use forecasted load to control the number of running generator unit. Short-term load fo
Load forecasting, Emotional learning, Critic, Neurofuzzy
6 466-270
8 466-215
5 466-210
4 466-271
7 466-123
6 466-231
4 466-293
5 466-212
3 466-211
6 466-284
6 466-256
9 466-166
6 466-155
6 466-146
5 466-209
6 466-229
Access to the common memory is the key limiting factor in the performance of shared-memory multiprocessors. The traversal of the processor-shared-memory interconnect employs large latencies as the number of processors increases. The advent of ultra-fast,
Cache-size, Shared-memory, Multiprocessor, DSP, Prefetching
The use of tools to support management is an important effort performed by researchers in several fields of computer science and information systems. In this context, we propose a system used to support planning, organization and control of operations. Th
Handheld applications, information systems, software analysis and design, management
6 466-251
4 466-165
6 466-189
6 466-120
6 466-168
4 466-276
4 466-163
6 466-107
6 466-274
6 466-173
6 466-223
6 466-169
4 466-110
466-283
8 466-208
8 466-142
In integrated services Internet architecture, the need for heterogeneous resource reservation is required for multicast routing. The problem is to optimize the total cost of the resource reserved in the multicast tree and it is proved to be NP-complete
multicast, heterogeneous resource
7 466-278
9 466-221
5 466-1095 466-151
8 466-113
5 466-204
9 466-282
6 464-212
6 464-231
Abstract - The paper considers simultaneous placement and tuning of power system stabilizers for stabilization of power systems over a wide range of operating conditions using genetic algorithm. The power system operating at various conditions is consider
Power System Stabilizer, Genetic Algorithm, Single Machine, Multi-machine.
Zamin, is a general purpose artificial environment suitable for cognitive studies. This environment, which presents high-level agents in a rather complex environment, has been successfully used as a test bed for some AI researches, like cooperative learni
Artificial life, Case-based Reasoning, Fuzzy decision making, Immerging behavior, Genetic evolution
WLANs are an emerging part of the current wireless communications providing high bandwidth to users in a limited geographical area. The IEEE 802.11 Standard is a widely used protocol for this kind of communication. In this paper, we have estimated the per
802.11, DCF, throughput, ad-hoc, infrastructure, TCP, UDP
Abstract: - Almost all real-world problems are dynamic and as such not all problem instances are known a priori. Many strategies to deal with dynamic problems exist in the literature, however they are not fully tested on combinatorial problems due to the
Dynamic Optimization, Traveling Salesman Problem, Genetic Algorithms, Combinatorial Problems
7 459-196
6 459-155
7 464-150
5 464-224
5 459-146
In this paper, we present an efficient and parallel block decomposition method for a special class of block quindiagonal matrices K of the form K = b-quindiag [C, B, A_i, B, C], A_i = A for i = 2, ..., q-1, and A_1 = A_q = A-C where A, B, and C are genera
Block Fourier decomposition, Orthogonal transformation, Simularity transformation, Block quindiagonal matrices, Linear systems, Eigenvalue problems s,
We have focused on a set of problems related to image pattern recognition and interpretation domain. In the introduction, we describe the general aspects of this computer vision task. Then we provide an approach for image objects identification and we p
pattern recognition, shape classification, graphical objects structure, image interpretation, semantic extraction, moments, image retrieval
The use of 3D models is gaining wide popularity since they are very important for graphics in various software applications, virtual reality and web3D. Recently, similarity search techniques for 3D models have been investigated intensively to retrieve 3D
Similarity search, 3D model, Dynamic programming, Partial search, Multimedia
This paper addresses the position control of a synchronous reluctance motor (SynRM). A dynamic sliding mode control scheme is proposed for the control of the SynRM. The control scheme guarantees the asymptotic convergence of the states of the system to th
Nonlinear Control, Synchronous Reluctance Motor
Uncertainty principle is one of the important bases of the quantum theory. Major concept of this principle is very difficult to understand specially with classical view. In this paper, a new approach to this drawback, using additive fuzzy system theory,
Quantum theory, Uncertainty principle, Fuzzy logic
6 464-223
3 459-111
7 464-229
6 464-117
8 459-158
6 464-120
The function for spatial queries has been provided in some image retrieval systems for finding images satisfying given spatial relations. However, images themselves may contain ambiguity or the image processing technologies adopted may extract objects not
Fuzzy set, Fuzzy match, Image database, Linguistic query, Spatial relation, Membership functions
A previous study proposes a model for improving efficiency under the data envelopment analysis structure when inputs and outputs are not allowed to adjust at wish. One problem associated with that model is that numerical difficulty may arise in variable s
Linear programming, Data envelopment analysis, Efficiency, Nonlinear programming, Fractional programming, Generalized linear program
Abstract-In this paper we present an excitation controller for synchronous generator based on fuzzy set theory. In the proposed fuzzy expert system, generator speed deviation and acceleration are taken as controller inputs. These input signal are first
Fuzzy set theory, Excitation controller, Power system,Single machine infinit bus power
The objective of this paper is the interrelation of the diverse characteristics of two categories of optimization algorithms, stochastic and deterministic, as well as the exploitation of the advantages that each method presents simultaneously. It is well
Evolution Strategy, Hybrid Optimization, Deterministic Algorithms, Vehicle Suspension.
Optimisation of manufacturing processes is a routinary task performed, having great impact on the whole production performance given its wide diffusion either in terms of number of activities involved or in terms of frequency of needs. Statistical metho
multivariate analysis; optimisation; statistical method
Realizing teaching tools in computer architecture and assembly language fields has found remarkable difficulties. The rapid machine obsolescence and the growing complexity of modern processors impose continuous revisions of the course contents and consequ
Educational software, Courseware, Computer architecture simulation
5 459-166
6 464-111
5 459-167
5 464-189
9 459-131
In this paper, a new method to calculate all stabilizing parameters of Lead-Lag type controller for a given continuous-time plant is proposed. Lead-Lag controllers are used extensively in industry and there is no solution to the problem: can a plant be st
Lead-lag type compensator, All stabilizing parameters, Continuous-time systems, Linear programming
In data processing it is common to have many data files resulted from using various operations on a given original data file for different purposes. Since each operation has its own algorithm and is designed for carrying out a specific task, each resultan
Neural Network, Data Managing and Manipulation, Data Integration, Supervised Learning
Convolutional codes have been widely used in several kinds of communication systems because of its excellent coding gain. Recently, the coded TPSK (Ternary phase shift keying) scheme has been proposed and it was shown that the scheme has attractive featu
Error correcting code, Convolutional code, Minimum free distance, Coded modulation,Ternary phase shift keying, Mobile communication
This paper proposes document clustering using a text processing competitive learning neural network. The text processing competitive learning neural network works directly on textual information without mapping taxts onto some representations that have qu
Competitive Learning Neural Network, Text Data Mining, Text Clustering, Unsupervised Learning Algorithm, Document Clustering
In this paper, a new multi-output neural model with tunable activation function (TAF) and its general form are presented. It combines both traditional neural model and TAF neural model. Recursive least squares algorithm is used to train a multilayer feedf
Neural model, neural network, multi-output, tunable activation function, recursive least squares algorithm
9 464-220
9 464-177
7 459-151
6 464-194
5 464-199
6 459-191
In this paper, a new concept for oil-water fraction measurement in multiphase flow meters is proposed. The technique is based on the extraction of stochastic features of ultrasonic waves passing through the flow pipe and the application of pattern recogni
Multiphase flow, Ultrasound wave, oil fraction, water fraction
In the oil industry, many applications require the measurement of more than one liquid level interface, often in challenging environments. In this paper, an ultrasonic technique has been developed to examine the propagation of ultrasonic waves in the oil,
Ultrasonic Device, Emulsion Level Detection, Oil Tank, Multi-layer Level Measurement
In this paper a new concept of covering is introduced. It has been formalized through structures that on one hand retain the mathematical structures of the classical concept and on the other, constitutes a more flexible framework for the outlining, formal
Logical-combinatorial pattern recognition, Covering, Testor theory, Fuzzy environments
Wavelet transform is one of the efficient tools for analysing non stationary signals such as transients, and has been widely applied to solve numerous problem in power systems. This paper demonstrates a novel application of wavelet transform to locate and
WAVELET TRANSFORM, FAULT LOCATION, POWER SYSTEM DISTURBANCES, TRANSIENTS, FAULT LOCATION
To cope with the recent mobile scenes where images are used aggressively, a novel optimized truncation architecture dedicated to JPEG2000 image coding is presented in this paper. With a rate-distortion slope based method, the proposed architecture is aime
Optimized Truncation, EBCOT, JPEG2000, VLSI, FPGA
In this paper, we solve the MOSFET RF circuit ordinary differential equations with the waveform relaxation method, monotone iterative method, and Runge-Kutta method. With the monotone iterative method, we prove each decoupled and transformed circuit equat
Nonlinear Circuit Model, MOSFET Device, ODE, Monotone Iterative Method
6 464-215
6 464-225
6 459-110
6 464-217
6 459-154
6 464-200
Various compact models have been of great interest and studied for deep-submicron metal-oxide-semiconductor field effect transistor (MOSFET) device simulation. The model parameters extraction intrinsically characterizes properties of designed and fabricat
MOSFET, EKV model, parameters extraction, genetic algorithm, Levenberg-Marquardt method
A novel square wave oscillator circuit using the current-feedback operational amplifier (CFOA) is presented. The circuit uses one CFOA, three resistors and one capacitor. The main advantages of this oscillator are that it enjoys independent control of the
Square wave oscillator, Current-feedback operational amplifier
Partitioning has a big impact on cost/performance characteristics of the system under design. It is an NP-Complete problem that deals with the different constraints relative to the system and the underlying target architecture. The existing partitioning a
Partitioning, Optimization, Genetic Algorithms, Taboo Search, Parallel Architectures
Active networks paradigm has been proposed as a solution for faster and easier deployment of new network layer services in production networks. Central to this paradigm are advanced programmable routers called Active Network Nodes (ANN). Due to their enha
protocol, autoconfiguration, active networks, adaptive systems
This work reports the application of the Computational Transgenetics metaphor to the Traveling Salesman Problem. The transgenetic algorithm applied to this problem is the ProtoG. The ProtoG performance is compared with the results obtained by two heuristi
Traveling Salesman Problem, Transgenetic Algorithm, ProtoG, Simulated Annealing, Statistical Analysis
Sizing activity estimates the computer resources required to meet the workload demand in a cost-effective manner while meeting the performance objectives. While there are several techniques to aid in system sizing, only a few are suitable for product depl
Performance Modeling, Workload, Queuing Networks, Scalability, Benchmarks
6 464-119
6 464-172
9 464-228
5 464-197
6 459-142
This paper discusses the disturbance estimation problem for continuous-time multivariable dynamical systems with arbitrarily relative degrees. The disturbances, which are assumed bounded, refer to the combination of the external disturbances, the nonlinea
Disturbance observer, Multivariable systems, Relative degree, Nonminimum phase dynamical systems, Least square approximation.
A mixed Optimal/robust control is proposed is this paper for the tracking of rigid robotic systems under parametric uncertainties and external perturbations. The design objective is that under a prescribed disturbance norm level, an optimal control syste
Robot, Optimal, Robust, Uncertainties
Abstract: - This paper describes a rule-based technique for analyzing the morphology of Arabic words. The proposed ΣMorphological AnalyzerΤ processes the input word in order to determine its lexical form. The lexical form of the majority of Arabic words
Natural Language Processing, Arabic Word Recognition, Lexical Form, Roots, Morphological Patterns, Morphological Analyzer
This paper presents the scheme for a form identification system. The scheme identifies a form by comparing the layout and features of the filled form with that of the empty forms. The main features used in the scheme are a number of lines, a number of blo
Form identification, Document processing, Form processing, Filled form, Empty form
Within the framework of an international sporting manifestation which involved 23 countries in 23 disciplines and gathered not less than 15000 participators (VIP, disciplines and gathered not less than 15000 participators (VIP, officials, athletes, judges
Optimization, Heuristic, Vehicle routing problem, Dial-a-ride problem, Pickup and delivery problem
6 459-177
6 459-164
6 464-198
9 459-214
6 459-145
A very easy to calculate time re-scaling function of the Adaptive Verlet method is proposed for the special case of three equal masses interacting gravitationally. Calculations with two different numerical integration methods for the movement of these thr
Implicit, Simplectic, Time reversible, Adaptive, Numerical Integration Methods, Movement Equations.
This paper investigates the permutation flow-shop sequencing problem from the Computational Transgenetics viewpoint. Computational Transgenetics is an evolutionary approach that aims at speeding up a search process by inserting information in the genetic
Permutation Flow-shop, Transgenetic Algorithm, Evolutionary Algorithm, Tabu Search, Combinatorial Optimization, Metaheuristics
Since scientific applications usually manipulate a very huge volume of data, parallel computing is the best choice for solving this kind of applications. However, making parallel programs is not an easy task for programmers. They need to have a good tool
Visual tool, Collective operation, Broadcast operation, Master/slave, Parallel computing, Algorithmic film
We consider the solution by Krylov subspace methods of a certain class of hermitian indefinite linear systems, such as those that arise from discretization of the Stokes equations in incompressible fluid mechanics. We discuss a diagonal preconditioning of
Krylov subspace methods, Preconditioning, Indefinite linear systems
The paper is concerned with the application of probability theory to Multi-Input Multi-Output (MIMO) transmission systems. We provide a theoretical formula to compute the error rate in such systems. Furthermore, analysis of this formula shows that simul
Wireless Digital Transmissions, MIMO, Error Rate, Random matrices, Simulation, Precision, Reliability
5 459-114
9 459-170
6 464-132
8 459-116
5 459-138
464-232
Abstract :The vulnerability value of a communication network shows the resistance of the network after the disruption of some centers or connection lines until the communication breakdown. In a network, as the number of centres belonging to subnetworks ch
Keywords:Graph Theory, Connectivity, Combinatorial Optimization,Programming involving graphs or networks, Communication Networks
The modelling and simulation of the Active Noise Control (ANC) design using the fixed feedback control for a hard-wall one-dimensional acoustic duct system is discussed. The state-space models as well as the transfer function description are derived for t
Active noise control, feedback control, acoustic
In order to study the efficacy of genetic algorithms (GAs), a number of fitness landscapes have been designed and used as test functions. Among these functions a family of deceptive functions have been developed as difficult test functions for comparing d
Genetic algorithm, Adaptive group mutation, Bit mutation, Deceptive functions, Building blocks
Algebraic numerical algorithms and algebraic finite difference equations are treated by algebraic geometrically. Embedding of algebraic numerical algorithm in affine space to projective space is treated respect to it become proper and coherent algorithm.
Algebraic discrete equation, Algebraic Numerical Algorithm
The algorithm presented in this paper ensures the computerized measurement of some motion parameters (position, displacement, average velocity) using the signals from a linear optical incremental encoder. The working mode of the sensor is with zero initia
Computerized measurement, Linear optical incremental encoder, Working mode, Displacement, Position, Velocity
An alternative design approach of a single-layer wavelength separator (SL-WS)device is presented. It consists of a single layer coating material on an absorbingsubstrate. The proposed design approach is applied for two SL-WS devices thatoperate in t
4 464-162
6 464-133
7 459-115
5 464-115
5 464-114
6 464-193
The system can handle offers and orders via Internet. Quantities are from stock inventory or production plans. Provided one partner works with both types of quantities this must know that they are managed separately. For planned quantities, time horizons
E-commerce, Secure socket connections, Client-server application, Software tools, Real-time transactions, Distributed database
Getting 3D information from 2D images depends on the appropriate camera calibration of the internal and external CCD (Charge Couple Device) camera parameters. The photogrammetric camera calibration technique needs a set of world coordinates and their cor
Machine vision, Image processing, Applications
In this work, we investigate a combinatoric problem under the name ΥDominating Subset with the Minimal WeightΦ problem that is equivalent to the Auxiliary problem which appears as solving Global Optimization problems and can be expressed as of a kind Assi
Dominating Subset with the Minimal Weight, Global Optimization, Assignment Problem, Weighted Set-
There is a permanent demand for new application and simulation software for power systems. The main idea of this work is purpose architecture of a Multi-Agent System to help operators during restoration task of power substations and distribution systems.
Multi-Agent System, Object-Oriented Approach, and Power System Operation
There is a permanent demand for new application and simulation software for power systems. The main idea of this work is purpose architecture of a Multi-Agent System to help operators during restoration task of power substations and distribution systems.
Multi-Agent System, Object-Oriented Approach, and Power System Operation
Project risk Management is making the object of several recent studies. However it does not exist a well mastered and well known lexicon domain for risk management. In other way, the tools of assistance for terminology construction of corpus have known a
Knowledge, concept, term, risk, relationship, classification.
5 464-211
6 464-135
9 464-146
7 464-158
6 459-113
A new implementation of an autonomous hysteresis chaotic circuit using only two primitive cellular neural networks (CNN) cells is presented. Both computer simulations and laboratory measurements have confirmed the chaotic behavior and show the existence
CNN, chaotic circuits, chaos, attractor, bifurcation, oscillator.
The shortest common superstring problem (SCSP, for short) is a combinatorial optimization problem which models the DNA sequencing problem in molecular biology. As for SCSP, the following things are known: SCSP is NP-hard; The performance guarantee of t
Combinatorial optimization, 0-1 integer linear programming, LP-rounding, Performance guarantee
The problem of state reconstruction from input and output measurements for a class of switching nonlinear systems with mode dependent time delays is studied in this paper and a state observer which gives exponential observation error decay is proposed. Th
Switching Nonlinear Systems, Time Delay Systems, State Observers, Infinite Dimensional Systems
: Flexible Assembly Systems (FASs) are finding increasing use in today's industry. An ordered-entry array of unit stations of Generalized CSPSs is designed and studied. The addressed problem is: Υgiven an objective cost function, design a simple FAS to me
RIC of generalized CSPS, Simple flexible assembly system, Two-stage design method, Optimization
Abstract: - The Dynamic Integrated Systems Optimization And Parameter Estimation (DISOPE) algorithm is an algorithm for solving nonlinear optimal control problems and is of the gradient descent type. The updating step of DISOPE plays an important role in
Composite maps,Newton's method, Error function, Initial solutions, Order of convergence.
5 464-167
5 459-184
6 459-195
3 464-205
6 459-104
Dynamic modeling of sensors is an important aspect in the field of instrument technique. The recurrent neural network is proposed for nonlinear dynamic modeling of sensors,as its architecture is determined only by the number of nodes in the input, hidden
Recurrent neural network; Sensor; Dynamic modeling; Recursive prediction error algorithm; Dynamic response; Mechanical sensor
Decision Support Systems (DSS) are a constantly growing area. More and more domains of the daily life take advantage of the available tools (medicine, trade, meteorology…). However, such tools are confronted to a particular problem: the great number of ch
Support Systems, Satisfiability, Optimization, Ant Colony Systems
In this paper we present new approximation expressions for the Cramer-Rao Lower Bound on unbiased estimates of frequency, phase, amplitude and DC offset for uniformly sampled signal embedded in white-Gaussian noise. This derivation is based on well-known
Statistical estimation, Sinusoidal signals, White gaussian noise, Cramer-Rao lower bound
It is well-known that a lot of problems in optimization and optimal control involve value functions and their subdifferentials since the sensitivity of these problems can be studied with the help of the behaviour of the subdifferentials of some associate
Approximate Subdifferentials, Marginal Functions, Lipschitz Functions
The attribute core of a decision table is often the start point and key of many decision information system reduction procedures based on rough set theory. In this paper, the problem of calculating the attribute core of a decision table is studied. The re
Rough set, Decision table, Attribute core, Algebra view, Information view, Computational learning, Artificial intelligence
8 464-176
7 459-105
5 464-179
6 464-127
6 464-108
Low back pain is a very common problem and the consequent cost is enormous. In spite of the prevalence, however, it is still difficult to obtain accurate diagnostics. Mechanical disorder is now often regarded as the main cause. Presently, a number of stud
- Image Segmentation, Digital Video Fluoroscopy, Real-time processing, Hardware design.
One of the drawbacks of the bootstrap method is that it is time consuming when exucuting its applications, especielly with some statistical software (example: S-plus, Minitab, Gauss..). But when using the programming languages (example: Borland Pascal, C/
Borland Pascal, S-Plus, Blocks bootstrap, Bootstrap for
This paper presents a scheme for solving the problem of broken characters in Thai character recognition systems. The proposed scheme consists of two main steps namely: broken character identification and connection of broken characters. There are two tec
Broken characters, Thai character, Character recognition, Vertical broken, Character code
It is apparent that developing dynamic models of business processes prior to their radical change could increase the success of business renovation (BR) projects. Simulation has an important role in modelling and analysing the activities in introducing BR
Business process modelling, Business process renovation, Simulation modelling, Simul8, Case study
In the present paper we suggest a synthesis of recent results obtained on the application of soft-computing techniques to solve typical automatic machines design problems. Particularly, here we show an optimization method based on the application of a spe
Soft computing, Evolution strategy, Genetic algorithms, Mechanical design, Motion profiles, Cam-follower system
3 459-190
6 459-149
6 464-188
5 464-149
4 464-203
5 464-226
Channel coding in digital transmissions can correct errors due to various types of noise. The main problem in achieving Shannon limit consists in an unacceptable growth of decoding complexity. Here a proper code concatenation and a decoding procedure ar
Linear algebra, De Bruijn graphs, Channel coding, Decoding complexity, Shannon limit, Polynomial codes
The clustering problem as a problem of set function optimization with constraints is considered. The behavior of quasi-concave functions on antimatroids and on convex geometries is investigated. The duality of these two set function optimizations is prove
Quasi-concave function, Antimatroid, Convex geometry, Cluster, Greedy algorithm
Most studies of data mining have focus on structured data such as relational, transactional, and data warehouse data. However, the most available information is stored in text database, which consist of large amounts of text documents such as news article
, Document Clustering, Unsupervised Learning, Artificial Neural Networks
We propose a sharpness enhancement technique for noise smoothing and edge enhancing in multichannel images. The proposed structure is similar to the conventional Unsharp masking structure, however, the enhancement is allowed in a new local activity measur
Color Image enhancement, Unsharp Masking, Control Rational Function.
In the paper we address the problem of reinforcements scheduling in transmission power system. The paper reports a new approach to solve the scheduling problem by combining classic optimisation techniques such as Gaussian search with evolutionary computat
Transmission Planning, Genetic Algorithms, Project Scheduling, Optimisation and mathematical programming
In the paper we address the problem of reinforcements scheduling in transmission power system. The paper reports a new approach to solve the scheduling problem by combining classic optimisation techniques such as Gaussian search with evolutionary computat
Transmission planning, Genetic algorithms, Project scheduling, Optimisation and mathematical programming
5 459-137
6 459-139
4 459-213
6 459-172
6 464-148
8 464-195
6 464-186
A complete complementary code composed of 4-phase perfect (orthogonal) sequences is shown. The sequences compose a matrix whose cube is a unit matrix. A method is also discussed, which has been proposed by Suehiro, et.al. for increasing the efficie
Complete complementary code, ZCZ sequence, Perfect sequence, Mobile communication, Multipath
Abstract:- Complex variables as we know is very representation dependent, which many think it need not be. Text books define complex numbers as using basis which makes everything including complex derivative, Cauchy-Riemann conditions etc. tied to that pa
Key-Words:- Linear operator, matrix, basis, complex, derivative, Frechet derivative
Computer Education in a Developing Countries like Nigeria. (Detailed to be sent to you later in the day)
Computer literacy, programming and editing in a develing country
Eucalyptus globulus growth excepctionally well, when dry and warm periods alternate with wet and rainy ones, and a dry year cause a decrease in the growth. This study pre-sents an effort to model eucalyptus’s growth, adjusting a relationship to reflect th
Eucalyptus, Dominant height, Precipitation, Temperature, Non linear regression
There has been growing demand for high data rate in wireless communication. One promising solution is to employ multiple antennas in either the transmitter or receiver. Unitary space-time modulation (USTM) for the coherent and differential systems are inv
Unitary Space-Time Modulation, OFDM, Frequency-selective channel.
The goal of the typical Learning Object Repository is to provide a secure database of educational resources that allows the retrieval of learning materials based on criteria important to educators. Other benefits include better management of intellectual
Learning Object Repository, Curriculum, Metatag, Database, Distributed System
A neural network is an excellent classifier; however, its performance depends directly on the size and quality of training samples presented to the network. This paper proposes a new neural network approach to deal with the classification problem by apply
Neural network, Cross-correlation, Classification, Data mining
7 464-134
7 464-214
5 459-156
9 459-127
9 459-128
Despite the increasingly intense competition, many companies do not realize the potential of database technology as a tool in reducing inefficiencies. Moreover companies overlook the possibility to obtain business intelligence from database technology. T
Database Management Systems, Warehousing, Data Mining, Supply Chain, Competitive Advantage
Decisional Portals are web-based systems furnishing summary information, statistical indicators, and graphical data reports in data warehousing environments. They are mainly used to monitor market evolu-tion and to control productivity of enterprise secto
Aggregate queries, Approximate query answering, Analytic methods, Multidimensional data distribution, OLAP applications, Orthogonal polynomial series, Canonical coefficients.
In this paper, the problem of stabilizing an open-loop unstable second-order system with time delay is considered. A constant feedback gain is utilized to stabilize the system. Using a modified version of Hermite-Biehler Theorem, which is applicable to qu
Second-order systems, open-loop unstable plants, feedback stabilization, time delay, constant
The paper presents an iterative method for the computation of reactions, which correspond to a movable control surfaces of an airplane (elevator, rudder, aileron) attached at N-points to an elastic structure. A general formula was obtained for the displac
Yielding supports, Trapezoidal loading, Three unknowns method, Slope deflection method, Reaction.
The paper presents an iterative method for the computation of reactions, which correspond to a movable control surfaces of an airplane (elevator, rudder, aileron) attached at N-points to an elastic structure. A general formula was obtained for the displac
Yielding supports, Trapezoidal loading, Three unknowns method, Slope deflection method, Reaction.
6 464-165
6 464-125
5 464-121
6 459-134
7 459-108
6 464-173
In this article, a new algorithm for determining differences between two sets of polygons is considered. It has been proven that it is enough to test only the polygon edges to perform the comparison. The algorithm works in two steps. First, the polygon ed
Geographical information systems (GIS), Polygons, Polygon comparison, Computational geometry, Algorithm.
The existence of fast networks in Malaysia has enabled the delivery of TV and newspaper content over an Internet connection. This has form a new types of integrated publications that include features from both media through interactive TV. To manage this
SMIL, XML, XSLT, News Multimedia Management System, Multimedia Interactive News
Studies of dielectric relaxation and ac conductivity of marble samples collected from Mt. Penteli (Attica) have been carried out in the frequency range of 150Hz to 1MHz. Initially reference measurements were conducted under atmospheric pressure for all of
Dielectric Spectroscopy, marble rocks, permittivity, conductivity, axial stress.
The aim of this work is to review the stages of formation of education by correspondence in Russia.
Education by correspondence, External higher education, Distance learning
- Classical discrete wavelet packet transforms are sensitive to changes in image orientation and translation. Therefore, it is hardly possible to extract rotation invariant features from images in the transform domain. This paper proposes several algorith
Wavelet Transforms, Shift Invariance, Rotation Invariance, Polar Transform
This paper describes the details of bit-exact and real-time implementation of ITU-T G.729 annex A speech codec on a fixed-point DSP processor. The DSP used for implementation is Texas InstrumentsΤ high performance TMS320C6211. In addition to developed new
Speech coding,G.729 standard,Fixed-point DSP,Real-time implementation
7 459-202
4 459-102
7 459-118
6 464-145
5 459-125
4 464-207
6 464-210
Development of mathematical model is a suitable technique to understand insect dynamical systems. It offers a possibility to bring together the results of the extensive research conducted and recognizes possible gaps in our knowledge. Once the model has s
model, whitefly, simulation, Trialeurodes, greenhouse
{Abstract:}~ In this paper, we have extended some famous exponential inequalities (Bernstein's inequality, Hoeffding's inequality and etc.) and then by using them, we proved some strong limit theorems for partial sums of negative dependence random variab
Probability Inequalities,Strong law of large numbers, Negatively Dependent
Where fuzzy regression can be applied and, in which conditions fuzzy regression method more appropriate tool for the investigations are identified in this paper. The contrast between fuzzy regression and ordinary regression analysis and three approach of
fuzzy regression, vagueness, fuzziness, randomness, insufficient data, assumptions, factorial design
We created a framework called FLoWPASS. It discusses about the the interrelation amongst the WPA, the XML Family and its integration with Database Legacy Systems. Its main idea is to separate the workflow process logic from the application components.
XML Web-Services, Workflow Process Automation, E-Government, Web-based Software Engineering
In this paper we consider solidification of some parts, specially a large heavy roller. We use Saul'yev A and B methods simultaneously, for the first time, to solve the corresponding PDE, instead of standard explicit method. The object of the work was to
Heat equation, Explicit method, Saul'yev methods, Time step.
The paper describes future evolution of fieldbuses in the frame of emerging technologies, ubiquitous computing and interoperable solution of heterogeneous communication systems in plants and enterprises. The paper describes communication architecture of t
Interoperability, Fieldbus, XML, SOAP, Bluetooth, Ethernet, Gateway
The combination of the techniques for expert systems and neural networks has the potential of producing more powerful systems. Neuro-fuzzy systems combine the positive attributes of both these approaches producing fuzzy systems with the ability to learn a
Neurules, neurofuzzy modeling, fuzzy neuron
7 464-170
5 459-132
5 459-160
3 459-152
3 459-124
6 464-171
This paper describes a new class of nonlinear filters called the Generalized Directional Distance Rational Hybrid Filters (GDDRHF) for multispectral image processing. The application at hand is color image filtering problems. The GDDRHF filter is a two-st
Color Image Processing, Vector Median Filter, Vector directional Filter, Vector Rational Filter
Abstract: - Specific factorizations and Rao┤s results [7] are used to characterize von Neumann regular inverses of Bώzout and Sylvester matrices over integral domains. Also explicit formulas to compute them are given.
Hankel, Bώzout and Resultant matrices. Integral domains. Generalized inverses.
Mersenne numbers are a particular case of a larger class of numbers, the Generalized Mersenne numbers [a^n - (a - 1)^n], characterized by their base a and exponent n. Besides known Mersenne primes, other primes can be generated with same prime exponents n
Mersenne numbers, Prime numbers, Generalized Mersenne numbers, Distributions
Periodic functions appear quite often in engineering and hence mathematicians have paid attention to its representation by trigonometric series. In this note we show some simple functions that may be easily implemented in some computer algebra systems to
Periodic function, computer algebra system
Abstract:- An abelian - difference set in an abelian group is a set consisting of group elements with the property that the list of ΥdifferencesΦ with contains every nonidentity element of exactly times. We investigate these sets from the
Group algebra, idempotent, abelian, character, multiplier, difference set.
High-performance transimpedance preamplifiers (TIAs) based on new CMOS common-gate (CG) and BiCMOS common-base (CB) schemes have been designed for optical communications. The new design approach potentially allows the efficient employment of circuit techn
Transimpedance Preamplifiers, Optical Receivers, Low Noise, Optical Communication
6 464-130
6 459-148
6 464-110
6 464-196
4 464-107
9 464-143
In this paper a new algorithm has been proposed for face recognition which is an important area of object recognition and has received substantial attention in recent years from researchers in biometrics, pattern recognition, computer vision and image pro
Face recognition, Detection, Color space, Features, PCA, Unified Bayesian, Image processing.
A hybrid technique to derive the averaged characteristic coefficients of the second-order PWM converters with discontinuous conduction mode (DCM) is developed. The starting point is the large-signal averaged model of the three-terminal PWM switch and a ne
Averaged pwm switch model, Pwm converters with dcm, Characteristic coefficients
Qualitative simulation with traditional quantity space of physical systems is often inaccurate and ambiguous, while quantitative simulation is often subjected to the difficulty in establishing a precise mathematical model. Shortcomings of both simulations
Bond graph, Dynamic system, Hybrid simulation, Qualitative reasoning
Abstract: - We propose a new solution for the problem of unsupervised image information content description generation which can be completely reversible (a pixel-level reconstruction of the original image can be decoded from an information content descr
Key-Words: - image information content, image understanding, image analysis, image description.
Security of computer and computer communications based information systems is essential for a wider acceptance of e-business solutions. Although it seemed some ten years ago that technological issues were all that was needed to be solved, it turned out t
information systems security, security policy, human factor management, modeling, simulation
Many articles have been published on performance analysis of central room air conditioners, however very limited numbers of papers have been discussed about room air conditioners. This paper investigates the performance of a room air conditioner (split ty
Room air conditioners; coefficient of performance; Performance analysis; Instrumentation and measurement; Malaysia
5 464-213
6 464-221
6 459-181
6 464-109
6 464-123
6 459-176
This paper deals with internet technologies used for the proposes of virtual laboratories. In the brief overview there are presented some basic internet technologies and complex programs which are used for modeling and executing of laboratory tasks. The o
Elearning, Distance learning, Virtual laboratory, Internet technology
Clinaid is a medical knowledge-based system that uses fuzzy relational structures for both knowledge representation and inference. The system can deal with multiple body systems. Interval-based fuzzy logics emloyed in Clinaid make it possible to deal effi
Diagnostic knowledge-based systems, interval computing, fuzzy relations, BK-products of relations, fuzzy interval logics, medicine, soft computing
Knowledge compilation deals with the computational intractability of reasoning problems. To overcome this difficulty we provide three different compilation approaches to a first order knowledge base. The knowledge base S is preprocessed by unit resolution
First order logic, Resolution restriction, Horn clauses
Detecting fault before it deteriorates the system performance is crucial for the reliability and safety of many engineering systems. This paper develops an intelligent technique based on fuzzy-genetic algorithm (FGA) for automatically detecting faults on
Fault detection, Fuzzy logic, Genetic algorithms
Abstract:- Multicast is an internet service that provides efficient delivery of data from a single source to multiple recipients. The emerging multicast applications like teleconferencing, distributed interactive simulation, online network games, online e
Multicasting, Security, Centralized, Distributed Subgroup, LeaSel, Confidentiality
In this paper, available bandwidth instead of cost is taken as the prime metric of the routing algorithms in that available bandwidth is the appropriate representative of the real network. On account of concave bandwidth, this paper first presents a novel
Group Multicast, Routing Algorithm, Available Bandwidth, Delay, Cost, K-Widest Paths
8 464-122
5 459-103
6 464-204
6 464-216
9 464-142
9 459-157
In order to use WDM networks efficiently and effectively, a lightpath is dynamically established upon the arrival of a connection request. The dynamic routing algorithms are usually classified into adaptive and alternative schemes based on whether the cho
WDM Network, Adaptive Routing, Alternative Routing, Exponential Link-cost Function
{Abstract:}~ In this paper, we consider {majorization principle} which is used to extend some inequalities. Obtained results are used to consider inequalities of the form $ \ Bx\ _{d(w, p)} \ds \geq \ds L_{w,p}(B) \ x\ _{d(w, p)} \ \ \left(\ Bx\ _{\el
Majorization, Inequality, Lower bound, Weighted mean matrix.
More and more services require some personal information about the user in order to work properly. In this paper we present Mobile E-personality (ME) service that contains such personal information about the user. This information is stored in a single mo
Personalisation, Privacy, Mobility, Personal Information, Services
A model of a nonautonomous dynamical system whose operations show turbulent behavior is presented. The system trajectory appears to be similar to that of a simplified tornado. The electronic circuit of this model is implemented using two linear capacitors
Turbulence modelling, chaos, attractor, bifurcation, oscillator.
A state-space dynamic model for a palm wastes boiler is being developed and simulated. The unique feature of this boiler is that it uses wastes in the form of fiber and shell from the palm oil processing as its fuels. Specific characteristics of oil palm
Palm oil millboiler; Dynamic modeling; State space; Simulation; Power plant
We investigate a new scheme for hybrid video compression in the framework of object-oriented approach. This scheme is split into 3 main steps : object motion parameterizing with wavelets, fast piecewise trajectory modeling and motion prediction. The hybri
Video compression, spatio-temporal motion-tuning wavelet, object trajectory, identification.
5 464-185
5 464-124
8 464-227
7 464-184
6 464-144
6 459-174
In this paper, new finite numbers of conditions which are equivalent to the so-called generalized invariant subspaces whoes definitions have infinitely many conditions are studied.
Generalized invariant subspaces, Geometric approach, Linear systems, Feedback control, Disturbance-rejection problems
The wavelet transform is a comparatively new and fast developing method for analysing signals. The main advantage of applying the wavelet transform to the detection of edges in an image is the possibility of choosing the size of the details that will be d
Wavelet transform, Edge detection, Image, Signal, Analysis
This paper deals with the identification and the control of nonlinear processes described by input -output models, such as parametric Volterra models. In particular, we extend an adaptive predictive algorithm without taking into account constraints. The c
Predictive Control- Esterification Reactor - Parametric Volterra Model - Constrained Optimization
Perspective dynamical systems arise in machine vision problems, in which only perspective observation is available, and the essential problem is to estimate the state and /or unknown parameters for a moving rigid body based on the observed information.
Nonlinear observer, Perspective system, Time-varying systems, Observability, Exponential stability
:Ω Failure of mechanical controllers onboard a satellite is a common phenomenon, which the consequences have already been severe and even disastrous for several space missions. In the case studied here, we take as an example the mini-satellite UoSat-12 bu
Underactuated, Time varying, Discontinuous control, 3-axis stabilization, Reaction wheel, Satellite.
The paper presents general assumptions for a prototype application (called ObAn) for supporting teachers applying e-learning in their work. The application implements a systematic methodology for defining various kinds of resources, including teaching pat
Distance learning, Teaching resources, Learning methodology, System for supporting learning, Reuse assets
6 459-144
8 459-122
4 459-129
6 459-203
9 459-180
6 464-118
Abstract: - The input to network reliability problems is a probabilistic graph G=(V,E), where V is a set of vertices and E is a set of edges, representing pairs of vertices. All edges of a probabilistic graph can fail randomly and independently of one ano
Coefficients of reliability polynomial, Fibonacci graph, Mincut, Operating path, Probabilistic graph, Reliability, Reliability polynomial, Size of mincut, St-connectedness, St-dag
We present a basis free construction of complex differentiability
Complex, Basis, Representation
Abstract:- We use the tools of statistical decision theory to investigate if there is any significant difference in the mathematical ability between male and female students of the North South University, Bangladesh. We begin with the null hypothesis of
Gender, aptitude, mathematics, test, hypothesis, sample, distribution
The displacements of plasma in vertical direction are the most dangerous instabilities in tokamaks with a divertor. A set of passive conductors is used to stabilize fast instabilities. To control slow plasma motions an active feedback system is applied. I
Eigenvalue problem, Tokamak, Plasma, Vertical stability
Admissible orderings on the set of terms arise in the theory of Gröbner bases of ideals in multivariate polynomial rings. These orderings have already been classified by a constructive proof of the embedding theorem for ordered groups. We approach the su
Term orderings Lexicographic orderings Groebner bases Polynomial reduction
Parametric software estimation techniques make use of mathematical models elaborated from regression techniques to obtain effort-of-development estimates. As a matter of fact, the values of the cost drivers that act as variables in these models are inhere
Software effort estimation, fuzzy regression, parametric estimation models, fuzzy variables, COCOMO.
8 459-211
6 459-147
5 459-112
6 464-141
5 459-212
6 464-116
4 459-153
Abstract:The chief goal of the partial scan insertion is to identify the minimum number of registers, which will enable high fault coverage with low test application time. This paper presents a partial scan insertion methodology based on a testability ana
Fuzzy,Testability,Controllability,Observability,Partial Scan
In this paper we study the optimal control of system driven by hemivariational inequality of second order. First, briefly we establish the existence of solutions to hemivariational inequality which contains nonlinear pseudomonotone evolution operator. Int
hemivariational inequality,pseudomonotone operator, multifunction, optimal control problem,Clarke's subdifferential, constitution law
Abstract: - Calculating VaR is in essence an estimation problem but confidence intervals of point estimates are needed for assessing their accuracy. Risk management for complex portfolios may consider simultaneously two or more VaR confidence levels. The
Order statistics, Multivariate joint distributions; Value-at-Risk, Expected tail loss,
It` explored the designing of intellectual systems problem, which used for acceptance of the exact and operative solutions at control vehicle remote sounding of the Earth. It have example, where the acceptance of operative solution on elimination of conti
Intellectual systems, control, knowledge base, acceptance of the solutions
We consider models of sequential programs (recursive program schemes) and analyze their extension with parallel functions. For this purpose, we introduce a special class of parallel functions (called invariant functions) that don’t depend on interpretatio
Program models, Semantics, Parallel functions, Expressive power
In this paper the techniques of evolutionary system identification are implemented in the parametric, time domain identification of a flexible robotic arm. More specifically, the (ì+ë) Evolution Strategy (ES) is used for the estimation of both ARMA and AR
System Identification, Evolutionary Algorithms, Modal Analysis.
The Streaming SIMD Extension (SSE) is a special feature that is available in the Intel Pentium III and P4 classes of microprocessors. As its name implies, SSE enables the execution of SIMD (Single Instruction Multiple Data) operations upon four 32-bit flo
SIMD Parallel Mechanism, LU Decomposition, Performance Optimization
4 459-135
9 459-162
7 464-166
6 459-210
6 459-143
4 459-178
The design and tuning of fuzzy PID controllers is still a complex task because the numerous parameters involved in its structure. The success of a PID controller is related to its ability for predicting the error in the system output. This paper proposes
Fuzzy logic, Automatic control, Time series
Abstract: - This paper focused on portfolio analysis that set-up among 10 selected stocks from Kuala Lumpur Stock Exchange (KLSE). Two types of analysis conducted in this paper, which is daily analysis and weekly analysis using single index model. The res
Investment return, Investment risk, Diversification, Portfolio theory, Expected return and risk
Decision support has become vital in major scientific and organisational areas. Data analysis and knowledge acquisition are no longer means to an end, they have become the end itself. Knowledge discovery is a priority, constantly demanding for new, better
Knowledge Discovery in Databases, Data Preparation, Feature Selection, Data Mining, Multi-Agent Systems, Neonatal Risk Indexes and Receiver Operating Curves.
Abstract: Actually, the analysis of species-rich, well-defined food webs is based on the characterization of the clustering degree as well as the path length between species that conform the ecological network. We applied here a different approach to stud
q-analysis, simplicial complexes, food webs, networks, Small-Worlds.
Quantum interference and quantum entanglement are very well known physical phenomena that can be exploited in order to test new modes of computational facilities. Searching procedures notoriously belong to the class of intractable problems and encryption
Quantum Interference, Quantum Entanglement, Searching Algorithms, Encryption Systems
One of the major tasks in Web search technology is query expansion. End users interacting with the results of a search may refine the initial query submitting, for example, the URL to the system. Tasks for that system are then to find appropriate informat
Query Expansion, Search Engine, Context Information
6 464-163
6 464-138
6 464-160
5 464-112
4 464-104
Reales Software is a set of powerful software tools designed to automate the storage and analysis of commercial real estate information. Reales is ideal for tracking and analyzing data on commercial properties, including land and improvements, sale, lease
Real estate, Client-server application, Software tools, Real-time transactions, Distributed database, Secured socket connections
AbstractΩThe reflexive action of a 5th dimension involving configurational time can be seen to have a magic touch reciprocal relationship with 3 and/or 4 dimensional structure, resulting in the information transmisson termed Υnon-localΤ, PK/ESP or quantum
Key-Words: traction, time, logos, esp, non-local, reflexive, transduction, quantum, kinetic, relativity, causality, mass index, uncertainty, guage.
Circular dynamic stereoscopy (CDS) has special advantages as it enables a 3-D measurement using a single CCD camera without a cumbersome setting. Annular streaks are recorded using this system and the size of annular streaks directly concerns to the depth
robot, vision, image processing, three dimensional measurement, CCD, multi spot laser, calibration
In the present article is explored the kinematics and statics of shape memory alloy tendon-driven finger. Shape memory alloy offer other interesting solution, using the shape transformation of the wire/structure in the moment of applying a thermal type tr
robotic finger, shape memory alloy, mathematical modeling, numerical simulation, robotics.
Peer to peer computing is useful to provide, share and download data directly from all personalcomputers unlike established computing on looking into data by search engine. But it is defenseless state forsecurity of private data in each computer that
secret sharing , authentication, peer to peer computing, public key, security
8 459-199
4 464-139
7 459-101
7 464-168
6 464-192
6 464-178
This paper formulates production policies to maximize the performance of an apparel manufacturing system that replenishes basic items characterized by a flat average demand. The simulation-based model compares a number of production strategies and chooses
Ordering production, Scheduling production; Heuristic policies, Replenishment items
A sequential cancellation scheme and its improvement is given in this paper for multi-user detection. Multi-user detection is expected to enhance capacity of the Wideband CDMA scheme. This scheme is composed of (a) estimation and compensation of phase ro
sequential interference cancellation, wideband CDMA, multiuser detection, multipass phase rotation, pilot signal
The objective of this paper is to describe some pattern recognition approaches for image segmentation. First, in the introduction, we present the general aspects of omogenity and texture recognition. Then we provide a mean-based feature extraction approac
Image segmentation, Classification, Texture analysis, Moments, Uniform regions, Pattern Recognition
This paper presents a simple, accurate and inexpensive measuring device for water-cut in oil. The new device is based on the relationship between the water-cut in oil & water mixture and the pressure of a sample from the mixture. Experimental results show
Water-cut, Oil, Pressure, Simple, Accurate, Inexpensive
In this paper, we modified some operations of LFVC algorithm to implemant the LFVC based scheduling algorithm in the output bufferd switch system. We analyzed output traffic charateristics of our algorithm when we changed input rates and guaranteed rates
Leap, Forward, Virtual, Clock, Scheduling, Algorithm, Simulation, QoS
In this paper, a character recognition scheme called SMILE (Structural Multi-Level Intelligent Literal Encoding) is proposed for printed Thai character recognition system. The characteristics of Thai sentence are employed to segment characters into groups
Printed Thai characters, Character recognition, Feature matching, ART1, Feature analysis
9 459-171
6 459-136
6 459-130
6 459-168
4 459-123
6 464-180
Based on the Renormalization Group (RG) method a reduction of the system of (coupled) Schrodinger equation and Poisson equation in one (spatial) dimension has been performed. It has been shown that the slowly varying amplitudes of eigenmodes satisfy a sys
Quantum systems, Space-Charge, Soliton
Classification of spatial and planar tessellations generated by various point processes is proposed and discussed. The database of computer simulated tessellations accessible by Internet is described and its applications are shortly covered.
Classification of Voronoi tessellations, Database of tessellations, Grain size estimation, w-s diagram
In this work, a simulation model of market electric expansion is proposed, to take time and space into account. This model is based on spatio-temporal disorder ideas. The spatial load evolution is simulated using a dynamic system, which main components ar
Spatio-temporal Disorder; Dynamic Systems; Spatial Forecasting; and Simulated Annealing
Phase shift keying (PSK) is one of the most important classes of digital modulation schemes. M-ary PSK of which the value of M is other than the n-th power of 2 has not been focused on until now because it is not suitable for transmitting binary informati
Digital modulation, Phase shift keying (PSK), Ternary PSK (TPSK), Spectrum characteristic, Non-linear amplifier, Square root cosine roll-off filter
Abstract:- In this paper we suggest a method that can be used to approximate square root of an arbitrary prime number . The method makes use of Monte Carlo Simulation Technique in order to estimate the probability of the event that a point chosen random
Key-Words:- Approximation, error, sample, probability, confidence, random, root
In this paper, we analyze stability and L2 gain properties for discrete-time linear time-invariant (LTI) systems controlled by a pre-designed dynamical output feedback controller which fails from time to time due to physical or purposeful reason. Our aim
Linear time-invariant (LTI) system, dynamical output feedback, exponential stability,
8 459-126
4 459-159
6 459-173
4 459-175
8 464-105
5 464-156
6 464-137
The paper primarily deals with exposing a simple statistical equation to analyse a system in dynamic equilibrium or in steady state. Though such a system in equilibrium can be studied by detailed analysis of physical situation and its microscopic behavior
Statistical Mechanics, Dynamic equilibrium, Number density, Relaxation time etc..
Was offered the statistical method of the vehicle trajectories researches in an atmosphere. It was based with the theory of Markovian process. It was supposed, that the space vehicle is in the one of the beforehand conditions of a phase space. The vehicle
statistical method, motion of space vehicle, probability, discretization of a phase space
This paper describes a physically interpretable notation named strain gradient notation for writing finite elements polynomials that model the behavior of solid and structural mechanics problems. The displacement and strain fields are written in terms of
Finite element, Strain Gradient notation, artificial stiffening, parasitic shear
A stack is a widely used data structure. Some of its applications are in compilers for converting an expression from infix form to prefix or postfix form, and also in recursive programming to maintain the address of returning points. In the present work w
Stack,Push,Pop, Induction.Expression
Machine learning is a major branch of AI and a main research direction of multi-agent systems (MAS). With the emergence of various new complex systems, agent’s individual ability and the system’s intelligence level are urgently to be improved. Agent learn
Multi-agent systems (MAS); Group learning; Hybrid intelligent learning; Robot soccer
This research is an attempt to present experimentally the capability of the hot pressed ceramic tools for turning different types of steel. The experimental study was achieved for semifinishing, finishing and fine turning. In this case, the tool wear, lif
Machining, Turning, Alumina base ceramics, Cermet, Process quality, Tool life.
In this paper, an evolutionary algorithm based on a tabu search procedure is discussed for solving four-criteria optimisation problem of finding a set of Pareto-suboptimal task assignments in parallel processing systems. A new tabu mutation is used for mi
evolutionary algorithm, multi-criterion optimization, distributed systems
8 464-182
6 459-109
5 464-230
6 459-133
6 459-150
9 459-165
The Network Simulator 2 is a powerful tool for the study of network protocols and systems, and has become the prime choice of researchers, teachers and engineers when it comes to simulation. Although there is a graphical tool for the display and interpret
Networks, Simulation, Protocols, NS-2
This note aims to present a concept of a duality theory for dynamic production processes with constraints i.e. production processes described by dynamical mathematical models (models depending on time).
Dynamic programming, Operation Research
This paper investigates the effect of phase offsets, due to inaccurate estimation of the desired user fading process, in the performance of minimum mean-squared error (MMSE) receiver-based direct-sequence (DS) code-division multiple access (CDMA) systems
CDMA MMSE Receiver Phase Offsets
We consider the Υauthority-societyΦ model firstly introduced by A. P. Mikhailov. We introduce the generalized approach which supposes the existence of two stable authority profiles. The first profile is related to the hierarchy having a large number of po
Semilinear parabolic equations, Singular perturbations, Contrast structures, Mathematical modeling
- This work investigates the problem of determining the configuration of a cogeneration system that uses natural gas as its primary source of energy, such that the cost of this solution is minimum. Two parallel evolutionary algorithms are presented to sol
cogeneration system, natural gas, evolutionary algorithm, memetic algorithm, transgenetic algorithm, parallel algorithm
The paper investigates relationship between algebraic expressions and Fibonacci graphs (which give a generic example of non-series-parallel graphs). We propose the uniform generalized decomposition method for constructing Fibonacci graph expressions. On e
Complexity of an algebraic expression, Fibonacci graph, Optimal representation of the algebraic expression, St-dag, St-dag expression
6 464-201
6 459-209
5 464-159
9 464-222
7 464-129
7 459-141
We provide a knowledge compilation technique which deals with the computational intractability of first order reasoning problems. The notion of prime implicates is extended to theory prime implicates in first order case. We provide an algorithm to compute
Theory prime implicates, First order logic, Knowledge compilation
A new and versatile method of geometric modeling is proposed. Methods of geometric modeling for the object shape approximation proposed so far are “modeling-after-measurement,” but this proposal is “measurement-after-modeling.” A three-dimensional geometr
3D geometric modeling, 3D model modification, Reuse of 3D model, Topology conserved model modification, Modeling of natural object, 3D machine vision.
Three-dimensional measurement has achieved a high level of satisfaction in limited fields. Nevertheless, if the measuring object includes complex parts, unmeasurable area exists for occlusions of the part on its surface in many cases. In order to reduce t
Shape Measurement, Vision, Image processing, Three dimensional measurement, Calibration
In this paper the well known observer based Fuel Air Ratio control law is further investigated. Its very good performance is once again shown here by simulations. In this paper a model which takes into account the gases mixing dynamics of consecutive exh
Fuel air ratio, Engine, Observer, Time delay, Event Based Model
In this paper we propose and discuss a method for Word Sense Disambiguation. A Lexicon approach is presented based on the use of the WordNet. More precisely, the context and the senses of the ambiguous word are represented as vectors of weighted terms, in
Word Sense Disambiguation ; Natural Language Processing ; Wordnet ; Vector space model
The paper presents a numerical method for two-dimensional transport equations, which use the variational calculus. In order to find out the solution of the stationary regime we consider a function u, which satisfies the boundary conditions and minimizes a
Transport equation, Variational calculus, Euler-Lagrange equation
6 459-179
4 459-107
6 459-206
6 463-101
9 463-102
The cellular automata (CA) models and corresponding algorithms have a rich theoretical basis. They have also been used in a great variety of applications. A number of programming languages and systems have been developed to support the implementation of t
Cellular automata, Multiple views, Visual representation, Self-explanatory components, Programming environment
Where fuzzy regression can be applied and, in which conditions fuzzy regression method more appropriate tool for the investigations are identified in this paper. The contrast between fuzzy regression and ordinary regression analysis and three approach
fuzzy regression, vaguness, fuzziness, randomness, insufficient data, assumptions
XKMS(XML Key Management Specification), one of XML Security specification, defines the protocol for distributing and registering public keys for verifying digital signatures and enciphering e-documents of electronic trading applications with various and c
XKMS. XKISS, XML Security, XML. Key Management, Electronic Trading, PKI
Abstract To avoid network congestion it is very important to know the characteristics of the source transmission behaviour. Having a prior knowledge of source behaviour leads us to better source scheduling and prevention of burst overlapping. Here we have
Congestion control, ATM, Cell packing, video source traffic distribution
8 463-104
7 463-105
9 463-111
9 463-112
6 463-116
6 463-118
Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents an efficient classification algorithm in digital mammograms in the context of rough set theory. Featur
rough sets, mammograms, classification, feature extraction, rule generation, similarity measure, gray-level co-occurrence matrices
A moment method has been presented to analyze small linear arrays consisting of longitudinal slot in the broad wall of a rectangular wave guide, after taking the effect of mutual coupling, both internal and external in to consideration. The wall thickness
array,slot,rectangular waveguide,numerical simulation,Moment Method
In the contracting business, construction firms are generally more concerned with short-term financial strategies than the long-term ones. Working capital management is the central issue of all short-term financial concerns. More importantly, cash managem
Fuzzy S-curve regression, working capital management, cash flow.
This paper proposes a design method of control performance for structural systems using Tagagi-Sugeno (T-S) fuzzy model. The structural system with tuned mass damper is modeled by T-S type fuzzy model. By using parallel distributed compensation (PDC) sc
control, linear matrix inequality, parallel distributed compensation.
We investigate a new scheme for hybrid video compression in the framework of object-oriented approach. This scheme is split into 3 main steps : object motion parameterizing with wavelets, fast piecewise trajectory modeling and motion prediction. The hybri
video compression, spatio-temporal motion-tuning wavelet, object trajectory, identification.
EMI/EMC is a potential threat to the working of various electrical and electronics devices .To reduce it ,absorbers come as handy tools.This paper presents the theoretical analysis and design of single layer microwave absorber using hexagonal ferrite in
:- EMI/EMC Hexagonal ferrite,Microwave absorber, ComplexPermeability, Radar Absorbing Materials
4 463-119
8 463-120
5 463-122
9 463-123
5 463-124
6 463-125
This paper reports some measurements performed in different testing techniques used in E.M.C(Electromagnetic Compatibility). The developed models fulfill the properties of the coupled transmission line theory. The testing methods are TEM cell and GTEM cel
Emc, Tem cell, Gtem cell.
: Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents an efficient classification algorithm in digital mammograms in the context of rough set theory. Fea
: rough sets, mammograms, classification, feature extraction, rule generation, similarity measure, gray-level co-occurrence matrices
In this paper, we have implemented a dithered quantization model to be used with perceptual distortion metric. Mean-square-error (MSE) based cost functions are mostly used for image coding. However, MSE does not necessarily preserve the perceptual quality
Subtractive dithered quantization, Minkowsky metric, Perceptual coding
The real-time transport protocol (RTP) provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. Its companion control protoc
RTP, RTCP, RTCP Scalability, Multimedia Protocols, Real-time protocols
Visual communication plays an important role in human communication and interaction. In order to interact socially, we must be able to process faces in a variety of ways. In this paper, an algorithm for invariant recognition of human faces based on LVQ ne
Pattern Recognition, Computer Vision, Adaptive Classification, Invariant Face Recognition
Abstract: - The flow shop scheduling problem has been thoroughly studied from a variety of perspectives in the last years and a number of solution methodologies have been proposed depending on the production characteristics. However, the methods are often
Key words: - Flow shop scheduling; Makespan; Nonlinear models; Time simulation; Hybrid combinatorial evolution strategy
6 463-126
6 463-129
6 463-132
4 463-133
9 463-134
Abstract: - Modern investment processes often use quantitative models based on MarkowitzΤs mean variance approach for determining optimal portfolio holdings. A drawback of using such techniques is that the optimality of the portfolio structure only holds
Key words: - Portfolio; Min-max optimization; Nonlinear models; Time simulation; Hybrid evolution strategy
The method for numerical study of the open quantum systems is proposed. It is based on our recent results in the field of numerical integration with respect to probability measures in complete separable metric spaces. Our approximations satisfy the condit
Functional integral, Metric space, Gaussian measure, Approximations, Quantum mechanics, Propagator, Markovian open system, Density operator, Numerical integration
Palmprint verification provides a new way for personal authentication. Former research on this topic mainly focused on crease extraction but little has been done on palmprint registration and crease matching. In this paper, we present a new bi-directional
Biometrics, Palmprint Verification, Palmprint Registration, Feature Matching, Bi-directional matching.
A sequential cancellation scheme and its improvement is given in this paper for multi-user detection. Multi-user detection is expected to enhance capacity of the Wideband CDMA scheme. This scheme is composed of (a) estimation and compensation of phase ro
multiuser detection, sequential cancellation, wideband CDMA, multipass phase rotation, pilot signal
Content-based image retrieval using region segmentation has been an active research area. In the paper we present a method of image segmentation using EM algorithm, a full automatic segmentation algorithm and has been run on 1000 natural images. For effec
Content-based image retrieval, image segmentation, Expectation-Maximization, region description.
5 463-137
6 463-138
6 463-139
5 463-140
5 463-143
5 463-144
This research is an attempt to present experimentally the capability of the hot pressed ceramic tools for turning different types of steel. The experimental study was achieved for semifinishing, finishing and fine turning. In this case, the tool wear, lif
Machining, Turning, Alumina base ceramics, Cermet, process quality, Tool life.
A new lossy image compression method based on adaptive Chebyshev polynomials is proposed. The compression is achieved by representing the grey level variations across any determined section of a row or column of an image by the coefficients of a polynomia
Lossy Compression, Chebyshev Polynomial, Adaptive Least Squares Fitting, JPEG
Abstract: In this paper, the simulation of the electric field distribution and Specific Absorption Rate (SAR) of EM energy at 900 MHz in the human head due to the radiation from the mobile handset using FDTD has been presented. The head models used are
simulation,FDTD modeling,specific absorption rate, human head,mobile handset,electromagnetic energy ,radiation
Abstract: Widespread use of cell phones and other types of hand held transceivers has led to increased concern about possible health hazards, particularly about brain cancer, as the antennas for these phones lie along the head during usethe safe limit of
Specific absorption rate,Interaction of e.m. energy,Mobile handset,Human head Health hazards
This paper present the design, development and characterization of the hexagonal ferrite powder [BaCo0.5dTi0.5dMn0.1Fe(11.87-d)O19] at d=1.6 as microwave absorber. The hexagonal ferrite powder has been developed by dry attrition and sintering procedure
Hexagonal Ferrite, Radar Cross Section, Microwave Absorbing Paint
Multi-agent systems (MAS) could be (and already are) applied in different areas. In LARIS - Laboratory for robotics and intelligent systems, FESB, University of Split, a number or experiments investigating multi-agent system capabilities are currently in
Multi-agent system, charter system model, agent behaviour
7 463-145
6 463-146
6 463-147
4 463-148
6 463-150
6 463-151
:- A computer program for the exegetic optimization of a gas turbine power plant has been developed. This program is based on the thermoeconomic functional analysis, and uses the first and second laws of thermodynamics. The optimization process is carried
optimization, exergy, gas turbine, energy
In this paper, we propose a thinning algorithm for Arabic handwriting using color coding for both thinning processing and gap recovery in the final output skeleton. This algorithm is designed so that it accepts unconstrained Arabic handwriting. Different
Character recognition, image processing, thinning algorithm, skeletonization, connectivity preservation and Arabic handwriting
A model of so-called Web Services Network was built to replicate emerging e-business models with next generation business processes referred to as Web service business processes. The aim was to create a platform for customers to easily self-serve and tran
e-business model, business processes, Web services, Web Services Network, service-centric enterprise
The TTL (transversal transmission line) method is applied to the analysis of patch resonator, as a planar antenna. A set of equations that represents the electromagnetic fields in the x and z direction as function of the electric field in the y direction
Resonator, antenna array, transverse transmission line method
Augmented reality is a kind of technology in which the userΤs view of the real world is overlaid (combined) by virtual graphic model. For video see-through augmented reality system, camera calibration is one of important issues since real environment ima
Camera calibration,Augmented reality,Firewire, TsaiΤs model
This paper presents an implementation of a natural language interface module in the intelligent employment agent. It provides employment information gathered by national employment institutions in Slovenia through the telephone or through the Internet. Th
Intelligent systems, Intelligent agents, Natural language interface, Text-to-speech synthesis, Employment
6 463-152
8 463-153
8 463-155
5 463-158
6 463-159
6 463-160
The communication theory suggests some rules in the conduction of a psychological interview: the turn taking importance is underlined, the interviewer should carefully listen to the interviewee, is supposed to accept him/her and to use his/her language
Chaotic systems, Cognitive system, Modelling, Communication process, Feature extraction
The need for a treatise filtering system for researchers in companies is increasing. It is a key point for the improvement of system's performance to clarify the most effective section in treatise, from where the information to construct the system shoul
document filtering, profile, treatise, class separability, relevance, evaluation index
This paper deals with the identification and the control of nonlinear processes described by input -output models, such as parametric Volterra models. In particular, we extend an adaptive predictive algorithm without taking into account constraints. The c
Predictive Control- Esterification Reactor - Parametric Volterra Model - Constrained Optimization.
Syllable segmentation has many applications in the speech recognition and synthesis. Some methods based on energy contour have been used in end point detection. However they are not so reliable. In this paper, we propose a new algorithm. We introduce a ne
Syllable segmentation Spectrogram Syllable core Contouring algorithm Farsi Syllable.
Abstract : the main idea of the multimodel approach is to represent a complex system by several models having each a given validity'domain chiffred by a validityΤdegree. These validities'degrees are exploited in the fusion step of the base'models in order
Multimodel Approach - Uncertain Systems - Validity Computation - New Approach - Residues
Abstract: - The multimodel approach is a research subject which is recently developed for modeling, analysis and control of complex non linear and non stationary systems. This approach supposes the definition of a base of local models. Each local model ca
Multimodel, Validity fusion, Fuzzy supervisor, ModelsΤ base, Uncertain systems
8 463-161
6 463-163
4 463-165
5 463-166
6 463-167
6 463-168
5 463-169
This paper presents a comparative study of two well-known network simulators: OPNET Modeler and Ns-2. Other studies in this area have generally been confined to just one simulator. The motivation of this paper is to provide a guide to researchers undertak
network simulator, OPNET Modeler, Ns-2, simulation methodology
The aim of this paper is to offer a methodology to simulate an environment for e-learning that contains all informations in a large server that is interconnected by Internet with the studentΤs computer. It describes the needs and difficulties for an e-
Petri Nets, XML, Java, MOVIX, e-learning, simulation, Markov
The paper describes a wireless short-range data transmission using the inductive method, which is designed for the transmission of short protected data messages over short distances between a moving vehicle and a stationary receiver/transmitter. The data
Inductive data transmission, Induction coil, ASK modem, Municipal transport information system
The break of the 2nd and the 3rd century is in telecommunications characterised by an integration of various services that are provided by different networks into a single network. This trend is called service integration or network integration. Currently
QoS, Network, Interconnection, Trunked, Radio
The use of fuzzy models for optimization purposes is described in this paper. The presented problem is the minimization of operation costs of the large area gas distribution system. The character of the gas consumption is uncertain, nonlinear and complex.
fuzzy modelling, hierarchical system, fuzzy system, optimization, gas industry
This paper describes our advances in the development of the Czech TTS system achieved mainly in the field of speech signal generation. We achieved very high quality of the synthesized signal with our time-domain TTS system, but the speech unit database ne
Speech signal synthesis, Harmonic/Noise, Phase components
In this paper an Integrated System to access the wind tunnel CT1 (Calibration Tunnel number 1) sited at CIRA (Italian Aerospace Research Center), through a scalable networking infrastructure and supporting multimedia technologies is presented. The reliabi
Remote laboratories, e-learning applications, geographical network, remote control, wind tunnel
7 463-171
4 463-172
9 463-173
6 463-174
6 463-175
The acoustic feedback (also called Larsen effect) is the physical phenomenon common to all the active acoustical spread systems where at least a microphone is present and it is produced whenever the amplification gain exceeds a critical level. Traditional
Acoustical feedback, Larsen, Notch filter, Lattice, State space, Dsp, Tms320c6711
In this paper, a non-invasive, cardiac risk-stratification method is introduced based on the discrete wavelet coefficients of an EKG signal. Two groups of signals taken from four EKG databases are compared for cardiac risk: arrhythmic patientsΤ sinus rhy
Risk Stratification, Sudden Cardiac Death, Wavelets, EKG
The Rake receiver for wavelet video compression with four levels of unequal error protection (UEP) codes in wide-band code division multiple access (W-CDMA) system over additive white Gaussian noise (AWGN) and Rayleigh fading channels are performed and ev
Rake receiver, Unequal error protection codes, Embedded zero-tree wavelet transform, Two dimensional wavelet packet transform, Wide-band code division multiple access, Additive white Gaussian noise, Rayleigh fading channel.
The task of visual speech synthesis is usually solved by concatenation of basic speech units selected from a visual speech database. Acoustical part is carried out separately using similar method. There are two main problems in this process. The first pro
Audio-visual speech synthesis, Hidden markov models, Coarticulation, Talking head, Multimodal speech processing
In this paper, we describe a new scheme to color image segmentation which is based on supervised pixel classification methods. Using color pixel classification alone does not extract accurately enough color regions, so we suggest to use a strategy based o
Segmentation, Pixel classification, Color image, Quality evaluation, Watershed growing
8 463-176
9 463-177
4 463-179
6 463-180
3 463-182
6 463-183
This paper proposes a trimmed filter approach, TIRM (trimming integrated region matching), for region-based image retrieval. In our retrieval approach, an image is segmented into a set of regions by using Expectation-Maximization (EM) algorithm, a full au
Content-based image retrieval,Image segmentation,Trimmed region feature,Similarity measure
Traditional numerical methods to solve nonlinear stochastic differential equations (SDEs) have usually established on Taylor extension. One of the deficiencies of these methods is that we should repeat these methods many times to obtain the various orders
Stochastic differential equation, Chebyshev approximation, Moment bounds, Nonlinearity,Euler method
It is certain that Quality of Service (QoS) functionalities will play the important role in the mobile networks that are yet to come. The deployment of these functionalities poses significant challenges to the network designers, who have to take into the
Mobile Networks, QoS Negotiation
T/2 soft DFE is based on idea of transforming a classical DFE to a cascade of uncoupled linear devices. The crucial component of this cascade is a white filter, which supplies the linear T/2 FSE with uncorrelated samples. The adaptive whiting of input seq
Blind equalizer, White filter, Fractionally spaced FIR filter, Performance index, Soft decision feedback
In this paper is presented an original method used to estimate the signature of an AM-FM signal, which in this case represents the variation law of the signalΤs instantaneous frequency. The analysis was developed for linear AM-FM signals covered by a zero
Signature, Time-frequency representations, Ridges extraction, Gaussian noise
Abstract: In This paper sample the implementation of an arithmetical logic unit fuzzy, and its application with DC motors. The process of digital control fuzzy, has four blocks to be able to make the automatic control, these blocks are: the fuzzification,
Keys-Words: Fuzzyfication, Defuzzyfication, Control, ALU
6 463-184
6 463-185
5 463-186
6 463-187
6 463-188
8 463-189
n this paper, a Genetic Fourier Descriptors is proposed to detect rotational symmetry. Rotational symmetry is one of the important features for image decoding and object recognition in computer vision systems. In the Genetic Fourier algorithm, the Fourier
Genetic Algorithm, Fourier Descriptors, Rotational Symmetry Detection
This paper is intended to introduce a graduate student to the speaker verification problem. Knowledge of pioneer work, as well as real methods overview, clears the path into deeper investigation. A list of useful references and books provides further orie
Speaker Verification, Speaker Models, Feature Extraction, Matching Score, Corpora
This paper presents a technique for improving keyword spotting. The main idea is based on the combination of a standard keyword spotting system working with a filler model with a phone recognizer. If the filler model is well designed it produces a phoneme
Keyword Spotting, Speech Recognition, Filler Model, Confidence Measure, Acoustic Baseforms
We studied a logistics network design model composed of plants, warehouses and customers. For designing this integrated model, we had to make two decisions simultaneously; the location of plants and warehouses, and the product distribution from plants to
Genetic Algorithm, Logistics Network Design, Facility Location Problem
RBAC (Role-based access control) is an access control method based on the role of user. It provides flexibility and applicability, compared with existing access control mechanisms like DAC(Discretionary Access Control) and MAC(Mandatory Access Control). I
RBAC, Role-based access control, Access control, Privilege, Authentication
A hybrid technique to derive the characteristic coefficients of the second-order PWM converters with discontinuous conduction mode (DCM) is developed. The starting point is the large-signal averaged model of the three-terminal PWM switch and a new duty-ra
Averaged PWM switch model, PWM converters with DCM, characteristic coefficients
5 463-190
6 463-191
6 463-192
6 463-193
4 463-194
6 463-196
The paper presents an algorithm that ensures the computerized measurement of some motion parameters (position, displacement, average velocity) using the signals from a linear optical incremental encoder. The working mode of the sensor is with zero initial
Computerized measurement, Linear optical incremental encoder, Working mode, Displacement, Position, Velocity
The paper presents the possibilities of simulation of steady and dynamic regimes for ammonia synthesis columns. We present the possibilities of study of the dynamic regimes for automatic control of the temperature in catalyst layers and propose an advance
Advanced control system, Modeling, Simulation, Ammonia plant synthesis
In this paper, the author proposes a practical method to model and to simulate a dynamic system in the presence of failures of actuators and sensors. The fault detection and the isolation (FDI) problem is an inherently complex one and for this reason the
Fault detection and isolation, Process control, Modeling and simulation.
Based on physiological studies and using experimental results published in specialty revues, the authors have created a mathematical model designated to simulate the arterial pressure control by arterial baroreflex. The model was validated by making compa
Heart rate variability, Baroreflex, Process control, Modeling and simulation.
In this paper a LVCSR system with implementation of the Czech voice assimilation phenomenon is proposed. The recognition system uses lexical trees and a bigram language model. The first part of this article is focused on voice assimilation phenomenon desc
Voice assimilation, LVCSR system, Lexical tree, Bigram language model
The purpose of this paper is to analyze a structure consisting of beam, bars and anchored cable, which hold the transmission lines, when is subjected to a static loading. For this study we use the matrix displacement method. Because the elastic cables are
Matrix displacement method, Static loading , Anchored cables
5 463-197
4 463-199
6 463-200
9 463-201
8 463-202
7 463-203
4 463-204
In this paper we provide an analytical method for computation the periodical solutions of the neutron transport equation in the one-dimensional stationary case. Also, the same problem was solved with a numerical method and the analytical solution and appr
neutronTransport equation, Method of finite differences, Trapezoidal rule, Series uniformly convergent
Internet based B2C e-Commerce is flourishing, but not so much in the area of business to business. For over 20 years, EDI has established VAN based solution of exchanging business information in electronic form. However EDI solutions are only accessible
ebXML, BPSS, BSI, eCommerce, eBusiness
The first e-business application that has come across to the world about two and a half decades ago was Electronic Data Interchange (EDI) by UN/EDIFACT. EDI dramatically improved business efficiency but the installation and maintenance cost were too high
E-Commerce, ebXML, XML, UN/CEFACT Modeling Methodology, Business process, Logistics
In this work we present a special-purpose encryption processor. This type of processors is to be used for IP-security applications. The implemented processor can be integrated in the system before the sender router and after the receiver router. In other
Micro-architecture, Encryption, FPGA, VHDL, ISA, IP-sec
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One approach to achieve this task is to embed the message in an innocent-looking cover-media. In ou
Steganography, Data hiding, FPGA, Architecture, Covert communications, Subliminal channel
In this paper, we address the issue of optimal performance in the context of a Grid computing environment. In Grids, the state of the selected resources for job execution is a primary factor that determines the computing performance. Specifically, we prop
Grids, Resource broker, Resource selection, Job migration, Grid computing
Mapping out of the receiver buffer space of an audio streaming application based on the usersΤ perceived quality rather than network performance analysis is proposed. This provides a subjective basis for receiver buffer management based on perceived Quali
VoIP, Perceived and network QoS, Receiver buffer management, Delay-jitter, Subjective test.
6 463-205
6 463-206
6 463-207
8 463-208
7 463-209
5 463-210
Image calibration is the very first step in the low-level vision process, making it possible to reliably exploit geometrical information from images. In this paper, we address the problem of calculating and compensating camera lens distortion using a fast
Calibration; Evolutionary Algorithm; Lens Distortion; Collinearity; Geometric Invariant; Optimization.
System management, now mainly a manual process based on individual knowledge and experience of administrators, is now very time-consuming, inefficient, and error-prone. This paper proposes an open framework to design and implement self-managing systems th
XML, System management, Self-managing system, Security advisory, Update notification
The Session Initiation Protocol (SIP) is an application layer protocol for session establishment, modification and teardown. For end-to-end security of the session information, SIP uses the Secure Multipurpose Internet Mail Extension (S/MIME). However, in
SIP, Security, MIDCOM, Middlebox, VoIP, Firewall, NAT
The proliferation of heterogeneity of todayΤs network and the rapid development in wireless networks has raised an urgent requirement for a new communication paradigm. The Mobile agent paradigm is a promising technique that addresses the client-server lim
Mobile agent, routing agent, load balancing, convergence rate, data communication, Time To Live.
This paper presents a comparison between two approaches to sensor calibration. According to one approach, called explicit, an estimator compares the sensor readings to reference readings, and uses the difference between the two to estimate the calibration
Calibration, Gyroscopes, Spacecraft, Kalman-Filter
This paper presents a coordination model called XCM, intended to conceptualise coordination within ubiquitous computing, and one instantiation of this model called UCM. The constraints brought up to coordination by ubiquitous computing are the need to fac
Distributed computing, Ubiquitous systems, Coordination, Service, Composition.
6 463-211
5 463-212
6 463-213
5 463-214
7 463-215
Large scale system control is associated with large dimensionality and large modeling uncertainty. Decentralized control, where the system is naturally decomposed into lower order subsystems, allows one to design local controllers instead of centralized o
Large scale system, Decentralized control, Real time application, Segmented space reflector, Neural networks, Next Generation Space Telescope
Control of large flexible structures such as segmented telescopes requires a reliable computing system that continues to operate satisfactorily despite the event of hardware or software failures. Through decentralized control, the overall structure can be
Fault-Tolerance, Parallel Processing, Pipelined Task Mapping, Dynamic Task Mapping, Real-time
Sophisticated visual programming environments facilitate the implementation of graphic user interface (GUI) from the programming aspect. However, how to design an effective and efficient GUI to meet the requirements of large-scale scientific and engineeri
Graphic User Interface, Interactivity, User-friendliness
This paper describes an industrial magnetic resonance multiple imaging (MRMI) system that measures nuclear magnetic resonance of several kinds of nuclei simultaneously. We use a new principle of X-ray CT. Then we reconstruct distribution images of nuclear
Magnetic Resonance Multiple Imaging(MRMI),Fast Model Reconstruction(FMR),Image Sensing,Multiplex Wavelet Model
For companies assembling end products from sub assemblies or components, MRP (Material Requirement Planning) logic is frequently used to synchronize and pace the production activities for the required parts. However, in MRP, the planning of operational-le
Flexible Job Shop, Genetic Algorithm, Large Step Optimization
5 463-216
6 463-217
5 463-228
6 463-229
7 463-230
A general regression neural network (GRNN) is essentially a function approximator. This paper investigates this characteristic for a two-stage lossless compression of electroencephalogram (EEG) signal. The first stage consists of a GRNN with a predictor-e
Neural Networks, EEE signal, GRNN, Two-stage compression, lossless compression, arithmetic encoder
Because the transport expenses are more than a half the national logistics expenses, the increase of the transport expenses becomes the cause of an increase of national logistics expenses. To decrease of the logistics expenses, it has to develop logistics
e-Logistics, Knowledge management, Inference, Trajectory, Moving object
In this paper, the classification of textured images was studied. A good classification relies on feature extraction stage. In this work, several texture samples were analyzed using wavelet transform which is a new and promising set of tools. It was shown
Wavelets, Texture analysis, Pattern recognition, Image processing
This paper describes the development of a new text to speech synthesis system in Bahasa Melayu (BM), Malaysian official language. The key technology for this system consists of text analysis, linguistic analysis and waveform generation. The first phase in
Speech Technology, Text- to-Speech System, Speech Synthesis, Bahasa Melayu, Diphone, Speech database
Recently, portable LCD projectors have become increasingly popular for various usages. However a careful aligning to the projection surface or aflat screen are necessary for getting a good projection effect. If a projector can display an undistorted imag
Projector-camera system, Projective mapping, Distortion correction, Neural network, Computer graphics, Keystone
5 463-232
8 463-233
9 463-234
4 463-235
8 463-236
4 463-237
A numerical modeling of the propagation path loss using Uniform Theory of Diffraction (UTD) has been presented here. Computed results at 835 MHZ have been presented for various parameters of interest. The results at 2.154GHz have been obtained and compare
Propagation Model,Mobile communication,Urban area, Shadow zone
In this paper, a moment-method analysis of slots of arbitrary shape, cut in the broadwall of a rectangular waveguide, is discussed. The ‘generalized network formulation” for aperture problems has been used for formulating the problem in terms of an operat
Apertures in waveguides, Apertures of arbitrary shape, Method of moments
Recently, some problems related to using the real-time control protocol (RTCP) in very large dynamic group have arisen. Some of these problems are: feedback delay, increasing storage state at every member, and ineffective RTCP bandwidth usage, especially
RTCP Scalability, Distributed Management, Multimedia Protocols, Multimedia Communication
This paper studies dynamic noncooperative bandwidth allocation in a wireless communication network. The model is based on a dynamic non-cooperative game with a parameterized delay-penalty. Each mobile node chooses its transmission strategy to optimize its
Game theory, scheduling, ad hoc networks
Everyone is concerned with the importance of environmental problems, but because there are a large number of interrelating factors to consider, it is difficult for a layman to fully appreciate them and decide what to do for and by himself. Not only the
Web3D, VRML, 3D geographical information system, environmetal science, E-learning
The design of a microstrip reflectarray requires precise prediction of the phase and amplitude of the field scattered by either an unloaded patch or a stub-loaded patch. In this paper, we present a full-wave formulation, using sub-domain expansion functio
Microstrip reflectarray, Microstrip antennas, Stub-loaded patch antennas
6 463-238
7 463-239
6 463-240
5 463-241
6 463-242
8 463-245
This paper discusses the disturbance estimation problem for continuous-time multivariable dynamical systems with arbitrarily relative degrees. The disturbances, which are assumed bounded, refer to the combination of the external disturbances, the nonlinea
Disturbance observer, multivariable systems, relative degree, nonminimum phase dynamical systems, least square approximation.
This paper presents an information broadcasting system for portable information terminates with Infrared devices, such as PDA or handheld PC. To realize information broadcasting service by infrared optical media, we developed a new Infrared data communica
Infrared optical, IrDA, Communication protocol, PDA, Broadcasting, Palm OS
The principal ability of Coons mapping to produce high quality 2 and 3 Dimensional finite element meshes is presented in this paper. Focusing to finer non-uniform and manageable meshes, new algorithms are developed for the transformation of structured ini
Mesh generation; Coons mapping; Adaptive meshes
The Semantic Web¡¯s success will depend on the implementation and use of Web service, becoming preeminent in E-commerce, which will likely be agent-based in the future. Agents use the large amount of information available over the web, but it will allow a
Semantic web, SAML, Security, Intelligent agent, Web service, XML
The tactile recognition in robotics is often based on the similarity between an unknown shape and the prototypes; the prototypes are models of the shapes learned in the first stage of the recognition process. All descriptors are invariant or quasi-invaria
Shape, Descriptor, Prototype, Classification, Similarity, Identification.
Abstract: In this paper, the characteristic coefficients describing the full-order model Æuk PWM converter with DCM are derived and used in the analysis of open-loop small-signal input, output and transfer properties of converter. The derivation of these
Æuk PWM converter with DCM, PWM switch with DCM, Full-order model
4 463-247
5 463-248
6 463-249
6 463-251
7 463-252
This paper presents a java-based embedded digital signal processing system, which consists of DSP processors, FPGA chips and friendly graphical user interface made of java. The DSP processors are very powerful at calculation and control functions and the
Digital Signal Processing, Embedded, Real-Time, FPGA, DSP
In this paper we study location problem subject to two objective functions. The traditional location problem is concerned with the location of one or more facility, in some solution space, so as to optimize some specified criteria. Such facilities can be
Network, Location problem, Anti-cen-dian problem, Combinatorial optimization, biobjective network.
In this paper, a dynamic speed model is derived from the gas-kinetic traffic flow model. Since the model is a second order ordinary differential equation, it takes less computing time than the dynamic traffic flow models. Therefore, the dynamic speed mode
Traffic flow, Speed, Speed variance, Link travel time, Dynamic traffic assignment
Acoustic feedback is a common complaint of hearing aids users and reduces the maximum gain of hearing aids. In this paper, an acoustic feedback cancellation scheme using spectral subtraction is proposed. Acoustic feedback signals are continuously estimate
Acoustic feedback cancellation, Howling, Hearing aids, Wiener filter, Adaptive filter, Spectral subtraction
In this paper, the Drift-Diffusion (DD), Hydrodynamic (HD), Schrödinger –Poisson transport (SP-DD), Density Gradient transport models (DG-DD) are compared by numerical simulations so as to find out the adequate model for different devices simulations. Acc
Quantum effects, Drift-Diffusion model, Hydrodynamic model, Schrödinger equation, Density Gradient model, Computer Simulation
6 463-253
6 463-254
6 463-255
6 463-256
6 463-257
This paper discusses a methodology for the synthesis of nonlinear controllers using a Taylor series expansion of the control law. The method can be interpreted as a special neural network (NN) technique with predefined structure (Taylor series expansion
System dynamics; Control; Neural networks; Parameter optimization; Taylor series expansion
This paper discusses a new structural optimization method and its application to the weight minimization of truss structures under arbitrary constraints. The method introduces a “min-max” principle for determining a near optimum solution for weight minim
Structural optimization; Truss structures; Finite element method; Optimality criteria
A new method for the computation of optimal vehicle trajectories for obstacle avoidance maneuvers, under consideration of the nonlinear vehicle dynamics, is presented. The new optimization method is derived from Pontryagin’s Maximum Principle (PMP) and is
Optimal vehicle trajectories; Guidance using a modified Maximum Principle; Intelligent transportation systems; Dugoff’s tire model
This paper discusses a methodology for improving the dynamics of a flexible-link robot arm based on a Taylor series expansion of the control law, using time simulation and parameter optimization. The method can be interpreted as a special neural network (
Flexible robot arm; Control; Neural networks; Parameter optimization; Taylor series expansion;
The flow shop scheduling problem with the objective of minimizing the makespan is a NP-hard problem, thoroughly studied in the last thirty years. However, few investigations are known for the general nonlinear case considering transport, setup and manufac
Makespan; Nonlinear manufacturing environment; Time simulation; Hybrid combinatorial evolution strategy
5 463-258
8 463-259
6 463-260
9 463-261
4 463-262
9 463-263
In this paper, we propose a stopping criterion for the stochastic simulated annealing with constant temperature. In this procedure, we perform the annealing algorithm several replications to get estimate of the error gap between the estimated optimal valu
Stochastic Programming, Simulation Optimization, Simulated Annealing, Stopping Rules.
Designing wireless streaming multimedia applications is a challenging task that involves the exploration of multiple parameters subject to real-time constraints. In particular, battery-powered multimedia appliances must provide a target quality of service
Dynamic power management, Streaming data, Wireless LAN, Real-time constraints, Streaming video
In this paper, the fluctuation of threshold voltage is investigated numerically for deep-submicron n-MOSFET with various gate oxide thicknesses, channel lengths, substrate doping concentration under different bias conditions. Quantum mechanical effects ar
Threshold voltage, Quantum mechanical effects, device channel length, gate oxide thickness, doping concentration
Cytotoxic CD8 T lymphocytes (CTL) represent a major immune mechanism used by animals to defend themselves against viruses and intracellular parasites. We predict organization of primary CTL response by comparing 34 mathematical models with kinetic data re
Modeling, Biology, Immune, Response, Virus, CD8, HIV, LCMV, APC
Abstract: - 'Interactivity' is involved in any teaching and learning situation. The use of technology in education offers better chances for interaction that was not possible with older mediums and makes 'interactivity' a central notion in e-learning. Thi
Interactivity, E-learning, Interactive notes, Learning objectives at cognitive domain
Communication and synchronization between master controller and coprocessors are critical issues in the design of parallel system-on-chip architectures, especially when applications are developed in a high-level programming language and run on a virtual r
Java; Coprocessor; Hardware-software interface; Simulation; Timing constraints
7 463-265
6 463-266
9 463-267
6 463-268
6 463-269
This paper presents the research work directed regards the synthesis and implementation of a parallel-pipelined hardware genetic algorithm (PPHGA) utilizing Very High Speed Integrated Circuit Hardware Description Language(VHDL) for programming Field Prog
Hardware Genetic Algorithm, FPGAs, Optimization, Interpolation, Thermistor, Lateral Acceleration.
Today’s, most of application problems could be defined as a case of classification problem. Lots of solutions are proposed for classification problems. Most of them concentrate on reducing detection error of classifiers. For error reduction fuzzy logic ca
Classification, Fuzzy Logic, Genetic Algorithm, Evolution, Aggregation Operators, machine learning and Data mining.
Intelligent robotics presents a number of interesting challenges for machine learning. In this paper we look at the specific task of finding a mapping from stimuli to response for robots controlled by reactive behaviors. The mapping will be represented by
Learning robots, Association rules, Reactive behaviors, Intelligent robotics, Machine learning, Autonomous robotics
Hybrid computational models can be seen as systems of computational agents. This paper proposes mechanisms that provide agents autonomous abilities in order to improve their performance within a multi-agent system. Our approach is utilizing an ontology-ba
Hybrid models, artificial intelligence, soft computing, multi-agent systems, intelligent agents
The Iterative Closest Point (ICP) algorithm is widely used to register two roughly aligned surfaces. Its most expensive step is the search for the closest point. Many efficient variants have been proposed to speed up this step, however they do not guarant
Iterative Closest Point, 3D Registration, Stereo, Head Motion Estimation
8 463-270
3 463-272
6 463-273
5 463-274
6 463-276
The visual feedback is an important usability factor, it is the visual response given by an interactive application in order to assist on a graphical interface the user task. In general, the visual feedback is defined at implementation stage where the use
-Design and interaction patterns, visual feedback, usability factors and interaction styles
The overlay of an intelligent Frequency Diversity Spread Spectrum System (FDSS) on the Advanced Mobile Phone Service system (AMPS) is studied. The worst-case condition is considered for the downlink analysis. Moreover, the effect of sidelobes outside the
AMPS, FDSS, Multicarrier CDMA, Overlay, Down and uplink capacities
All regularization methods for computing stable solutions to inverse problems, involve a trade-off between the “size” of the regularized solution and the quality of the fit that it provides to the given data. Though the appropriate choice of the regulariz
Inverse problems, Regularization, L-curve, Picard’s condition, Resolution matrix, Spread function.
A NN approach to image segmentation for object based video coding is introduced. The neural approach is used to simplify the image while a fuzzy image clustering is applied to jointly estimate the object polynomial motion fields and partition the image in
Neural Network, Background-Foreground Video Segmentation, MPEG-4, fuzzy clustering
In this paper, an adaptive smoothing filter algorithm based on gradient information is proposed. The new method solves the problem of conventional filer that can’t smooth noise and sharp edge simultaneously. It is based on the iterative convolution of loc
Image Filtering, Gradient Information, Adaptive Smoothing, Smooth Noise, Sharp Edge
9 463-279
9 463-280
6 463-281
4 463-282
In this paper, a fusion filtering algorithm based on novel fusion entropy criterion is proposed to combat shortcomings of hybrid linear and nonlinear filtering techniques. The concept of fusion entropy is proposed because the traditional information entro
Information Fusion; Fusion Entropy Criterion; Minimum Total Error Probability Criterion; Neyman-Pearson Criterion; Hybrid Filtering
Wavelet video transmission with four levels of unequal error protection (UEP) codes for wideband multicarrier code division multiple access (MC-CDMA) and Rake receivers over additive white Gaussian noise (AWGN) and Rayleigh fading channels are performed a
Embedded Zero-Tree Wavelet Transform, Two Dimensional Wavelet Packet Transform, Unequal Error Protection Codes, Multicarrier Code Division Multiple Access, Rake Receiver, Additive White Gaussian Noise, Rayleigh Fading Channel.
Emerging technology in mobile communications is seeing increasingly high acceptance as a preferred choice for last-mile communication. There have been a wide range of techniques to achieve signal compression to suit to the smaller bandwidths available on
CVSD, bitstream, speech recognition, corrected MFCC estimation
One of the main challenges when implementing the future mobile multimedia networks is the cost effective network evolution from second to third-generation systems. This evolution may include the use of different technologies at the same frequency band. In
Adjacent system interference, uplink capacity, IS-95, FDSS, Multicarrier CDMA.
6 463-283
7 463-284
3 463-286
4 463-287
9 463-289
6 463-290
Under specific conditions, a surface forest fire spreading through the ground cover is converted into a crown fire that moves through crown at a significantly greater rate than the surface fire, and hence is more dangerous ecologically. In this context, a
Forest fire; Mathematical model; Discrete analogue; Control volume
The paper presents a scalable, extensible and cost-effective VOD(Video-on-Demand) integrated system for delivering MPEG-4 streams to PCs or consumer terminals over IP networks. The proposed system includes three parts: the cluster middleware, the VOD serv
VOD integrated system, MPEG-4, Transcoding, Cluster-based, Dynamic load-balancing, Admission probability
Nash equilibrium solutions represent decentralized decision making, as such their use may fail to take advantage of coordination. In particular, the potential inefficiency of Nash equilibrium solutions is well-known, recall for example, the classical "pr
Nash equilibrium, Linear prices, Optimization, Game theory,Stability
The reconstruction of gapped microtremors recordings with the aid of CLEAN algorithm, which originally developed for spectral analysis of unevenly spaced time series, is studied. As proved in previous relative studies the algorithm has the ability to "cle
CLEAN algorithm, Incomplete time series, Microtremors
This Video data is stored in a video server for delivery to multiple receivers over a communications network in a traditional video-on-demand system. The hardware in this video server has the following limitations: 1) the maximum storage capacity, and 2)
Video-On-Demand, Video-Server, Distributed Multimedia Systems, Client-Server Architecture, Load Balancing, Load Sharing, Adaptive Resource Management.
We present the efficient and simple diagnostic method for memory integrity test. This paper gives an introduction how to construct memory tests and test flows. A typical memory test steps through the memory array and tests all cells. It ensures that addre
Memory diagnosis, Memory testing
8 463-291
6 463-292
6 463-293
7 463-294
5 463-295
Mohr circle topologies are used to depict, in a very convenient way, geoelectric structure information inferred from the measured impedance tensor by taking separately its real and imaginary parts. On the other hand, an impedance tensor decomposition anal
Geoelectrical Structure, Impedance Tensor, Ioannina Greece, Magnetotelluric, Mohr circle, Tensor decomposition, Tensor Invariants, Tensor Rotation
Paper deals with some hints on the use of fuzzy logic to manipulate motion equations commonly used to shape cams for automatic machines. A software has been implemented and allows also non expert-designer to optimize the cam profile and to plan motion in
cam system, fuzzy systems, dynamics, kinemtics, motion equations, design
The aim of this paper is to offer a methodology to simulate an environment for e-learning that contains all informations in a large server that is interconnected by Internet with the student’s computer. It describes the needs and difficulties for an e-
Petri Nets, XML, Java, MOVIX, e-learning, simulation, Markov
In this paper, we address the issue of optimal performance in the context of a Grid computing environment. In Grids, the state of the selected resources for job execution is a primary factor that determines the computing performance. Specifically, we prop
Grids, Resource Broker, Resource Selection, Job Migration, Grid Computing
In this paper, we present the design and development of a simulation test-bed, for the performance analysis of dependable and mission critical e-services. Key characteristics of such systems, like for example, the object state transfer and recovery polici
Simulation, Quality of service, Fault tolerance, Load distribution, Performance evaluation, Distributed object systems, E-services
9 458-206
5 458-187
9 458-244
A new impulse noise detection technique from gray-scale and multichannel images is presented. It is based on block correlation of the noncausal linear prediction. The linear prediction coefficients are calculated using a block of the image at one instant. These coefficients are valid within that block only and are used to predict a pixel in a sliding window within the block. The sample is predicted from its neighboring pixels, considering past and future values. The current sample is corrupted if its difference from the predicted value is bigger than a pre-defined threshold.
Scalar, Vector, Linear prediction, Threshold, Center–weighted median filter, Vector median filter, noncausal
We deal here, with a real-world problem, which is, how to approximately cover an area by a set of antennas, that are already available and ready to use, in order to provide the infrastructure for wireless communications. We model it as a particular kind of circular cutting problem and develop a simulated annealing heuristic solving it with good performance. Our method is based upon the definition of an energy function reflecting the objective to be optimized; small values of this function correspond to local optima of good quality for our problem.
wireless communications, simulated annealing, circular cutting
We have presented in this paper a metadata analysis of the Extensible Markup Language (XML) and some of its associated technologies and how its integration into competing software and technologies has equipped the publishing industry to produce one document and transform it into print, electronic and Web publications from one XML format using an appropriate Extensible Stylesheet Language (XSL). The analysis includes the working of XML and the implementation of the XML database system for a publisher. We have also discussed how XML is rapidly making inroads in all fields of endeavor by integration rather than the displacement of older technologies.
Extensible,Stylesheet, Language, Xml, Database, Network, Management
6 458-166
6 458-211
The increasing importance of Unicode for text files implies a possible doubling of data storage space and data transmission time, with a corresponding need for data compression. The approach presented in this paper aims to reduce the storage and the transmission time for Farsi text files in web-based applications and Internet. The basic idea here is to compute the most repetitive n-grams in the Farsi text and replace them by a single character. The new characters then will be placed in the user-defined sections of the Unicode and proper glyphs will be created for them. In this approach the compression will be done on the server side once and the decompression process is eliminated completely. The rendering process in the browser will do the decompression. There is no need for any additional program or add-ins for decompression to be installed on the browser or client side. The user needs only to download the proper Unicode font once. A genetic algorithm is utilized to select the most appropriate n-grams of different sizes in order to maximum the amount of compression. In the best case, we have achieved 52.26 % reduction of the file size. The method is general, and applies equally well to English and other languages.
N-gram Compression, Text Compression, Farsi, Unicode, Font, Genetic Algorithm
This paper introduces a deterministic method for capturing the Pareto front in multi-objective real parameter optimization problems. It is an effort to deal with multi-objective optimization problems that were until now confronted only by stochastic algorithms, specifically evolutionary algorithms. The method is based on a theoretical result that proves the equivalence of non-dominated points to extrema of functions produced by linear combinations of the multiple objectives. The proposed method is used in order to capture the solution set of a two-objective optimization problem posed by the design requirements of an I-Beam under certain geometric and strength constraints.
multi-objective optimization, Pareto front, deterministic algorithms
7 458-212
3 458-250
8 458-247
Evolutionary algorithms (EAs) are popular general purpose optimisation methods. According to the No Free Lunch Theorem is no inherently superior EA parametrisation possible. Therefore the support of a wide range of parameters by EA software libraries is desirable. Firstly this allows the exact specification of an EA that proved to perform well at a certain problem type. Additionally, flexible parametrisation possibilities allow the testing of a wide range of EA variants on new problems. Despite a large number of EA libraries has been developed, exists no model for the generic description of parametrisation possibilities. As explained in this paper, also the published approaches of classifying EA parameters are unsatisfactory. Starting from a missing definition of the term parameter, an a new, explicit description of the parameter elements is introduced and several categories are proposed according to which parameters can be classified. The additionally performed benchmarking of EA software shows that the abandonment of good software design and use of low-level languages for the benefit of more efficient operators is not worthwhile.
Evolutionary Algorithms, Parameters, Categorisation, Benchmarks
The performance of a wavelength division multiplexed network is degraded by non-linear phenomena and especially by Four-Wave Mixing (FWM). In this paper, the probability density function (pdf), of the FWM noise, both in the mark and space state is investigated using numerical Monte Carlo (MC) simulations. The results are also compared to previous studies. It is shown that the pdf of the FWM in the mark state is asymmetric.
Dense wavelength division multiplexing, nonlinearity, optical networks, optical mixing.
A complete set of models and methods for the calculation of electrical crosstalk in OptoElectronic Integrated Circuits based on flip-chip or wire-bonding technologies is presented. Typical chip architectures hasvebeen analysed and relative results are obtained. The model can be easily applied to several OEICs. Design guidelines are presented and discussed.
Optoelectronics, OE-VLSI, OEICs, Integrated circuits modelling, electrical crosstalk.
6 458-242
6 458-163
7 458-104
We present a discrete fractional Gabor expansion based on the closed form discrete fractional Fourier transform. The traditional Gabor expansion represents a signal as a linear combination of time and frequency shifted basis functions. This constant-bandwidth analysis generates a rectangular time-frequency lattice which might lead to poor time-frequency localization for many signals. Proposed expansion uses a set of basis functions related to the fractional Fourier basis and generate a parallelogram-shaped tiling. Completeness and biorthogonality conditions of the new expansion are given.
Gabor expansion, Time-frequency analysis, Fractional Fourier transform.
Community web portals serve as portals for the information needs of particular communities on the web. Forecasting community portals is not new there are a number of them but the new age of these portals includes on line collaboration, online forecasting and systems integration. We here discuss how a comprehensive and flexible strategy for building and maintaining a high-value community web portal has been conceived and implemented. The basic strategy is the creation of robust and extensible architecture. We have also implemented a web application and a web service to facilitate the construction of our showcase.
Web Portal; Community portal; Forecasting; Web Services Web application
This paper presents fuzzy based twin controllers for overhead crane. Instead of analyzing the complex nonlinear crane system, the proposed approach uses simple but effective way to control the crane. Twin fuzzy controller deals with the feedback information, the position of trolley crane and the swing angle of load, to suppress the sway and accelerate the speed when the crane transports the heavy load. This approach simplifies the designing procedure of crane controller; besides, the twin controller method reduces the rule number when fulfilling the fuzzy system. At last, experimental results through the crane model demonstrate the effectiveness of the scheme
Fuzzy, Overhead crane, Feedback, Swing angle, Heavy load, Twin controller
3 458-153
4 458-245
In this paper, dynamic structure neural network controller based on feedback linearization is proposed. The proposed method can adapt the neural network structure dynamically while it can guarantee the stability and tracking precision of system. The dynamic structure wavelet network controller is introduced in the system simulation and the performance of the controller on a system with nonlinear dynamics is demonstrated by simulation results.
Neural networks, dynamic structure, control systems, nonlinear systems.
Steerable filters are oriented filters generally used in vision and image processing tasks, such as texture analysis, edge detection, image data compression, motion analysis, and image enhancement. Steerable filters with oriented property can be examined as a function of both orientation and phase. In the case of correct filter set and interpolation rules, it is possible to determine the response of a filter of arbitrary orientation without applying that filter directly. In this paper, we have used steerable filters for Gelibolu region of Turkey. We have obtained the raw data from Turkish Petroluem Research Institutue (TPAO). In Gelibolu region, we have detected a paralel fault branch on the North-West of Anafartalar fault using steerable filtering techniques. The results are confirmed with TPAO seismic data. We have shown that steerable filters can be considered as a powerful comprimising approach in the evaluation of geopysical data.
Steerable filters, gravity and magnetic anomaly, Gelibolu region.
8 458-169Abstract: - A computerized appointments system is designed, built and tested. The system replaces the traditional way of appointment making by making use of computer communication hardware and software technologies. The designed system utilizes a keypad and LCD display unit, which is mounted at the front door of an office or a reception area. The LCD continuously displays information regarding available appointments, which is fed to the unit by a computer system. The user will type the required information using the provided keypad, the information will then be passed to the database and the person concerned will be informed automatically about the appointment. The booked time and date will be taken out of the available appointments. Privacy and confidentiality is guaranteed with the system, as no other appointee will be able to know who booked at a certain time. The system allows for statistics and can be an effective system at Universities, whereby students can use it to make appointments with lecturers or at Hospitals and Medical Centers.
Key-Words: - Office automation, Computer-based application, Data communication, Interface, Database System, Automation software, Circuit design.
9 458-171Ecological systems are generally considered among the most complex ones, because they are characterized by a large number of diverse components, nonlinear interactions, scale multiplicity, and spatial heterogeneity. In this paper a methodology for modeling ecological systems using cellular automata (CAs) is presented. The proposed methodology establishes the ability to capture the essential features-characteristics of the ecological system under consideration, and translate them into a suitable form, in order to obtain an effective CA model. The CA models obtained are of crucial importance in ecological engineering, and they could be used as decision support systems in environmental emergency response. Further, a complete description of the details of this methodology is specified, in order to help other researchers reproduce published simulation experiments. Forest fire spreading and oil slick movement and spreading are considered as possible applications of the proposed methodology. The models obtained can serve as a basis for the development of algorithms to simulate environmental and biological systems based on real data. Moreover, Application Specific Integrated Circuits (ASICs) that would execute and speed up the corresponding algorithms
Cellular Automata; Modeling; Ecological Systems; Forest fire spreading; Oil slick movement; ASICs.
3 458-174
6 458-177
Secondary structure prediction is a useful first step in understanding how the amino acid sequence of a protein determines the native state. There are many previous famous prediction methods available now, although most of them allow users to submit their queries to dedicated servers, bulk protein sequence prediction service such as the whole database sequence prediction is still not widely available or requires tedious waiting time. In order to utilize the high performance computing power in the field of protein secondary structure prediction, the author proposed a parallelized protein secondary structure prediction method namely mpiPSSP, using Message Passing Interface (MPI) on a multi-node compute cluster. mpiPSSP can self-determine the appropriate number of processors according to the size of the querying database or also run using the user-desired number of processors. As the tasks are made independent of each other, a highly scalable solution is achieved.
Computational biology, Protein secondary structure prediction, Parallel computing, MPI
Minimum-knowledge identification/signature schemes enable principals prove their identities or the authenticity of their messages using an interactive challenge-response process. Due to their simplicity, strong security and relatively low computational requirements minimum-knowledge schemes are ideally suited for microprocessor based devices where the processing power and storage capacity is limited. This paper discusses the operation of three landmark minimum-knowledge schemes, namely, the Fiat-Shamir, Ohta-Okamoto and Guillou-Quisquater minimum-knowledge identification and signature schemes. The relationship between the principals' storage and data exchange requirements and the computational complexity of the schemes is tabularised.
Minimum-Knowledge, Authentication, Signature, Ohta-Okamoto, Fiat-Shamir, Guillou-Quisquater, Mobile
6 458-178
7 458-180
Data analysis is a regular massif task of applied sciences and businesses. A huge number of algorithms were developed for different kinds of data and for particular types of data analysis. Traditional theories work with traditional databases and data structures, although the paradigm of Internet doesn’t want to wait, requiring novel technologies, able to work effectively with huge amounts of data, with data flows and uncertainties. In order to process data flows two computation steps are needed. The first one outputs some local results in time $t$ using the current data, and the second one outputs the global result in time $t+1$ using the local results in time $t$ and $t+1$. The application of Neural Networks to data flows processing is considered since they have proven to be a useful tool in time series analysis. Neural Networks are applied in order to combine the local computations to get the global result. Also they can be used to output the local computations. Some examples are shown in the paper.
Neural networks, Time series, Function approximation, Clustering, Data flows
It is offered to implement fuzzy devices as multi-valued logic functions, using directly analog input variables and forming the output variables as analog ones as well. It is offered to use CMOS summing amplifiers as basic elements for designing appropriate circuits. It has been proved that a CMOS summing amplifier is a functionally complete element in arbitrary-valued logic. In a plenty of cases this approach enables principally simplification of fuzzy logic controllers for a broad class of applications. All mentioned above is illustrated by examples.
Fuzzy logic control, Fuzzy rules, Fuzzy inference, Multi-valued logic, Multi-threshold element, Summing amplifier, Operational amplifier.
6 458-182
6 458-183
9 458-243
In order to provide QoS in group communications for real time applications such as video conferencing, reliable multicasting is used. Miscellaneous efforts have been undertaken to provide reliability on top of IP multicast. In this paper, we present a new fair share policy (FSP) that utilizes Differentiated Services to solve the problems of QoS and congestion control when reliable FEC/ARQ multicast is adopted. Simulation programs are used to evaluate the Fair Share Policy. The results should provide insights into the comparisons between homogeneous IP multicast networks, homogeneous MPLS multicast networks and heterogeneous MPLS multicast networks using the same FSP when DiffServ are adopted and when reliable FEC/ARQ multicast is considered.
Heterogeneous, IP, MPLS, DiffServ, FEC/ARQ
The research into the ability of building self-learning natural language parser based on context–free grammar (CFG ) was presented. The paper investigates the use of evolutionary methods: a genetic algorithm, a genetic programming and learning classifier systems for inferring CFG based parser. The experiments were conducted on the real set of natural language sentences. The gained results confirm the feasibility of applying evolutionary algorithms for context-free grammatical inference.
Grammatical inference, context–free grammars, natural language processing, evolutionary computation
This paper describes an algorithm for the construction of a certain one-dimensional cellular automaton equivalent to a given D0L system. A cellular automaton is considered equivalent to an L-system if both generates the same words in the same order. Our cellular automata produce the same words and in the same order as the given D0L system for a finite number of derivations. There is no constraint to the D0L system considered, so the method is a general algorithm and can be used as a proof for an equivalence theorem.
Cellular automata, Lindenmayer systems, parallel derivation grammar, theoretical computer science, formal languages
5 458-135
4 458-112
A time signal distribution system is an important part of several engineering assemblies being present in process controlling equipment, distributed computation systems and telecommunication networks. In order to have accurate performance, synchronous operation of these systems, composed by several nodes, needs a reliable time basis signal extracted from the line data stream in each node. When the nodes are synchronized, routing and detection can be performed, guaranteeing the correct sequence of information distribution among the several users of a shared circuit. Consequently, an auxiliary network is created inside the main circuit, a sub-network, dedicated to the distribution of the clock signals. There are different solutions for the architecture of the time distribution sub-network and choosing one of them depends on cost,precision, reliability and operational security. In this work an overview of the possible time distribution schemes is given. Additionally, a detailed study of a robust option ispresented by using the qualitative theory of differential equations. Correspondences between constitutive parameters of the network and the dynamics of the spatial phase and frequency errors are established.
Bifurcation, Dynamical Systems, Equilibrium, Master-slave network, Phase-locked loop, Synchronous network
Two basic methods of sound compression: MPEG and Ogg-Vorbis have been discussed and compared. Mixed hardware-software approach can improve the speed and also the quality of the compression. Furthermore, speech coding system has to have real-time capabilities, so the hardware-software co-design permits to achieve low cost and high-speed performances. Predictive method of speech compression has been also presented. Seeking for more efficient solutions, systolic structures using fuzzy-neural predictors seems to be a smart realization of an effective speech processor. Mixed analog-digital realizations of integrated filter banks have been also discussed.
MPEG codec, Vorbis codec, speech processing, voice compression
4 458-113
6 458-115
Current mode circuits cover an important area of application like filters, neural networks and analog-digital conversion. Current mode circuits, because of their special structure, need appropriate methodology during design process. This paper is an overview of most common problems related with analog and mixed digital-analog converters and filters performed in a CMOS technology. Laboratory measurements of a current converter based on the principle of direct signal comparison have been presented. Application of the transconductance amplifiers in realization of lowpass active filters using transconductance building block has been also introduced. A direct conversion of passive RLC elements into their transconductance equivalent to create filter based on passive RLC prototype is applied. Very simple and effective design method and practical realization of switched current filters has been presented. An efficient laboratory station permits to obtain in a simply way precision characteristics of current mode circuits.
Current mode filters, Switched current filters, Transconductance amplifier, CMOS technology
The problem of known signal detection in Additive White Gaussian Noise is considered. In this paper a new detection algorithm based on Discrete Wavelet Transform pre-processing and threshold comparison is introduced. Current approaches described in [7] use the maximum value obtained in the wavelet domain for decision. Here, we use all available information in the wavelet domain with excellent results. Detector performance is presented in Probability of detection curves for a fixed probability of false alarm.
Wavelet, signal detection, signal-to-noise ratio, probability of false alarm, probability of detection
5 458-117
6 458-119
6 458-121
Optical Burst Switching (OBS) is an efficient switching method to building very high capacity routing switches based on all optical burst data and electronic processing for the control data. OBS combines the benefits of circuit switching and packet switching while taking into consideration the limitations of the current all-optical networks. In this paper we introduce the concept of OBS network and examine the various OBS reservation schemes. A comparison amongst the different reservation schemes is made in terms of admission, delay, delivery, and QoS.
Optical Burst Switching (OBS), Quality of Service (QoS)
The paper presents a method for multivariate time series forecasting using independent component analysis, as a preprocessing tool. The ideea of this approach is to do the forecasting in the space of independent components (sources), and then transforming back to the original time series. The forecasting can be done separately and with a different method for each component, depending on its time structure. The method has been applied in simulation, to an artificial multivariate time series with five components, generated from three sources and a randomly mixing matrix.
Independent component analysis, Multivariate time series modeling and forecasting, Algorithms, Second order statistics, High order statistics, Simulation.
Model checking for reactive systems with timing constraints is described in the paper. Model of the system to be verified is given in Statecharts visual language. Timing constraints can be assigned to the states of the system. Required properties of the system can be given as system invariants and/or formulas of the branching-time temporal logic. Timing requirements are incorporated in a formula using bounded temporal operators. The proposed hierarchical verification algorithm works on-the-fly without constructing the flat state-transition graph. In the case, that the system does not hold the required property, the counter-example can be found without search entire state space.
Hierarchical verification, Reactive systems, Concurrent, Real-time, Timing constraints, Statecharts, Model checking, Temporal logic
6 458-124
4 458-126
Information technology infrastructure is critical in most organizations as it is the backbone of all operations that rely on information systems. Therefore, reliability and robustness are key issues in information technology infrastructure development. In addition, the developers need to incorporate new technology so that organization’s infrastructure meets future needs. A well-planned information technology infrastructure can adapt to changes in operations and in the environment. This paper deals with information technology infrastructure and the role of wireless technology – what it is and how it can be applied. Wireless technology is claimed to free the user from the desk. However, based on our empirical research “wireless“ is used in relatively few organizations today. We found out that wireless technology is used selectively in areas where it brings added value to operations.
Wireless technology, Networks, Information technology infrastructure
In this paper, a tarnsadmittance (TA)-type Kerwin-Huelsman-Newcomb (KHN) biquad is proposed. The proposed circuit employs four dual-output operational transadmittance amplifiers (DO-OTAs) as active elements together with two grounded capacitors as passive elements. The circuit simultaneously provides the three basic filter functions, namely bandpass (BP), highpass (HP) and lowpass (LP) functions. The proposed filter offers very high input and output impedances, which is important in the case of interface circuits connecting voltage-mode (VM) to current-mode (CM) circuits. SPICE simulation verification is performed.
Transadmittance-Mode, KHN-Biquad, DO-OTA
4 458-164
4 458-249
6 458-167
The locations of active brain areas can be estimated from the surface recordings. We describe the localization of the sources of the brain electrical activity via spatial filtering. This method incorporates the time-frequency characteristics of the neural sources for its location. The estimation of the location of active brain area is done in non-parametric fashion. The spatial filters are implemented as weighted sum of data recorded at different sites. The weights are chosen to minimize the output of the filter subject to linear constraint. The function of the linear constraint is to pass the brain electrical signal from a specific location, while attenuating the overall variance at the output of the filter. The method exploits space time-frequency covariance matrix of the data. The proposed algorithm is suited to localizing sources of time-varying and nonstationary signals. For this reason, this paper focuses on the class of frequency modulated (FM) signals, e.g., chirp signals.
Time-frequency, Chirp signals, linearly constrained minimum variance method, Magnetoencephalography
Photonic crystals are used to implement a novel multimode interference coupler that functions as a basic 1x2 power splitter achieving an excellent 3dB performance. The proposed device exhibits ultrasmall dimensions compared to corresponding classical MMI and waveguide based devices. The paper introduces a simple and effective design method based on the pattern of the distributed EM energy of a multimode photonic crystal waveguide.
Integrated optics, photonic crystals, waveguide couplers.
During the implementation of Data Warehouse data is derived from OLTP normalized database and then translated into denormalized dimensional model. Basic parameters for evaluation of this process are ETL process speed, disk space consumption, query performances and user friendliness. Any of mentioned parameters could be favored with appropriate model.
Data warehouse, Data mart, Dimensional modeling, Star schema
5 458-138
6 458-139
A new RC active polyphase filter section is presented. The section uses three conventional current feedback amplifiers (CFAs). The transfer function of the section has a single pole and optionally a single zero. With a cascade of this sections, any polyphase filter can be easily realized. The paper also introduces the leakage caused by element deviation and the effects of the amplifier in non-ideal case. Furthermore, non-ideal performances of the proposed filter section are tested with computer simulations.
Analog filter, polyphase filter, CFA filter, leakage, mismatch, simulation.
Along the advent of Internet technology, the computing environment has been considerably changed in many application domains. The integrated supply chain of business partners for e-Commerce in cyber space is defined as Logistics Chain whenever the cooperative activities are logistics-related. Logistics Chain could be managed effectively and efficiently by cooperative technologies of logistics chain execution(LCE). In this paper, we consider an uncertainty processing for the tracing of moving object to control pick-up and delivery vehicles based on GPS/GIS/ITS along with a routing and scheduling algorithm for pick-up and delivery process to minimize service time and cost in logistics chain. Uncertainty processing is required to minimize the overall cost for efficient vehicles trajectory management. Finally, we describe the Moving Object Management System with Routing and Scheduling Engine to perform plan and control activities in postal logistics environment. And we compare our result with the result of the pick-up and delivery routing plan generated manually by postmen.
e-Logistics, Collaborative Logistics Chain, Routes and Scheduling, Moving Object, GPS/GIS/ITS, Vehicles Tracing, Uncertainty Processing, Spatio-temporal Database
4 458-141
6 458-146
In the 2R/R converters imprecision of resistors introduces two types of error. Positive errors introduce a gap in the analog domain, while negative errors cause non-monotonicity in the input/output characteristics. Changing the resistor ratio from 2R/R to 2R+/R, with R+>R, we intentionally introduce an additional negative error in order to avoid resulting positive error gap. In this paper we propose a simple calibration of such 2R+/R converter. Simulation results confirm that even with resistors tolerance of few percents we can achieve a converter with error as low as one hundredth of a percent of full scale.
2R+/R DA Converter, Input/Output Characteristics, Gap, Calibration, Max INL
In order to provide QoS in group communications for real time applications such as video conferencing, reliable multicasting is used. Miscellaneous efforts have been undertaken to provide reliability on top of IP multicast. In this paper, we present a new fair share policy (FSP) that utilizes Differentiated Services to solve the problems of QoS and congestion control when reliable FEC multicast is adopted. Simulation programs are used to evaluate the Fair Share Policy. The results should provide insights into the comparisons between IP multicast in MPLS networks using FSP and plain IP multicasting using the same policy when DiffServ are adopted and when reliable FEC/ARQ multicast is considered.
Multicast, IP, MPLS, DiffServ, FEC/ARQ
6 458-148
6 458-149
An NPN Si/SiGe/Si double-heterojunction bipolar transistor (DHBT) and NPN Si/SiGe/SiGe single- heterojunction bipolar transistor (SiGe SHBT) structures have been simulated and their performance has been analyzed for high current applications. The performance of both the structures for current gain and cut-off frequency at high collector current density is analyzed using 2-dimensional MEDICI device simulator. A theoretical model is developed for both the structures and the predictions are observed to be in conformity with the simulated results. The comparison of results for current gain and cut-off frequency at high current densities predict better performance for the SiGe SHBT structure in comparison with the SiGe DHBT device. The improved performance of the SHBT structure is attributed to the base-collector homojunction of the structure, which prohibits the formation of retarding potential barrier at base-collector junction. This retarding potential barrier is prevalent in SiGe DHBT devices owing to valence band offset for the holes at base-collector heterojunction and degrades its high current performance.
SiGe, Heterojunction, Homojunction, Retarding potential barrier, Collector current density,
Active Queue Management (AQM) takes a trade-off between link utilization and delay experienced by data packets. From control point of view, it is rational to regard AQM as a typical regulation system. In this paper, two types of controllers, i.e. Sliding Mode Variable Structure (SMVS) controller and optimal Linear Quadratic Regulator (LQR) are designed for AQM. Simulation results conform the robust performance of SMVS controller against the disturbance. At the same time, a complete comparison between SMVS and LQR controllers is made. The conclusion is that both transient and steady state performance of SMVS controller is better than that of LQR one.
Active queue management, congestion control, robust control, sliding mode control, linear quadratic regulator.
6 458-150
6 458-151
In this paper, some application of computational intelligence techniques in active networking technology well be presented. Computational intelligent techniques, e.g., neural networks, fuzzy systems, neuro-fuzzy systems, and evolutionary algorithms have been successfully applied for many engineering problems. The introduction of active networking adds a high degree of flexibility in customizing the network infrastructure and introduces new functionality. Therefore, there is a clear need for investigating both the applicability of computational intelligence techniques in this new networking environment, as well as the provisions of active networking technology that computational intelligence techniques can exploit for improved operation.
Active Networks, computational intelligence, fuzzy logic, neural networks.
The rapid growth of the Internet, the massive amount of data traffic it carries and increased demand to use the Internet for time-sensitive voice and video applications necessitates the design and utilization of effective congestion control algorithms. Existing TCP/IP protocol suite has been designed for best effort (delay tolerant) services and cannot effectively support time sensitive applications. We will use the Integrated Dynamic Congestion Control (IDCC) scheme. The problem that comes up is the lack of an effective way of dealing with congestion. On the other hand, the IDCC scheme controls the traffic using information on the status of each queue in the network. It is based on a non-linear model of the network that is generated using fluid flow considerations. The aim of this paper is to design a robust active queue management system to secure high utilization, bounded delay and loss, while the network complies with the demands each traffic class sets. To this end, we will use the H‡ control theory. Simulation �results of the proposed control action demonstrate the effectiveness of the controller in providing robust queue management system.
Differentiated services networks, network management, robust control theory.
5 458-152
5 458-127
6 458-228
In this paper, a new discrete-time sliding mode approach for linear time-varying system is proposed. The proposed method guarantees that the system states are globally uniformly ultimately bounded in the presence of time-varying disturbance and uncertainly. It is also shown that the closed-loop system is globally asymptotically stable if disturbance and uncertainty are time invariant. Using the proposed control algorithm, steering control of highway vehicles is designed for a fundamentally new deriving maneuver and the tracking problem of relative lateral position is investigated. Simulation results reveal the efficiency of proposed controller.
Discrete-time sliding mode control, linear time-varying systems, steering control, highway vehicle.
This paper presents a high performance CMOS opamp. The operational amplifier have a rail to rail input and a class-AB rail to rail output stage. The opamp circuit is simulated using the SPICE program and the performance of the opamp is shown on a high order active filter which is suitable for video applications.
Circuit and System, Active Filters, High Performance Opamp.
Textile sliver drafting process has decisive influence on produced yarn quality and from the system theoretic point of view it is marked by non-linearity, distributed delays and highly oscillatory disturbance response. Similarly as most other textile manufacturing processes, this process has enjoyed almost no attention in control engineering literature. Motivated by current needs of textile manufacturing, the paper introduces a suitable mathematical model of this process and it proposes a control scheme based on internal model control approach. Due to the complexity of non-linear distributed delay model, the internal model controller is based on approximate rational model. Simulation results are given.
Time delay systems, Distributed delays, Quasipolynomials, Internal model control, Textile sliver drafting process
6 458-205
6 458-207
Diversity is a powerful communication receiver technique that provides wireless link improvement at relatively low cost. Furthermore, there are a wide range of diversity implementations, many of which are very practical and provide significant link improvement with little added cost. In this paper a well-known diversity technique, such as maximal ratio combining (MRC) is, will be investigated. This scheme will be applied in systems utilising several well known (convolutional coding-CC) and recently presented (turbo coding-TC) techniques used to combat the impact of selective fading on the OFDM system performance. Also the adaptivity technique through bit loading has been considered for a further improvement is system performance. We will demonstrate that the turbo coding scheme, especially when combined with MRC, provides sufficiently robust performance, rendering it a potential candidate for next generation broadband wireless communication systems, with the aim of providing extremely high data rate, bandwidth efficient signalling and improved quality of service (QoS).
Adaptive Modulation, Turbo Coding, BFWA System, Diversity, Maximal Ratio Combining
A new, based on the cellular automata, approach for processing and modelling the structure dynamics of nuclear fuel at different burn-ups is proposed. Some evidences for existence of self-organization processes in the fuel at high burn-ups were established. It was found that the fractal dimension of the surface structures strongly depends on the radiation damage of the material.
Nuclear Fuel, High Burn-up Structures, Cellular Automata, Fractal Analysis
6 458-209
7 458-185
- This paper proposes a new methodology for the estimation of ARMAX models, based on the implementation of a hybrid optimization algorithm and a corresponding estimation procedure. The specific algorithm attempts to interconnect the diverse characteristics of two entirely different optimization techniques, deterministic and stochastic, combining high convergence rate with increased reliability in the search for global optimum, and it consists of a super-positioned stochastic global search, followed by an independent deterministic procedure, in which the analytical gradients of the ARMAX model are used. The parametric, time-domain, identification problem considered in this study refers to the estimation of a SISO-ARMAX model, for the description of a half-car passive suspension system, taking into account that the excitation-response pair consists of a zero-mean white noise sequence (road profile) and a corresponding, noise corrupted, at 10% noise to signal ratio, vertical acceleration of the sprung mass.
System Identification, Evolutionary Algorithms, Hybrid Methods.
The study of a two-dimensional cellular automata able to perform synchronization task is hereby presented. Results show that, for two-dimension case, a perfect rule does not exist. However, the results of experiments show that non-perfect cellular automata with a good performance can be built even when radius of neighborhood is minimum.
Cellular automata, 2D Synchronization Task.
6 458-218
6 458-219
7 458-223
In this work we present the framework of a new software package to carry out the classification of the state variables in a process plant in order to determine the most convenient instrumentation configuration on the basis of adequate mathematical models of plant behaviour at steady state. We have designed and developed robust and efficient techniques for each step of the categorization task, the key modules being those for observability and redundancy analysis. The individual performance of each module with both academic and industrial examples was successful, revealing comparable or even better results than other existing techniques. Key aspects, such as modularity, user-friendliness, reliability, flexibility, expansibility, functional scalability, and stand-alone capabilities, were taken into account for the design of the integrated software.
Instrumentation – Decision Support System – Observability – Redundancy – Software Engineering
Cellular Automata (CA) represent an alternative approach to differential equations to model and simulate complex fluid dynamical systems, whose evolution depends on the local interactions of their constituent parts. A new notion of CA was developed by our research group Empedocles. It permitted to improve significantly an empirical method for modelling macroscopic phenomena, concerning surface flows. This approach was applied to lava flows, to debris flows and to pyroclastic flows. This paper presents the CA extended notion together with the improved empirical method. Examples of simulations are exhibited and compared with the real events in order to show the method efficiency.
Cellular automata, Modelling, Simulation, Fluid-dynamics, Lava, Debris flows, Pyroclastic flows
This paper deals with Cellular automata in the context of systems theory which concerns the study of abstract properties of systems and some techniques for analysing their behaviour taking into account input-outputs. We investigate the possibility to introduce in an appropriate way control and observation variables in cellular automata models. Some results related to additive cellular automata are given.
Cellular automata, distributed parameter systems, control, observation
9 458-224The continuous miniaturization and the increased complexity of today’s integrated circuits has led to a demand for faster simulation algorithms for physical processes. A method for designing a dedicated processor, which executes a cellular automaton (CA) algorithm that simulates the selected locally interacting system or physical process, using a genetic algorithm (GA), is described in this paper. An application example of the proposed method namely forest fire spreading is also presented. Starting from a CA with continuous state space which simulates the physical process, each time, the GA is used to find a CA with discrete state space, having the smallest possible lattice size and the smallest possible number of discrete states, the results of which are as close as possible to the results of the CA with continuous state space. The dedicated processor that executes the discrete CA algorithm was designed to the level of a silicon compiler output. This processor can be used as a part of a decision support system.
Cellular Automata, Genetic Algorithms, Simulation, Parallel processors, VLSI, Physical processes
6 458-204In the case of computer vision or image data processing, information about the performance of a camera and photography conditions or a limitation of data analysis is very important, although they tend to be given little attention. In the derivation and rectification of the camera intrinsic parameter, which characterizes the relationship between an image coordinate and a camera coordinate in a computer vision, distortion quantity cannot be disregarded if all screens are covered, although the distortion on a screen is slight and is proper to treat it as a minute quantity. It is necessary to take pixel size into consideration in image data interpolation in Affine transformation. When there are plural categories together in a pixel within a remote sensing image, it is difficult to distinguish it into a single category. After these points, currently dealt with as minute quantities, are properly treated, the results of corrections are clearly superior to those of conventional methods.
Computer vision, Camera intrinsic parameter, Affine transformation, Area oriented interpolation, Multi-band image, Category classification, Spatial resolution, SNR
6 458-226A recurrent problem encountered by distribute system designers is that of verifying, validating and evaluating the performance of complex software systems. The behavior of these systems generally depends on how the various software entities inter-relate and on the status of the underlying inter-network. Although many aspects of the distributed software engineering process have been addressed, there is still the need to investigate suitable simulation tools and methodologies that provide support to all seven OSI layers and are geared for modeling distributed applications over simulated inter-networks. In this paper we present such a simulation framework, illustrating its use and applicability through a number of example applications including application-level networking, mobile agent systems, GRID computing, and mobile services for 3G. Starting from the lessons learned from implementing those applications we propose a general methodology for the assessment of distributed systems and applications.
Application-level simulation; Simulation tools; Parallel and distributed computing; Performance evaluation
6 458-210This paper proposes a new methodology for the estimation of ARMAX models, based on the implementation of a hybrid optimization algorithm and a corresponding estimation procedure. The specific algorithm attempts to interconnect the diverse characteristics of two entirely different optimization techniques, deterministic and stochastic, combining high convergence rate with increased reliability in the search for global optimum, and it consists of a super-positioned stochastic global search, followed by an independent deterministic procedure, in which the analytical gradients of the ARMAX model are used. The parametric, time-domain, identification problem considered in this study refers to the estimation of a SISO-ARMAX model, for the description of a half-car passive suspension system, taking into account that the excitation-response pair consists of a zero-mean white noise sequence (road profile) and a corresponding, noise corrupted, at 10% noise to signal ratio, vertical acceleration of the sprung mass.
System Identification, Evolutionary Algorithms, Hybrid Methods.
5 458-229
6 458-230
New multimedia applications that use the Internet as a communication media are pressing for the development of new technologies, such as: MPLS (Multiprotocol Label Switching) and DiffServ, that introduce new and powerful features to the Internet backbone, as the provision of QoS (Quality of Service) capabilities. However, to obtain a true end-to-end QoS, it is not enough to implement such technologies in the network core, it becomes indispensable to extend such improvements to the access networks, what is the aim of works presently under development. To contribute with this process, a new and powerful service schema is presented herein as a mean to support a true end-to-end QoS, through the extension of MPLS. Thus, it is specified a Switched Virtual Connection (SVC) service to be used in the context of a MPLS User-to-Network Interface (MPLS UNI), that is able to efficiently establish and activate Label Switched Paths (LSP), starting from the access routers, that satisfy the QoS requirements demanded by the applications. The benefits and most important issues to be considered when using this specification are also included.
Access Network, MPLS, SVC, UNI, QoS
Three-dimensional coordinate transformations are an essential part of camera positioning within a driving simulator. They are also used for robotics and in flight simulators. In this paper, the mathematical framework for implementing three-dimensional coordinate transformations is presented provided with more detail for implementing it in a programming language such as C++. The positioning of a camera for the "behind and above" view in a driving simulator will be discussed as an application of coordinate system transformations.
Coordinate transformations, Camera positioning, Driving simulator
6 458-232
6 458-234
4 458-237
Abstract: - An electronic nose system for quality control of perfumes was designed and tested. The system uses the Figaro TGS800 series sensors with an integrated heating element. The testing of the system was carried out using different types of perfumes where it is proved successful in discriminating between the tested perfumes and actual classification of the tested elements into original and imitated once [10,12]. Database based software was designed to interface the built hardware and to process the electronic nose signals before being classified.
Electronic nose, Olfactory, Gas sensor, Hardware, Software.
This paper introduces a hybrid scheduling system and a method for combining Constraint Logic Programming with Neural Networks in order to achieve, where possible, optimal results in scheduling problems, while reducing the required processing time. The problem specifically examined is the job-shop scheduling problem, since its complexity and generality leads to the need of developing and using modern intelligent methods and systems for producing time-effective and operating solutions.
Scheduling, Neural Networks, CLP, Job-shop, Eclipse, Optimisation
This paper presents performance analysis of an adaptive Volterra/Hybrid equalizer in a nonlinear magneto-optic data storage channel. In a data storage system, nonlinear intersymbol interference (ISI) is one of the limiting factors for high storage density. Volterra and Hybrid (combination of linear and Volterra) equalizers are proposed and developed for compensation of nonlinear ISI. The use of Volterra/Hybrid equalizers provided an extra 1.3-1.5 dB SNR gain over linear equalizers. Performance and complexity of these equalizers are compared. Convergence issues are also investigated by examining the eigenvalue spread of the covariance matrix.
ISI, Nonlinear Equalization, Volterra, Optical Data Storage, SNR, eigenvalue, convergence ratio
6 458-239
4 458-246
8 458-251
Transformer fault diagnosis and repair is a complex task that includes many possible types of faults and demands special trained personnel. In this paper, Petri Nets are used for the simulation of transformer fault diagnosis process and the definition of the actions followed to repair the transformer. An oil thermometer and a Buchholz relay are used for transformer fault detection. Simulation results for the most common types of transformer faults (overloading, oil leakage, short-circuit and insulation failure) are presented. The proposed methodology aims at identifying the transformer fault and estimating the duration for transformer repair.
Power System, Transformer, Transformer Fault Diagnosis, Transformer Repair, Artificial Intelligence, Petri Nets
In this paper we give some examples of 1/f processes and show the (nearly) 1/f behavior of sea-wave noise data. Wavelet-based method is used as a tool to analyze the power-law relationship that is observed in the wavelet coefficients’ variance progression.
1/f processes, self-similarity, wavelet-based analysis.
The purpose of this paper is to give a brief overview of cost estimating methods and cost uncertainty assessment and management techniques for complex systems. The basic cost estimating techniques, their advantages and the limitations of their use are presented. In the field of cost uncertainty, the need for more realistic estimation led estimators to abandon the traditional approach of deterministic estimates. The use of probability or possibility theory, simulation methods and heuristics for cost estimation has been widely accepted, even though there is not a common understanding about the definition of uncertainty or risk. Thus, fundamental questions about the uncertainty and its effective and practicable handling remain open
cost estimation, cost uncertainty, cost – risk, uncertainty assessment, cost uncertainty assessment
6 458-225
7 458-189
We continue the investigation into the dynamics and evolution of fuzzy rules, obtained by the fuzzification of the disjunctive normal form, and initiated for Rule 90 in Flocchini-Geurts-Mingarelli-Santoro (2000). Interest in the boolean form of Rule 110 has been tremendous since the discovery that it supports Turing-complete computation. Inspired by this, we present new results regarding the dynamics of fuzzy Rule 110 whose boolean evolution is also known to be chaotic [Wolfram (2002), p.871]. In particular, we show that in the fuzzy case with a finite support configuration all spatio-temporal sequences are aperiodic, and their convergence is strongly dependent upon their positions along key diagonals. It follows that fuzzy Rule 110 is neither chaotic nor random. It turns out that the evolution and dynamics in this case differ radically from those in fuzzy Rule 90. We will show that the dynamics of fuzzy Rule 110 make it such that every key sequence converges to interesting distinct mathematical constants that, themselves, converge to an unexpected key mathematical constant.
Fuzzy, Cellular Automata, Rule 110, Global Evolution, Golden Number, Fibonacci numbers
This article presents a novel congestion-based pricing scheme for IP networks, termed Bounded Local Adaptive Packet Pricing (BLAPP). The BLAPP scheme enables IP users to limit their expenses on routing packets by enforcing a price limit in the packet’s header. BLAPP extends the LAPP scheme in which payment is collected on a per-packet basis in each router on the packet's path. In both protocols, each router changes its price for each service level in response to its congestion at a specific output port. Finally, the BLAPP scheme is analyzed using network simulations of traffic congestions. The analysis suggests that BLAPP exhibits a correlation between user expenses and QoS properties such as RTT, especially when the network is congested. Thus, a user may control his or her QoS using payments without having to allocate network resources on a per-session basis (e.g., RSVP protocol).
IP-pricing, IP-billing, Quality of Service (QoS), Differentiated Services (DiffServ), Service Level Agreement (SLA), Internet Service Provider (ISP)
6 458-196
9 458-197
Author discuss the problem of determining parameters suitable systolic arrays for implementation regular 3-nested loop algorithms. It is shown that on that occasion the characteristics of adaptable algorithms to the projection direction should be used, if it has they. If this characteristics are not used, the difference in obtained results could be very significant. Obtained results in this paper are illustrated on the example of matrix multiplication as one of typical adaptable algorithm which enables synthesis systolic arrays.
Systolic arrays, Adaptable algorithms, Systolic arrays characteristics, Matrix multiplication
This paper targets data-parallel applications which are also computation-intensive. It presents a configurable and scalable SIMD machine implemented on platform FPGAs. This SIMD machine is comprised of a sequencer, a PE array, an integer RISC processor and a host. The SIMD architecture and its instruction set are discussed in detail. Performance analysis shows that the correct implementation of this machine on FPGAs has been well done and high floating-point throughput is achieved. Such FPGA-based parallel machines are expected to become popular in the near future.
SIMD (Single Instruction and Multiple Data), PE (Processing Element), ILP (Instruction Level Parallelism), pipeline, FPGA (Field-Programmable Gate Array).
7 458-194
5 458-190
5 458-201
Neural Networks (NN) are now widely used tools, mainly used to solve recognition and classification problems. The present paper intends to show how their learning capability can be applied to adaptive signal processing problems risen by Mobile Space Communications, either in replacement of conventional adaptive methods or to cope with the most difficult cases in the domain: non linear and/or non stationary problems. A general overview of NN is given in the first section, highlighting their key features : approximation capability, learning characteristic, etc.. The second section scans majors applications to Digital Communications : system and channel identification, equalization, and linearization (i.e. predistortion). A particular emphasis is put on selected specific examples where NNs yield unrivaled solutions : non linear communication systems, time-varying channels
Mobile communications, Satellite communications, Identification, Equalization, Predistortion
The discrete-time linear quadratic optimal problem with finite final time for a servo-drive system with a brushless or a dc motor is presented. The proposed algorithm allows simplifying the optimal control law implementation. The optimal control ensures a good behavior of the system and the decrease of the energy consumption.
Optimal control, Brushless, DC machines, Efficiency, Servo drives
A new approach for solution the Dirichlet boundary problem for Laplace equation is proposed. It is based on the introduced by author GR-principle and leads to new method that uses the inverse Radon transformation. The fast algorithm for proposed method is constructed, realized as software for MATLAB system and demonstrated with numerical experiments on simulated examples.
fast algorithms, Dirichlet problem, Laplace equation, Radon transformation
5 458-202
5 458-181
This paper introduces an adaptive technique for audio watermarking. Almost all of the published audio watermarking methods report a tradeoff between audibility and detectibility, and performs well in digital environment. However, in most of the applications audio should be transmitted through the channels (in analog form) in which the detection performance relies on the strength of embedded watermark signal. This work proposes a new frequency-domain technique which allows to increase watermark strength in a data adaptive way while preserving inaudibility. The method is compatible to MPEG Layer 1 and robust to stereo-to-mono conversions.
Physcoacoustic masking, Data hiding, Watermark decoding.
: In this paper we introduce a fast, robust, accurate eye localization algorithm. Detecting and normalizing human faces from live video streams is the first crucial step in a face verification/recognition system. The accuracy and robustness affect the performance of the following face registration and classification. To localize face regions properly, we detect eye corners by using a corner detector and Gabor wavelets. First, by applying a corner detector in skin color regions, we dramatically reduce the candidate regions for eye corners. Extracted features are represented in a semilocal manner to increase discrimination. Then, in the set of the reduced candidates, a robust feature decision algorithm based on Gabor response analysis gives accurate eye corner locations. Experimental results on real images are presented.
Eye localization, Face recognition, Gabor wavelet, Face detection, Face animation
9 458-110
7 458-136
7 458-134
A Lecturers’ web questionnaire generator is described in this paper, it is an application that makes easier and forward making of dynamic web questionnaire forms and their processing and showing of results as graphic form. It’s a flexible application for the use by either the end users or by researchers. The main technology used to develop this application is PHP PHP version 4.1 (Programming language) with its twins MySQL (database engine) and Apache (Web server), in addition to previous knowledge about HTML and JavaScript. The system has two interfaces, one is meant for the end users (Students), and the other is dedicated solely to the researcher whom is interested about analyzing the input data.
Questionnaire, Online System, Researcher, Form Manipulation, and Data Analysis
n this paper the authors present how to apply the system parameter fusion principle to evaluating the core competence of the corporation. Based on the establishment of the evaluation index system of corporation¡¯s core competence and determination of the weights of various index factors, the authors fuse the numerous index level evaluation factors into one unified parameter, i.e. ¡°the overall evaluation value of the corporation¡¯s core competence".
Core competence, evaluation, data fusion, system parameter fusion principle
Most of the local area networks have been designed for non-real time transmission of digital data as text and images. To achieve audio data transmitting over the network in efficiency manner (real-time), the implementation of audio-on-demand using the Real Time Protocol will be discussed. The performance of the system implementation both of the resulting packet loss and delay jitter will be presented. This paper describes audio streaming transmission protocols that used to implement the system, the system architecture and how the system investigates and addresses the previous issues. The Java Media Framework library (JMF) and the Real-time Transport Protocol (RTP) for audio transmission were used as development tools.
Multimedia, Real-time Transport protocol, audio-on-Demand, buffering time, Java Media Framework, Media Locator.
6 458-231
6 458-179
9 458-125
In this paper bit-level systolic arrays for digitized contour derivatives estimation related to the constrained least-squares digital contour smoothing are described. The derivatives estimation is represented by linear operators defined by sparse circulant Toeplitz matrices with integer coefficients. A suitable decomposition of these matrices allows to analyse various pipelined bit-level strategies of the computation. The corresponding bit-level systolic arrays for the derivatives estimation have a simple regular structure and achieve very high throughputs. They can be used for real-time digital curves analysis.
bit-level systolic arrays, VLSI, digital contour smoothing, digitized contour derivatives
When analyzing the reliability of a time-constrained distributed software, the Markov state space is often used. However, many evaluation methods are not fast and the size of Markov state space is very large. In this paper, we propose an approach for the reliability analysis of distributed software with time constraint. The approach proposed is based on the principle of distributed program reliability analysis, and combines the reliability-preserving reduction with breath-first manner and fast reliability evaluation algorithm (FREA). We propose a new analysis model, called Reliability Analysis with Degree-n and Redundancy Reduction (RADR), and calculate transmission time of data files needed in the file spanning tree (FST). A simple distributed time-constrained system is discussed to illustrate the feasibility of the proposed approach.
Reliability analysis, Distributed software, File spanning tree, Time-constrained distributed software, Response time, Transmission time
An extended object-oriented data model LOGIDATA++ (derived from the LOGIDATA model) for object-oriented databases is proposed. Terminological reasoning with cycles has been applied for this extended data model. An objective SQL-type query language and a persistence mechanism for the LOGIDATA++ data model have been specified and implemented. Some of the advantages of using terminological reasoning for OO databases are illustrated by examples. The model seems to support rapid prototyping.
Object-oriented databases, terminological reasoning, persistence, SQL query language
6 458-137
6 458-130
6 458-192
This paper describes a satellite-based solution which employs the SCPC/DAMA VSAT based networking system capable of providing a wide variety of communication services for extended corporate network. With an IP multicast-enabled satellite overlay, an ISP could roll-out advanced services, improve network response time, provide customized service offerings and increase revenue.
scpc/dama vsat, satellite-based network, internet service provider (isp), quality of service (qos)
In this paper, the meaning of real estate enterprises informatization is discussed according to the current situation of evaluating real estate enterprises informatization in China. It puts forward the index system of real estate enterprise informatization, and presents a way to evaluate the level of real estate enterprises using the system parameter fusion principle.
Data fusion, real estate enterprise, informatization, index system, evaluation
Classic designs of optical transimpedance amplifiers for p-i-n photodiode receiver circuits generally employ common-emitter or common-source input stages. In this paper, we explore the design of a new calss of high-performance "current-mode" optical transimpedance preamplifiers based on CMOS and BiCMOS common-gate and common-base input stages using a new-design approach hereafter called “total-transistor approach.” The total-transistor design approach showed high potential in significantly optimizing performance features. Simulated results of a 7.5 GHz common-base, 3.6 GHz common-gate, and 3.0 GHz common-source input transimpedance amplifiers are presented. The results are superior to those of similar recent designs and comparable to IC designs using GaAs technology. A detailed analysis of the design architecture is presented.
High gain, Low Noise, Optical Receivers, Transimpedance amplifiers
9 458-238
4 458-143
9 458-188
A new impulse noise detection technique from gray-scale and multichannel images is presented. It is based on block correlation of the noncausal linear prediction. The linear prediction coefficients are calculated using a block of the image at one instant. These coefficients are valid within that block only and are used to predict a pixel in a sliding window within the block. The sample is predicted from its neighboring pixels, considering past and future values. The current sample is corrupted if its difference from the predicted value is bigger than a pre-defined threshold.
Scalar, Vector, Linear prediction, Threshold, Center–weighted median filter, Vector median filter, noncausal
The Design Maintenance System™ (DMS™) is a research vision and a set of tools for semi-automated construction and maintenance of medium to large-scale software systems. Rather than reusing code, DMS is intended to apply program transformation technology, (re)use construction knowledge from multiple domains, and (re)use the design of the target software system. For the DMS vision to be successful in practice, not only must the related research problems be solved, but the related scale problems must also be solved. A considerable amount of domain knowledge must be acquired, and DMS must be able to handle large codes in multiple legacy languages. To obtain enough time and resources to handle such scale, DMS must be successful in a commercial sense. We walk a difficult line between Research and Product. The DMS vision is sketched, and the technology we have used to build a scalable, near-production foundation will be described. We mention some DMS applications.
Design Maintenance System Software Reuse
In this paper we launch a systematic study of a subclass of $\infty$-regular languages called incomplete generating languages. These languages represent a non-deterministic output of a computer with finite operational memory, where the decisions are made by observing previous $k$ states.
Incomplete generating language, Finite automaton, Regular language.
3 458-184
5 458-248
5 458-109
Right zero semigroups have been proved to be NP-complete subclasses of the Constraint Satisfaction Problem. In this work we represent world wide web as a right zero semigroup. We also give some ideas about how this semigroup can model web browsing behaviors and post some questions that need further investigation concerning world wide web and NP completeness.
Key words: - Constraint Satisfaction Problem, NP-complete, semigroups, web
- There is considerable pressure on academic and educational institutes to improve accessibility and quality of the learning environments. Many have found the Web-based technologies as part of the solution. In a Web-based learning environment learners, which are often physically separated from teachers, can participate in the learning environment at their convenient time and location. Most of the existing e-Learning systems are designed for content-based subjects that deliver course content such as text, images, video, audio, and simulation to the student through the Internet. In this paper, we introduce a model for providing experimental and lab-based lessons over the Internet. In our study, we present the lab-based experiments as reusable Learning Objects (LO).
Online Laboratory, Virtual Laboratory, e-learning, Reusable Learning Objects
In this paper, the classification of textured images was studied. A good classification relies on feature extraction stage. In this work, several texture samples were analyzed using wavelet transform which is a new and promising set of tools. It was shown that wavelet transform was appropriate for texture feature extraction. The performances of statistical properties of wavelet detail coefficients were compared in several classification experiments. And it was shown that, when used together the standard, median absolute and mean absolute deviations of horizontal, vertical and diagonal wavelet detail coefficients were appropriate wavelet signatures for achieving a successful texture classification with acceptable low error rates.
Wavelets, Texture analysis, Pattern recognition, Image processing
5 458-108
9 458-107
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique. Over the past few years, while arithmetic coding has still been the focus of a lot of intense research, studies have proven compression-specific arithmetic coding to be largely unsuitable for encryption. This is in spite of the large size of the model that arithmetic coding works with. Adaptive modelling, in particular, offers a huge model, variable in structure, and as completely as possible a function of the entire text that has been transmitted since the time the model was initialized. This serves as a huge key, which can make decryption arbitrarily difficult. But the scheme has been shown to be vulnerable to organized cryptanalysis. The focus of the work presented in this paper has been to incorporate the results of chaos theory into arithmetic coding, to device a convenient method to make the structure of the model unpredictable and variable in nature, and yet to retain, as far as is possible, statistical harmony, so that compression is possible. A chaos-based adaptive arithmetic coding-encryption technique has been designed, developed and tested and its implementation has been discussed. For typical text files, the
Symmetric key cryptography, Variable model, Arithmetic coding, chaos, Compression, Encryption
In this paper, the performance of hybrid Turbo codes over an optical PPM communication channel employing an avalanche photodiode (APD) detector is analyzed and simulated. Hybrid Turbo codes belong to a class of concatenated codes with the parallel concatenation of an interleaved convolutional code with a serially concatenated convolutional code. The simulations are carried out with Gaussian approximation model of APD output statistics. The results show that in less than six iterations, better bit-error rates (BER) can be obtained than reported in the literature corresponding to additive white Gaussian noise (AWGN) channels. For example, for -90dBW of received laser power, all the bits are received correctly after the third iteration.
Turbo codes, , Error control coding, Pulse position modulation, Optical communications
9 458-106
9 458-105
In this paper we propose the use of Turbo Codes for M-ary pulse position modulated pulses over UWB communication channels with multipath. The transmitted power of the UWB pulses is required to be very small as they are used in the existing spectrum designated to other uses. This constraint requires that UWB signals have good performance at low SNR’s. Turbo codes have been shown to perform well at low SNRs. We present the simulation results of using rate 1/2 and 1/3 turbo codes. Also, the effects of varying the symbols set size, the SNR of the channel and the interleaver size are presented. It has been shown in this paper that for a fixed SNR (4 dB), the rate 1/3 code shows an improvement of 2 orders of magnitude when M = 2 and 3 orders of magnitude when M = 4 or M = 8. For the same SNR, the rate 1/2 code shows an improvement of 1 to 2 orders of magnitude. To achieve a BER of 10-5, the rate 1/3 turbo code requires SNR = 6 dB when M = 4 and SNR = 3 dB when M = 8. Increase in the size of the interleaver from 29 to 214 results in a decrease in BER from 10-2 to 10-3 for SNR = 4 and M = 2.
Turbo codes, Ultra wideband communication, Error control coding, Pulse position modulation
We present a novel method for constructing trellis codes, based on recursive nonlinear equations. Using this method, trellis codes having good code rates (R = k/n) can be constructed. At the same time, the method allows the code-designer to construct a trellis with a large free distance, dfree, at the cost of a larger number of states in the trellis. It has been shown in this paper that for the code rate, R, less than a critical rate, Rc, the free distance can be made as large as desired for large n. This design methodology provides the freedom to play with the code performance and the code rate of the trellis code. Using this method, a rate 3/4 trellis code has been constructed with dfree = 12.
Trellis codes, Error correcting codes, Minimum free distance, Trellis diagram, Convolutional codes
6 458-122In this paper, we improve our Web-based Intelligent Tutoring System (ITS) for distant health professionals in fundamental aspects of health care technology, incorporating fuzzy logic. Our system offers course units covering the needs of users with different knowledge levels and personal characteristics. It tailors the presentation of the educational material to the users’ diverse needs by using AI techniques to specify each user’s model as well as to make pedagogical decisions, in An environment with linguistic or imprecise data. This is achieved via an expert system that uses a hybrid knowledge representation formalism integrating fuzzy rules with neurocomputing. The final model based on fuzzy neurons is more global and efficient, since it requires the least possible training effort, the number of the produced units is kept as small as possible, and it works in an environment of fuzzy as well as crisp data. According to our preliminary results the number of the students that were used the system and passed ITS’s tests is not significantly different from them that were participated the same course in our previous system or in the traditional classroom.
Web Based Education, Hybrid Expert System, Biomedical technology
4 458-154
Detection 6 458-203
Abstract - The Emotional Learning Algorithm has been introduced to show the effect of emotions as well known stimuli in the quick and almost satisficing decision making in human. The remarkable properties of emotional learning, low computational complexity and fast training, and its simplicity in multi objective problems has made it a powerful methodology in real time control and decision systems, where the gradient based methods and evolutionary algorithms are hard to be used due to their high computational complexity. Recently the emotional approach has been successfully used to obtain multiple objectives in prediction problems of real world phenomena, more specifically space weather forecasting. A newer and more realistic model of emotional learning in human brain is used in this study to predict the most popular index of geomagnetic activity: Kp. The interplanetary Kp index is mainly used in warning and alert systems for satellites. The proposed model with brain emotional learning algorithm is introduced to make purposeful prediction of Kp index. Both the prediction accuracy during geomagnetic disturbances and substorms, and the rate of associated correct warning messages show the efficiency of this algorithm.
Prediction, Emotional Learning, BEL, Multi Objective Decision Making, Space Weather, Geomagnetic
In this paper we deal with the problem of incoherent adaptive detection of range spread targets in the presence of Gaussian disturbance with structured covariance matrix, which, at the design stage, is modeled as an unknown parameter. To this end we assume that a secondary data set, free of useful target and with the same spectral properties of the cells under test, is available. We devise three receivers based on the Generalized Likelihood Ratio Test (GLRT) and assess their performance under different scenarios for both the target and the disturbance also in comparison with their counterparts designed under the hypothesis of unstructured Gaussian disturbance.
9 458-208
4 458-200
A new impulse noise detection technique from gray-scale and multichannel images is presented. It is based on block correlation of the noncausal linear prediction. The linear prediction coefficients are calculated using a block of the image at one instant. These coefficients are valid within that block only and are used to predict a pixel in a sliding window within the block. The sample is predicted from its neighboring pixels, considering past and future values. The current sample is corrupted if its difference from the predicted value is bigger than a pre-defined threshold.
Scalar, Vector, Linear prediction, Threshold, Center–weighted median filter, Vector median filter, noncausal
This paper presents an image retrieval method using a recursive matching scheme. In content-based image retrieval, a feature of an image cannot be perfectly extracted without inclusion of environmental noises like lighting and pose variation because of the imperfection of the extraction tools. Therefore, a feature extracted by a visual tool is the degraded version of the content information by environmental noise. To remove the effect by the environmental noise in image retrieval, we reuse the first-ranked retrieval image as an extra query image. The procedure are repeated within a fixed buffer of small size in a recursive way. Experimental results in the context of face retrieval show that the proposal method can improve image retrieval accuracy in the cost of the ignorable burden of the computational complexity
Content-based image retrieval, Recursive matching, Face recognition
6 458-162
9 458-161
Techniques are proposed to support the video based development of systems for indoor exploration with mobile robots. The technique of redundant programming is often used to improve the reliability of operating systems, but the use of this technique is not common for CV (computer vision) applications. Also a new technique to create CAD (computer aided design) models from image data is described. These techniques were used for the development of an RV (robot vision) program. The observed recognition power exceeds the abilities of sophisticated but conventional programs clearly. This is documented with sample images.
Robot vision, Computer vision, Computer aided design, Object reconstruction, Object recognition, Redundant programming
Abstract: Zamin, is a general purpose artificial environment suitable for cognitive studies. This environment, which presents high-level agents in a rather complex environment, has been successfully used as a test bed for some AI researches, like cooperative learning. Although it still has some deficiencies, it has many useful features and in addition, it can be enhanced with some proposed features to cover more capabilities. We have prepare a survey on some recent researches in the area of Artificial Life to show the advantages of this environment in comparison with nowadays special purpose as well as general purpose simulated world test-beds. In addition we have tried to highlight its disadvantages that may be fixed by researchers that are interested in this subject. Source code and documentation of both versions of Zamin (with normal as well as fuzzy learners) are publicly available on the web.
Artificial life, Case-based Reasoning, Fuzzy decision making, Immerging behavior, Genetic evolution
6 458-160
7 458-159
Abstract- During landing, aircrafts have to face low-altitude wind shear that can be fatal. Most commercial aircrafts currently have optimal automatic landing systems, but they are activated only if well-specified wind speed limitations are met. The reason is that these autolanding systems are not designed to work in the presence of strong wind gusts. In this paper, we apply a modified version of brain emotional learning based intelligent controller (BELBIC) to the autolanding system whose multivariable and non-minimum phase nature make the task difficult. By comparing the results with the results derived from using a high-gain controller, we show that our proposed solution can achieve robust and satisfactory performance.
BELBIC, Autolanding System, Vertical Velocity, Altitude
ABSTRACT- Switched Reluctance (SR) drive technology is a serious contender for replacing the existing technologies, because of its technical and economic advantages. If some remaining problems like excessive torque ripple could be resolved through intelligent control, it would enjoy enormous comparative advantages for grabbing significant market share. In this paper we report the utilization of a novel controller, BELBIC, based on emotion processing mechanism in brain. Our results show superior control characteristics especially very fast response, simple implementation and robustness with respect to disturbances and manufacturing imperfections. Our proposed method enables the designer to shape the response in accordance with multiple objectives.
BELBIC, Speed Control, Switched
6 458-158
6 458-157
Abstract: - A new approach for the multi-objective control of dynamic plants is presented based on the agent concept. The control system consists of a neurofuzzy controller whose weights are adapted according to emotional signals provided by blocks called emotional critics. Each critic is assigned to assess the situation of its corresponding control objective. Simulation results are provided for the control of different dynamical systems in order to clarify the matter further.
Intelligent control, multi-objective systems, emotional learning, neurofuzzy control, agents
Abstract: Programming mobile robots can be long and difficult task. The idea of having a robot learn how to accomplish a task, rather than being told explicitly is appealing. ) ( ë TD implementation of Reinforcement Learning (RL) using Fuzzy Neural Network (FNN) is suggested as plausible approach for this task, while Q-Learning is shown to be inadequate. Although there is no formal proof of its superiority, but it did better in a simple simulation.
Mobile robots, Reinforcement learning, Fuzzy neural network,
6 458-140
4 458-155
With the increasing emphasis on the emerging automatic personal identification applications, Personal Identification based on Biometric Features especially fingerprint based Identification is receiving a lot of attention. Fingerprint is one of the most vital and unique Biometric Features and provides a degree of reliability, repeatability and ease in use not found in other biometric features like voice, face thermogram, handwriting patterns etc. Most fingerprint based Personal Identification systems use Minutiae based matching to calculate the similarity between two given prints. Several image enhancement algorithms need to be applied to fingerprints scanned from commercially available scanners before extraction of the features from these images. In this paper we investigate the results of a few conventional image enhancement algorithms and present a new approach to image enhancement which includes variance-cum-mean based segmentation and local mean based image binarisation. The verification accuracy with the new approach was found improved and quite acceptable for low and medium cost applications.
IndexTerms: Minutiae, Ridges, Matching, Verification, Segmentation
Abstract: Reinforcement learning algorithm has been successfully used in prediction and decision making [5,11]. The main contribution of this paper is to provide decision making using reinforcement learning approach to allocate resources optimally in stochastic conditions in a well known example; in the portfolio selection. The modern theories of portfolio selection consider some presumptions. But if they don’t hold, these methods are no longer efficient. So these days, some papers have been written by using the artificial intelligent methods. In this paper, appropriate emotional reinforcement signal is composed for portfolio selection. For this purpose, the reward signal is taken as the output of a linguistic fuzzy inference system with the return of portfolio and the risk of portfolio as inputs, then we implement the Q-learning neural network and we train this network with the proposed reward signal.
Q-learning, Neural networks, Emotional learning, Portfolio selection
9 458-227
5 458-199
Motivation: Over the last decade, a vast amount of new genomic data has become available, and all of these sequences need to be annotated. Conventional annotation techniques are based on comparison of the new sequences with reference sets or genomic data from evolutionary close species. This rather narrow spectrum of techniques is in dire need of complimentary approaches to make genome annotation more reliable. Here, we present a computational Bayesian approach that allows detection of the genomic regions which are the most likely to contain coding or regulatory sequences. Results: We present a computational statistical, content-based approach to the genome wide search for coding and regulatory regions in the eukaryotic DNA. Our method performs an unsupervised search, without using reference sets or cross genome comparison. Although in this study we have restricted our analyses to the sea urchin Otx, and the mouse HoxD genes, we are confident that the technique is widely applicable. The outcome of these preliminary investigations revealed the potential of our approach as a powerful DNA sequence characterization and annotation tool. What distinguishes our approach from the others in this area: (i) Few, if any, attempts have been made to
Statistical computational methods, Bioinformatics, Genome sequencing, Regulatory dna regions, Coding dna regions
In this paper we introduce a fast, robust, accurate eye localization algorithm. Detecting and normalizing human faces from live video streams is the first crucial step in a face verification/recognition system. The accuracy and robustness affect the performance of the following face registration and classification. To localize face regions properly, we detect eye corners by using a corner detector and Gabor wavelets. First, by applying a corner detector in skin color regions, we dramatically reduce the candidate regions for eye corners. Extracted features are represented in a semilocal manner to increase discrimination. Then, in the set of the reduced candidates, a robust feature decision algorithm based on Gabor response analysis gives accurate eye corner locations. Experimental results on real images are presented.
Eye localization, Face recognition, Gabor wavelet, Face detection, Face animation
3 458-168
4 458-195
8 458-170
5 458-147
Multiple Finite-Value Logic and Demonstrations Dr.oloyede A.S ,Dr.Anani A. R PhD student, Ado-Ekiti University. As an attempt to design open specifications for finite-value logic systems Different types of logic calculus are proposed to be used in the tasks of artificial intelligence. In these different logics variables are of different types and their values are rational countables numbers of various finite sets. The actual calculus is based on sequences. The upper estimates for complexity of decidability of a certain propositional fragment if the calculus were received.A significant amount of material is already collected and it is permanently increasing,it is a unique phenomenon.
As an attempt to design, open, specifications for finite-value logic systems
In this paper, we focus on data transmission in WCDMA systems using packet scheduling for DCH and DSCH, in case when only video streaming service users and WWW service users are engaged. Network exploiting the DCH and DSCH as a data transport channels can provide higher throughput than a network without DSCH, if a good combination of resource sharing between the DCH and DSCH is selected.
UMTS, WCDMA, Packet Scheduling, DCH, DSCH, Streaming Video, Interactive WWW Service
The evaluation of the permanent is a #P-hard, i.e. probably unsolvable in polynomial time. Many problems of practical importance can be reduced to it. It is often the case that the efficiency of the algorithm is more signifficant than its precision. In this paper we give approximate formulae for the permanent and find an upper and a lower bound of the permanent as functions of some easily computed charcteristics of the matrix.
Matrix, Permanent, Algortithm, Complexity, Assignment
In this paper, the meaning of real estate enterprises informatization is discussed according to the current situation of evaluating real estate enterprise informatization in China. It puts forward the index system of real estate enterprise informatization and presents a method to evaluate the level of real estate enterprises.
Real estate enterprise, informatization, index system, evaluation
6 458-145
6 458-144
4 458-213
Knowledge compilation deals with the computational intractability of reasoning problems. To overcome this difficulty we provide three different compilation approaches to a first order knowledge base. The knowledge base $\Sigma$ is preprocessed by unit resolution into an approximate knowledge base CKB($\Sigma$) from which a subset of possible queries can be answered by unit refutation. The number of clauses obtained by each of the three methods is less than the number of clauses in the prime implicate set.
First Order Logic, Resolution Restriction, Horn Clauses
One of the factors contributing to the rapid growth of e-Learning has been the rapid development of the World Wide Web relative ubiquity of standard Web-browsers. However, we argue in this paper that the standard Web-browser is reaching its limits as the de facto client for e-Learning. The standard Web-browser-central server combination in many circumstances does not deal well with factors such a performance, security, privacy, and learner-centered control. We outline an alternative framework to support the evolution of agent-based multimedia e-Learning.
E-Learning, learner environment, privacy, agents, distributed
The discrete wavelet transform is a multi-scale signal representation. Here it is shown that coarse form is equaivalent to approximated output and fine part to the differentially fed output or hyper planes.
Discrete wavelet transform, Artificial neural networks, Differential feeding.
8 458-172
4 458-217
6 458-156
In this paper, the locomotion of an autonomously navigated undersea vehicle that uses vorticity control propulsion is computationally simulated. The navigation procedure employs a set of vehicle geometric and state variables to predict the needed vehicle body deformations in order to pass through a set of predefined path-points. To simulate the movement of the vehicle, a two-dimensional unsteady potential flow solver was developed based on the unsteady panel method coupled with the vehicle dynamics. The developed flow solver was validated against published computational results of unsteady flow standard test cases. Then, another set of properly planned test cases to cover the range of possible conditions were processed with the simulation and the output data was subsequently used to train a Multi-Layer Perceptron (MLP) neural network. The trained network can predict what body deflection time history is necessary for the vehicle to pass through the given path-points. Several autonomous navigation test cases are presented to show the capabilities of the present method.
Numerical Simulation, Unsteady Flow, Unsteady Panel Method, Unmanned Undersea Vehicle, Neural Network Control
Generally the neural networks employing Bayesian decision do not output one simple hypothesis, but a manifold of probability distributions.
Bayesian Decision, Differentially fed Artificial Neural Networks,
Abstract: - In this paper we consider ways for defining personality of artificial agents. The main idea comes from imitating the nature, mostly people and their personality. We have tried to use personality elements for our agents as much as possible. Learning aspect is considered here. For learning, we have applied the method on Hunter and Prey problem. The learning method is reinforcement learning and the effects of defining personality for agents are considered.
Artificial Intelligence, Agent Based Systems, Defining Personality, Learning
9 467-101
8 467-102
7 467-104
4 467-105
4 467-106
4 467-107
Public key schemes use two keys, i.e. public key used for encryption and private key used for decryption. But still there is a major problem in these schemes, as cryptanalyst has access to the public key and the sender’s identity, which might help him or
Cryptography, Public key, Blind Digital signature, DSS, Authentication.
This paper presents an on-line fuzzy optimization of the global efficiency of a photovoltaic water pumping system driven by a separately excited dc motor (DCM), a permanent magnet synchronous motor (PMSM), or an induction motor (IM). The optimization pro
Photovoltaic water pumping, Optimization, Fuzzy logic controller, DC and AC actuators
The utility and importance of symbolic analysis is well known in our area, i.e. Control Theory is not conceived without Mason’s Rule. This article remarks this importance with some novel applications. Basic applications are exposed, general filters based
Symbolic design, Mason’s rule, Transconductance Oerational Amplifiers, OTA’s, bandpass filter, Q quality factor, Gm-C
The problem of function approximation to map a set of data with another is challenging When they are non linearly related. A variety of solutions based on Neural Networks are found in the literature. In this paper, a new class of Artificial neural network
ANN,Differential feedback, Gaussian kernal, manifold, convolution
Generally the neural networks employing Bayesian decision do not output one simple hypothesis, but a manifold of probability distributions. This throws out the bayes posterior coefficients as a large number of classifiers. Here a novel method based on dif
ANN,Differential feedback, Bayesian decision, manifold, estimator
The interactions among a family of probability distributions can be studied under Information Geometry. With Bayesian decision theory, these interactions lead to the concept of “ideal estimates”. In this paper the concept of differential feedback is added
ANN,Differential feedback, Bayesian decision, manifold, estimator
4 467-109
6 467-110
5 467-111
9 467-112
9 467-113
5 467-114
8 467-115
The discrete wavelet transform is a multi-scale signal representation. Here it is shown that coarse form is equivalent to the approximated output and fine part to the differentially fed output or hyper planes. The wave let coefficients represent different
wavelet representation of differentially fed Ann
IBIS (I/O buffer information specification) model is widely used in signal integrity analysis of on-board high-speed digital systems. But many other circuit level simulations require conversion of given IBIS model to equivalent SPICE behavioral model. In
Ibis, Spice, Behavioral model, Switching time coefficient, Signal integrity
The implementation of the control algorithms from the simulation environment into industrial controller is necessary to solve effectively in relation to minimization of implementation errors. The capability of algorithm transmission into the industrial co
Real-time, MATLAB®, Simulink®, PLC, ANSI C
In this paper, a robust fuzzy credit assignment CMAC (FCA-CMAC) is proposed to speed up the learning ability and to increase the robust capability of CMAC. The FCA-CMAC is to combine the fuzzy logic concept and credit assignment ideas to provide fast and
FCMAC, Fuzzy logics, Concept mapping, CMAC, Credit assignment, Robus
In this paper, immunity based genetic algorithm is proposed to solve quadratic assignment problem (QAP). The QAP problem, known as NP-hard problem, is a combinatorial problem found in the optimal assignment of facilities to allocations. The proposed algor
Genetic Algorithm, Immune Systems, Quadratic Assignment Problem, Optimization, Local Search.
Industrial high speed image processing is a challenging field of application. Conflictive requirements concerning computational power and economic expenses have to be met. The present paper describes the development of hardware optimized algorithms for im
Image Processing, Video based Safety Device
This paper presents an extension of the mandatory access control security policies of the Bell-LaPadula model (BLP model) in a ciphered environment. The BLP model is analyzed in an environment where the access control tables are ciphered. The BLP model ax
Bell-LaPadula model, access control, cryptography, ciphered environment.
7 467-116
6 467-117
4 467-119
4 467-120
6 467-121
5 467-122
A methodology for Web Interface to Real-time ECG (WIRE) using COTS products is presented. A prototype will be demonstrated to show the feasibility of the concept.
Real-time ECG Web COTS products
In this paper, we evaluate the potentials of using co-evolutionary optimization method to automatically generate both halftoning filters for the image processing software and test images for them. One genetic algorithm generates halftone filters and at th
Co-evolution, Digital halftoning, Genetic algorithms, Software testing, Test image generation
This paper describes a learning method of fuzzy rules using counter propagation networks (CPNs). First, the initial assignment of fuzzy rules by use of CPNs is determined. Further, the number of fuzzy rules to an objective value, inference error, is
Fuzzy inference, Learning of fuzzy rules, Initial assignment of fuzzy rules, Counter propagation networks, System identification
The paper deals with active filter design with new type of active elements called voltage conveyors. Principal characteristics of voltage conveyors are described and various types are classified. Several design methods are presented. Models for simulation
Current conveyor, Voltage conveyor, Filter, CFA
We present the efficient and simple diagnostic method for memory integrity test. This paper gives an introduction how to construct memory tests and test flows. A typical memory test steps through the memory array and tests all cells. It ensures that addre
Memory testing, Memory diagnosis
In this paper we present a stochastic space-time geometrical-based channel model for a macrocell mobile environment. We consider reverse link with a uniform linear array (ULA) antenna. This model combines scalar stochastic fading model (for local scatter
Beamformer; channel;model; macrocell; multipath; stochastic.
7 467-123
9 467-124
3 467-125
7 467-126
5 467-127
In this paper we investigate the statistical properties of the Doppler spectrum for the recently-proposed hyperbolic macrocell channel model. Doppler spectrum accounts for the distribution of power at each direction-of-arrival (DOA). It is well-known that
Doppler spectrum;macrocell; multipath; statistics.
Abstract: The web is increasingly being used as an element of the marketing promotional mix, as a medium for specialty product distribution and as a method of streamlining orders. A presence on the web is a must for conducting business in today's environm
Key-Words: Online promotions, Rich media Solutions, Web Banners, Opt-in-email, Click-thru, Pop-ups and Pop-unders, Viral Marketing
Spectral change estimation is important in many applications, because changes in spectra often correspond to changes in important physical parameters. Most attempts at detecting and estimating spectral change simply difference conventional spectra; this a
spectral change, polynomial phase components, cubic phase function, additive noise, spectral change estimator, smoothing techniques, non-stationary, detection, estimation
Abstract: - In this paper a domain based research framework is presented. This paper extends the on-going research in the area of personalization with E-democracy context. In the framework the main element is the layered E-society domain. These layers are
Ubiquitous Computing, E-society, E-communities, E-democracy, Personalization, Youth
This paper investigates the performance of the T-distributions as compared to other well known time-frequency distributions in a recently proposed blind source separation algorithm based on time-frequency analysis. In this study we considered linear FM
Blind Source Separation; Time-frequency representation; Doppler signal; Linear FM; Non-linear FM; Time-only kernels.
5 467-128
4 467-129
5 467-130
8 467-132
6 467-133
8 467-134
Flip-flops are essential elements of a design from both delay and energy aspects. A significant fraction of the total power in highly synchronous systems is dissipated over clock networks. Hence, low-power clocking schemes are promising approaches for fut
Energy-recovery, Flip-flop, Low-power, Square-wave clock, Energy savings
A wireless communication system utilizing wideband point-to-point link is proposed in this paper. The system provides transmission of telemedicine information for an ambulance attending an accident or emergency scene where different types of information
Modulation, rain attenuation, telemedicine, wireless networks
Web caching is a mechanism used to store frequently accessed documents at a server closer to the users. In e-commerce applications and financial market services, information contained in the objects delivered by the origin server to the clients can rapid
Simulation, cache modelling, cache consistency, web caching, dynamic web objects
This paper presents a real time low-complexity implementation of a noise reduction method for speech communication where the input signal is divided into a number of subbands that are individually weighted in time domain according to the short time Signal
Speech Enhancement, Speech Booster, Adaptive Gain Equalizer, Filter Bank, Digital Signal Processor
This paper presents a new paradigm for infinite impulse response (IIR) filter design using genetic algorithms (GA). By encode or transform the filter design problem into the z-plane the GA optimization procedure will be simplified. Additionally, given the
Digital Filter Design, IIR, FIR, Quantization, Genetic Algorithm
A novel approach for the least-mean-square (LMS) estimation algorithm is proposed. The approach utilizes the conventional LMS algorithm with a time-varying convergence parameter $\mu_n$ rather than a fixed convergence parameter $\mu$. It is shown that t
Least-mean-square (LMS) algorithm, adaptive filters, Wiener filter, estimation.
5 467-135
7 467-136
5 467-138
4 467-139
8 467-140
7 467-141
Recently a dithered signed-error constant modulus algorithm (DSE-CMA) has been proposed for the purpose of low complexity implementation of constant modulus algorithm (CMA), which is widely used for blind adaptive filtering due to its LMS-like desirable r
LMS algorithm, adaptive filters, dithered signed-error, constant modulus algorithm.
In this paper we introduce a technique of eigenbeamforming based on the channel correlation matrix and paired with orthogonal space-time code (O-STBC) at the transmitter side of the link. This structure combines the spatial signal paths decorrelation with
Adaptive beamforming, space-time channel, MIMO, transmit diversity, block coding
The Internet is increasingly being used as a way to collect customers¡¯ personal information for targeted marketing tactics. The success of the marketing tactics absolutely depends on the reliability of the gathered information from customers most of who
Privacy, Personal Information, Internet, Trust, SEM, Willingness to Disclose
Recently we have proposed a structure for single-bit filtering. This structure contains a ternary finite-impulse-response filter cascaded with a first-order infinite-impulse-response (IIR) filter. The recursive IIR filter contains a sigma-delta modulat
FIR; IIR; Sigma-delta modulation; correlation; autocorrelation; stability.
This paper proposes an algorithm for doubletalk detection handling. The algorithm is aimed for a delayed filter update structure of an acoustic echo canceler. Key features employing this method are: avoidance of filter divergence in situations of undetect
Doubletalk detection, DTD, Acoustic Echo Cancellation, AEC
Abstract: - In recent years an upsurge in the business-to-business electronic commerce has been observed. The popularity of electronic commerce among the masses is still not what it was expected and the fall of DOT.COMs has made it even worst. Whereas bus
E-commerce, E-Trust, Third Party, E-Security, and Framework
8 467-142
8 467-143
4 467-144
5 467-145
6 467-147
6 467-149
Abstract: -Personal identification numbers (PIN), passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce applications. However, these means do not really identify a person, but
- Electronic Commerce Security, Biometrics, Biometric Signature, Iris Recognition, Digital Signatures, DNA, RSA, and DSA.
Abstract: -Various researchers for a number of years have investigated traffic data collection and analysis. Many techniques have been proposed to speed up the operations and some intelligent approaches have been developed to compensate the effects of lig
- Image Processing, Transportation, Pattern Recognition, and Segmentation., RSA, and DSA.
Abstract: - Real-time qualitative road traffic data analysis is the cornerstone for any modern transport system. So far, most of the analysis is done manually and the use of image processing techniques for qualitative analysis is at its early stage. In th
- - Image Processing, Transportation, Pattern Recognition, and Segmentation..
Modern microprocessors that are being utilized in commodity personal computers have build-in parallel computing feature. In general, these microprocessors support Single Instruction Multiple Data (SIMD) parallel computing mechanism. Recently, dual-CPU sys
SIMD Parallel Mechanism, LU Decomposition, Performance Optimization
Modern technology provides a great amount of information. But for computer monitoring systems, we need to reduce the number of variables to one or two parameters, which express the quality and/or security of the whole system. This paper presents a princip
Sensor fusion, data fusion, computer monitoring systems, real-time expert systems, computer applications
Governments in many countries have implementing e-government for the purpose of better service delivery to citizen, best environment for business, efficient public administration. That is, government targets the improvement of private and public sectors¡¯
e-Government, citizen-oriented government, CRM, KMS
7 467-151
6 467-152
3 467-153
4 467-154
5 467-157
6 467-156
Most of the local area networks have been designed for non-real time transmission of digital data as text and images. To achieve audio data transmitting over the network in efficiency manner (real-time), the implementation of audio-on-demand using the Rea
Multimedia, Real-time Transport protocol, audio-on-Demand, buffering time, Java Media Framework, Media Locator.
To utilize the features of the IEEE 1394 protocol, a new multimedia home network is presented to facilitate the ever-popular broadband network and multimedia applications. In this paper, we also design some experiments and use two kinds of operating syste
IA, IP, IPv6, IEEE1396
Topic- ‘C’ Symposium On Signal Processing SANJAY AGARWAL Electrical & Electronics S.R.M.S. College Of Engineering & Technology 47-A, Adarsh Nagar Alambagh Lucknow-226005 INDIA [email protected] Abstract Key-words:- Signal Processing & Its App
Signal Processing & Its Application In Prediction Of Earthquake
Study and analysis of a proposed high-voltage high current switching n+-p-n silicon germanium single-heterojunction bipolar transistor (SHBT) is performed using 2D MEDICI device simulator. A theoretical formulation is provided to substantiate the simulati
Quasi-saturation, Heterojunction, SHBT, BJT, Simulation, High-voltage.
The Online Laboratory extends the idea of e-Learning to laboratory-based lessons. OnlineLab has the advantage of overcoming geographical and temporal restrictions, so that laboratory resources can be better utilized. In this paper, we introduced two conce
Online Laboratory, OnlineLab Framework, Online experiment, Learning Objects
Enhancement of road traffic safety means that the human component as well as the technical components have to work at highest level. Together they build a complex system. Due to rising road traffic, mental and physical stress, driver’s concentration is de
Digital image processing, Adaptive template matching, Intelligent vehicle, Driver assistance
6 467-155
7 467-165
7 467-166
5 467-167
8 467-168
8 467-169
4 467-171
Abstract: - One of the factors contributing to the rapid growth of e-Learning has been the rapid development of the World Wide Web relative ubiquity of standard Web-browsers. However, we argue in this paper that the standard Web-browser is reaching its li
E-Learning, Learner environment, Privacy, Agents, Distributed
Designing surface models for products used in biomedical applications requires geometric softwares which can design good convex surfaces. Therefore the geometric modellers need to contain modules which can convexify a given grid of points, which in turn c
CAD, CAGD, Cranial implant, Least square fitting, Orientation of fitting.
We present a new efficient heuristic that finds good ratio-cut bipartitions of hypergraphs that model large VLSI netlists. Ratio cut measure is given by the ratio of the number of nets cut between two blocks and the product of the cardinality (size) of ea
VLSI physical design,Circuit partitioning,CAD tools
This paper describes the design and analysis of a fully integrated CMOS Voltage Controlled Oscillators (VCO). The VCO is designed in TSMC 0.25um single-poly, 5-metal CMOS process. It is designed to have a tuning range greater than 15% covering the frequen
CMOS, phase noise, integrated inductors, VCO, voltage-controlled oscillator, low power.
With the recent surge in Internet based users, the idea of Mobile Agent based computing systems has gained popularity. This is because agent based computing systems provide a very simple and powerful mechanism by which complex distributed computations can
Agent Host, Mobile Agent and Agent Submitter
In this paper we present a novel approach to synthesizing polymorphic hardware from functional-level Object-Oriented (OO)models. Our proposed target architecture is intended to be subsequently used in co-design of hardware and software from a single OO so
hardware synthesis, object-oriented synthesis, synthesis of polymorphism, hardware/software co-design
We analytically describe how to proceed for estimating the frequency of the synchronous state in a full-connected voltage controlled oscillator network. These oscillators are part of second order phase-locked loops (PLL) widely applied in communication sy
Synchronization, PLL, Stability, Delay, Gain, Network
5 467-173
4 467-175
Denoising 6 467-176
7 467-177
6 467-178
5 467-179
We study the use a continuous phase modulation (CPM) system providing mobile data service with QPSK transmission for a telemedicine system. The results of using an I/Q modulation and CPM schemes with their BER performance are compared. The system provid
modulation, polarization, rain, wireless networks
This paper presents scheduling algorithm that allocates network resources in a fair way by taking into account class of service issues. Presented model is flexible in that different traffic flows are grouped into service classes and are given such QoS cha
Adaptive scheduling, quality of service, traffic classification, pricing
Wavelet transform has the advantage of visualizing the parameter both in Time and Frequency Domain this technique has been effective in noise removal with minimum side effects on important features such as image details and edges. This paper gives VLSI ar
Users can access VoiceXML-based IVR(Interactive Voice Response) systems using their mobile devices such as smart phones in anytime and at any place. Even though their mobile devices have small screens, they have to interact the services using voice-only m
VoiceXML, Multi-modal interaction, XHTML+Voice, WWW, Internet, Interactive voice response services
The osteoporosis assessment can be done by observing and analyzing the trabecular pattern in proximal femur. To reduce variability a machine vision system based on texture analysis using Gabor filter is introduced. Multi-channel filtering implemented by G
Texture Analysis, Gabor Filter, Osteoporosis, Proximal Femur, Trabecular Pattern, Radiographs
The anticipated increase in popular use of the Internet has created more opportunity in information dissemination, E-commerce, and multimedia communication. It has also created more challenges in organizing information and facilitating its efficient retri
E-commerce, Mobile Agent, Distributed Database, Agent Host, Agent Submitter and PMADE.
8 467-180
4 467-182
6 467-183
5 467-184
5 467-186
5 467-189
In the context of business to business (B2B) commerce, bilateral trading on products or services would involve multiple attributes. The negotiating agents in the marketplace have conflicting interests and always act selfishly to maximize their own gain
Bilateral trading, agent based negotiation, arbitration, bid recommendation, and simulated annealing.
This paper gives an overview of how the speed of simulation of Video/Graphics subsystem can be increased with SystemC. Also, an idea of partitioning hardware and software at instruction level and the simulation framework to support this partitioning has
SystemC, Transaction level modeling, Codesign, Hardware/software partition, Simulation
An NPN Si/SiGe/SiGe Graded Heterojunction Bipolar Transistor (SiGe GHBT) has been compared with contemporary NPN Si/SiGe/Si Double Heterojunction Bipolar Transistor (SiGe DHBT) for current gain performance at high collector current densities, using a 2-di
SiGe DHBT, SiGe GHBT, current gain, retarding potential barrier, linear tapering.
The SmartKid Browser is an internet web browser application that is used to browse or search for web pages. Like any other internet web browser applications such as Netscape Navigator and Internet Explorer, it also supports standard browser functions but
Internet application, Web browser, Internet browser for children, SmartKid Browser, Interface design
The next generation network (NGN), possible using IPV6, will seamlessly combine broadband wireless networks and wired IP networks together. This convergence of mobile and wired IP access technology will provide new avenues for growth, creating more opport
mobile commerce, wireless/mobile access, ECC, security
Abstract:- Nowadays, wireless technology has developed into one of the popular topics. Wireless Application Protocol (WAP) is a set of communication protocols, designed to enable wireless devices to access the wealth of information on the Internet. This p
Wireless Application Protocol, Wireless Application, Information System
5 467-190
6 467-191
6 467-192
6 467-193
6 467-194
7 467-195
This paper describes the design and implementation of the Online Final Year Project Selection System (OFYPSMS) that has been developed for the Department of Computer Science (JASKOM), University College of Science and Technology Malaysia (KUSTEM). Through
Project selection system, Final year project, Web-based system, Online selection processes
This paper is a novel approach for integrated Flyback converter performing the combined functions of Uninterruptible Power Supply (UPS) and Switch Mode Power Supply (SMPS) using Zero Ψ Voltage Transition (ZVT) Pulse Width Modulation (PWM) Boost and Buck c
FLYBACK, UPS, SMPS, ZVT-PWM, BOOST, BUCK
This paper is a novel approach for integrated push pull converter performing the combined functions of Uninterruptible Power Supply (UPS) and Switch Mode Power Supply (SMPS) using Zero Ψ Voltage Transition (ZVT) Pulse Width Modulation (PWM) Boost and Buck
PUSHPULL, UPS, SMPS, ZVT-PWM, BOOST, BUCK
In this paper, the general architecture of adaptive control and management in active networks is presented. The proposed Adaptive Active Network Control and Management System (AANCMS) merges technology from network management and distributed simulation to
Active networks, adaptive control, network control, network monitoring system.
Active Queue Management (AQM) takes a trade-off between link utilization and delay experienced by data packets. From control point of view, it is rational to regard AQM as a typical regulation system. In this paper, a new fuzzy adaptive second order slidi
Active queue management, robust control, second order sliding mode, fuzzy logic.
This paper describes a failure alert system and a methodology for content reuse in a new instructional design system called InterMediActor (IMA). IMA provides an environment for instructional content design, production and reuse, and for studentsΤ evaluat
Distance learning, Learning management systems, Student assessment, Failure alert systems, Content reuse
6 467-196
8 467-199
7 467-200
6 467-201
9 467-202
5 467-203
The objects appearance in the images is modified because of several external factors (i.e.: illumination, rotate, pose) and the application of the standard comparison algorithms does not answer suitably. For landing this problem, we present here an archit
Categorization, Recognition, Representation, Modeling, Aerial image, Vision.
The fundamental security features inherent in Java make it an attractive platform for embedded systems when security is a primary concern. Standard Java is however too resource heavy to be considered a serious contender in the embedded market. The Java 2
Java Card, Embedded Java, Microprocessor Architecture.
A new approach of vibration cancellation in magnetic bearing systems is presented. It is a feed-forward controller approach. The problem is formulated by designing an adaptive filter type of FIR filter. The reason behind employing the FIR filters is that
Active magnetic bearings, Adaptation Real time control, Displacement nuling, Vibration control RLS,
E-business systems, which support information security functions, should have cryptographic modules in order to store and load information securely. In this paper, we propose a system that save and load the confidential electronic documents securely in th
E-business, Electronic document, Cryptographic key, Security evaluation, Multiple agents
This paper describes a simple algorithm called SAFARI (Simple Approach to Fair Allocation of Rate Indication) for the congestion control of available bit rate (ABR) service of asynchronous transfer mode (ATM) networks. The ATM Forum specifies a category
Atm networks, Abr service, congestion control, convergence
Neuromazes are pulsed neural networks synthesized in a 3-dimensional cellular space. They are being developed for the artificial brains of future generation robots. In neuromazes there are two processing elements: dendrite-cells that return a pulse at clo
Pulsed Neural Networks, Cellular Automata, Artificial Brain, Discrete Control Systems, Robots
7 467-204
5 467-207
4 467-208
6 467-209
9 467-210
5 467-211
In a digital signature scheme, the security of the private key is of vital importance. If the private key is ever compromised, it can be used to sign forge documents. The conventional method of secure private key storage is through password-based encrypti
Biometrics, Cryptography, Image processing
In view of changing the type of energy conversion in CMOS circuits, this paper investigates low power CMOS circuit design which adopts gradually changing power clock. First, we discuss the algebraic expressions and the corresponding properties of clocked
Low Power, Clocked CMOS, Energy Recovery
Over-the-Horizon High Frequency (OTH-HF) radars operate in HF (High Frequency) band, it is quite difficult to find clear frequency band for radar system requirements in this band due to heavy interferences. To adopt discontinuous spectra waveform can miti
HF radar; Waveform; Sidelobes suppression; Discontinuous spectra; Signal processing; Linear prediction
Civic organizations are becoming an important part of the development sector. These organizations bring people and communities together for economic development and social gain. With the devolution of the government to the grassroots, their role has becom
Portal, Social Enterprise, Capacity Building, E-Learning, NGO, Development Sector.
The current trend for todayΤs computing products has been mobile technology solutions. These products include cellular phones, laptop computers, personal digital assistants (PDA), and more. In order to provide reliable computing and communication devices
Quasi-Floating-Gate, MOS Transistors ,Operational Transconductance Amplifier
In this paper, we apply Fuzzy C-Means, Fuzzy Entropy and Noise Clustering methods to calculate similarity scores for utterance verification in verbal information verification. A set of 26 letters, 10 digits and 10 command words in the TI46 database was u
Fuzzy Systems, Utterance Verification, Speech Processing, Pattern Recognition, Fuzzy C-Means, Fuzzy Entropy, Noise Clustering
5 467-212
8 467-213
5 467-214
8 467-217
4 467-218
This paper presents an automatic gender recognition technique based on speaker's voice. Utterances spoken by same-gender speakers were used to train a text-independent hidden Markov gender model. Female and male models are continuous hidden Markov models.
Gender Recognition, Speech Processing, Speech Analysis, Pattern Recognition
Employee evaluation process has been a focus to many researchers and practitioners worldwide. In spite of this attention, the method used in conducting the employee evaluation process can contribute to the ineffectiveness of the whole evaluation process.
Employee evaluation, 360░ feedback process , Web application
With the rapid development of ICT The world is transforming into global village. The ability to compete globally is dependant on the innovation, the skill and the knowledge of learning organization and its people. Globalizing corporate training is crucial
: e-learning, e-learning globalization, e-learning localization, e-learning Internationalization, , multilingual e-learning, multicultural e-learning and translation.
A model for virtual entity representation in mixed reality is proposed. Virtual entities are actors in this model, which enable real, virtual, natural and artificial objects to interact according to a common ontology. The first part of the paper deals wit
ubiquitous computing, augmented reality, mixed reality, ontology, multi-agent systems
In this work we present a mobile agent based tool for arranging and managing communities whose members want to share computing resources. Such a tool will enable community members to suitably arrange their own distributed virtual machine. Mobile Agents ar
Mobile agents, Distributed computing, Resource discovery.
9 467-219
7 467-220
6 467-221
3 467-222
Technologies are changing very frequently in the field of data communication over twisted copper pair (plain old telephone lines). These changes are due to quick advancement in computer and digital communication technologies along with powerful digital si
Digital signal processing, Modem, V.90 technology, V.92 technology, Dedicated digital signal processor, Public switched telephone network, Data communication.
In the present cyber age everyone wants higher Internet speeds at very lower cost. To achieve this V.90 modem is the best choice, because using this one can achieve data rates up to 56kbps on cheaper analog telephone lines. Present paper highlights the ba
Digital signal processing, Digital signal processor, V.90 modem, 56kbps modem, Dial-up.modem, Dsp.
This paper describes an FT_WBDES(Fault Tolerance running Web Based Distance Education System). It is a fault-tolerance system running on a web based multimedia diatance education system with an URL and error synchronization function. The system for web b
FT_WBDES, A web based multimedia diatance education system, URL synchronization, Error synchronization, Reliability, An error detection-recovery system
Human computer interactions have been changing rapidly. New models of human computer interaction are needed in order to provide more flexible and adaptable user interfaces that can deal with interruptions. Modeling interactions with automata allows ch
Automata, Design, Control, Model, Interface
5 467-223
6 467-224
7 467-225
3 467-226
3 467-227
Abstract:- The Internet, Wireless Communications and Web technologies in less than three decades have become the cornerstone of business, education, transportation, communication and many other facets of life worldwide. Browsing on the web, shopping onlin
E-business, Wireless Communications, Internet, Web Technology, Wireless Markup Language, Wireless-Fidelity(Wi-Fi), Wireless Application Protocols (WAP), Big Band, etc
This paper presents the use of Grey Level Co-occurrence Matrix (GLCM) method together with multilayer fully-connected feed-forward perceptron (MLP) for image texture classification. GLCM method was employed as a features extractor technique and MLP was u
Gray level co-occurrence matrix , neural network, texture and classification
Abstract: - This paper presents the design of a second-order sigma-delta modulator for digital-audio applications. The modulator has bee designed at 3V power supply with oversampling ratio of 256 and simulated in a 0.35Ήm CMOS technology. The simulated re
Modulator-CMOS-Analog-Digital- Sampling
: This paper presents new synchronization method for audio watermarking although it is applicable in other media as same. This method, which has been based on using two-PN for synchronization, presents lower overhead beside its robustness that makes it
Audio Watermarking, Two-way Synchronization, Spread Spectrum, Framing
Wavelet transform is a well know method in video and image watermarking. During these years many method has been presented on audio watermarking but wavelet was not successful in audio watermarking as it used to be in image. This paper presents new wavele
- Audio Watermarking, Wavelet Transform, Human Audio System (HAS),
6 467-228
6 467-229
4 467-230
9 467-231
8 467-232
9 467-233
Electronic Payment Systems have paved the pathway for Electronic Commerce and the emerging technologies for Card based and Network based transactions. VarietyCash is yet another Multi-purpose electronic payment system which does gua
Smart Card, Cryptography, Public Key, Shared Key, anonimity, atomicity
This paper describes a fault tolerant control algorithm based on a simple integrator and a neural network model for a multiple-input multiple-output (MIMO) nonlinear system. Two situations are considered. First, the system is working under normal operatio
Fault tolerant control, Optimisation, Neural networks, Nonlinear systems
This paper presents performance analysis of an adaptive Volterra/Hybrid equalizer in a nonlinear magneto-optic data storage channel. In a data storage system, nonlinear intersymbol interference (ISI) is one of the limiting factors for high storage density
ISI, Nonlinear Equalization, Volterra, Optical Data Storage, SNR, eigenvalue, convergence ratio
This paper proposes a new approach to static time delay estimation in the presence of white Gaussian noise. The ambiguities and thresholding effects caused by noise are considered. We also consider the case where the delayed time can be a non-integer mult
Time Delay Estimation, Noise Compensation, Interpolation
This paper represents the findings of research studies that address e-commerce design and associated consumer behavior. The innovation of e-commerce has affected not only the marketplace through the facilitation of the exchange of goods and services, but
E-Commerce, Web Design, Online Trust, HCI, Decision Support
This paper presents a vector median filter that incorporates mechanism for the detection of impulses from color images. The vector pixels in a specified window is ranked on the basis of sum of the distances to other vector pixels in the window. The cent
Vector median filter; center-weighted median filter; rank-conditioned median filter; color impulse noise model; fixed-valued impulse noise; random-valued impulse noise.
6 319-102
6 319-103
467-234
9 467-238
8 467-236
6 467-240
The Industrial Training Management System is a web-based system, which is developed to assist the administrator in managing the related activities industrial training. This system is expected to replace the manual system. The system includes several manag
Industrial Training Management System, Unified Modeling Language (UML), PHP, MySQL
Abstract: - Wireless Application Protocol (WAP) based e-kiosk services application is implemented as an effort to introduce up-to-date communication technologies to the educational institution community. This application exploits the benefit and advantage
Key-words: - WAP, WML, WML Script, module, data, user
The human brain has ability to process information. The whole body also has ability of processing information. But the Human Brain was developed especially for this purpose.
Concrete terms, Non-concrete terms, Abstract terms, Ideas, Material Objects, Immaterial Objects
A multiestimation-based adaptive controller is designed for robotic manipulators. Multiestimationbased techniques can improve the transient response of adaptive systems by switching between the variousestimation schemes. The switching process is subje
adaptive control, robot control, supervision, switching, impedance control, teleoperation.
A multiestimation-based adaptive control scheme is presented for a plant with known poles andunknown zeros. The plant is decomposed in several first order filters with unknown scalar numerators. Thescheme chooses in real time the estimator/controller
Discrete adaptive control, multiestimation schemes, stability, switching techniques, modelreduction.
This paper presents a technique of synchronous vibration minimization for Active Magnetic Bearings AMBs Using feed forward strategy; minimization signals are generated with adaptive Synchronous vibration control algorithm. The output of the adaptive Synch
Active magnetic bearings, Real time control, Displacement nulling, Vibration control, RLS
5 462-302
6 462-233
6 462-171
6 462-165
6 462-157
4 462-209
In this paper, we propose an automatic transcoding technology to convert existing HTML documents to HTML + VoiceXML documents which have visual and auditory presentation at the same time. Our transcoding technology provides the function that user can view
Html, Voicexml, Transcoding, Audio-visual web contents
The risk is often considered like a negative element in any project. Its control became a major concern during the launching of all new project, particularly when the project is innovating or leading to products in small quantity. The existing methods o
Risk Management, Project Management, Project life cycle, Product life cycle, Risk memory, Risk Environmental, Life cycle Assessment.
In this paper, a suite for management of PC clusters is proposed. PC cluster are becoming more and more popular in high performance computing because of its high performance-costs ratio. But it is a hard work for the administrator to manager so many compu
Cluster computing, Linux, Management systems, Cluster configuration
[1] elaborates an abstract theory for test selection. The link between the theory and the practice was not in the focus of that paper. The current paper fills this gap by presenting ways of implementing the abstract formulas of test selection. Several
test selection, trace distances, public telephony systems, reactive systems, coverage
This paper describes a way to compute the coverage for an {\em on-the-fly} test generation algorithm based on a probabilistic approach. The {\em on-the-fly} test generation and execution process and the development process of an implementation from a
Distributed Systems, Formal Methods, Testing, Coverage, Probability
The correct classification of single musical sources is a relevant aspect for the source separation task and the automatic transcription of polyphonic music. In this paper, we present a classification experiment on six different musical instruments: violi
Pattern Recognition in Music, Musical Instruments, Parameter Estimation, Spectral Analysis
4 462-211
4 462-210
5 462-218
6 462-206
4 462-205
4 462-195
4 462-193
A new Neural Network architecture for real-time oriented speech denoising is proposed. It is based on Adaptive Spline neurons, whose peculiarity is the adaptive activation function. So, in the training phase, we can update both values of weights and activ
Speech Enhancement, Noise Reduction, Adaptive Filters
In this paper we propose a method to simulate a 3D acoustical environment in which sound sources are positioned in a well defined side. The spatial position that human brain assigns to a sound source is influenced by two main elements: the reverberation,
Environmental Acoustics, Space Acoustics, Adaptive Filters
There are two contributing cost components in a filling production system; an overfill cost, and a cost of non-satisfaction of customers because of the under-fill. The difficulty in minimizing the cost function is due to the Gaussian distributed terms in
Minimum cost, statistical modeling, Gaussian distributed filling, Overfill, Under-fill
The InterLabs Research Institute (IRI) at Bradley University (BU), Peoria, IL, USA, is hosting the National Science Foundation’s (NSF) grant on design and development of advanced online educational materials for e-learning in Information Technology, Compu
Advanced multimedia technologies, e-Learning, Communication technology
Contrary to the iterative approaches existing in literature, this paper presents a methodology that arrives at the final optimal solution in one single run. The problem is to find the design parameters (the sample size, the period between sampling and th
Economic design, X-Chart, optimal sampling, minimum cost
Accuracy in measuring radioactivity of a sample is directly proportional to the time allocated for that sample. With scarcity of time, laboratories are faced with huge number of samples to be analyzed in a limited span of time. Such a situation was enco
Minimization of standard deviation, Optimal detection time, Counting statistic.
Radiology departments have been using monitors as the display medium for several modalities for some time now. Radiologists make their diagnosis based on the images displayed on these monitors. This article studies the diagnostic difference of 15 inch, 20
Monitors, Medical Images, ROC analysis, Diagnostic quality, MRI, CT, X-ray
5 462-154
8 462-163
6 462-152
6 462-169
6 462-200
6 462-166
Abstract : - In this paper a vision system for a highly specialized autonomous robot is presented. The task of the robot is the setting and clearing of tables in a restaurant. The environment in which the robot will operate will be controlled and well kno
Artifical vision, Autonomous robotics, Hough transformation.
As streaming media over the Internet becomes popular, caching proxy has become increasingly important. Nowadays, caching proxy has turned into a standard technique, which is widely deployed on the Internet to reduce client-perceived delay and network traf
Streaming media, Caching proxy, Cluster, Meta information, Replacement policy, Byte hit rate
Speech processing techniques can be useful to detect, through spoken words, dyslexic readers. Voiced segmentation allows determining the size of every word, even the size of every syllable. One of the more important parameters for dyslexia is the delay be
voiced sound, endpoint detection, speech recognition, short term energy, short term zero crossing rate.
This article describes the contribution of some open source technologies to develop and evaluate the implementation of some digital libraryΤs services. These services were developed as web services, forming a middleware framework that has as its main goal
Digital Libraries, Open Source, Web Services, Xml Databases, Middleware
In this article, we discuss the application of JESS (Java Expert System Shell) and Servlets (Server-Side Applets) in the development of an Interactive Intelligent Decision System environment. JESS provides the support for rule-based programming and Servle
Frames, Jess, Java, Stock Market Prediction, Fuzzy Neural Networks, Fundamentalist Analysis
In this article, a new algorithm for determining differences between two sets of polygons is considered. It has been proven that it is enough to test only the polygon edges to perform the comparison. The algorithm works in two steps. First, the polygon ed
Geographical information systems (GIS), polygons, polygon comparison, computational geometry, algorithm
6 462-168
6 462-150
6 462-170
4 462-149
6 462-178
5 462-144
We present the efficient and simple diagnostic method for memory integrity test. This paper gives an introduction how to construct memory tests and test flows. A typical memory test steps through the memory array and tests all cells. It ensures that addre
Memory diagnosis, Memory testing
The RC4 stream cipher, widely used in telecommunication systems, is analysed by a new cryptanalytic algorithm, which exploits the combinatorial nature of the RC4 to reduce the search space over the exhaustive search. This algorithm finds the initial state
Telecommunication systems, Stream cipher, Cryptanalysis, RC4, Complexity, Hill-climbing
Adaptation neighborhoods of self-organizing maps for image restoration are presented in this study. Generally, self-organizing maps have been studied for the ordering process and the convergence phase of weight vectors. As a new approach of self-organizin
Self-organizing maps, Image restoration, Topological neighborhood, Learning, Peak signal to noise ratio, Numerical experiment
In this work we consider the N-periodic Leontief dynamic model and we analyze some conditions over the coefficient matrices in order to characterize when the solution of the system is nonnegative. To solve this problem descriptor system, positive control
Leontief dynamic model, nonnegative matrix, positive solution, descriptor system.
The most common objective function of task scheduling problems is makespan. However, on a computational grid, if the performance measure is makespan, there is no approximation algorithm in general for scheduling onto a grid. On the other hand, recently t
Computational Grid, Task scheduling, Approximation algorithm
In this paper, an optimal configuration of camera calibration procedures for 3D measurement application is proposed. The calibration routine is performed using a readily available camera calibration toolbox developed by Bouguet, incorporating a camera mod
Camera Calibration, 3D Object Tracking
9 462-201
4 462-204
4 462-208
6 462-212
6 462-215
9 462-216
Despite research and improved feeding and management practices, skeletal disorders continues to be of concern for commercial poultry-production operations. skeletal disorders in poultry are associated with nutritional deficiencies involving calcium, and p
Gempertzian, Logistics, Quadratic, Algorithms, Optimizing, Chicken diet.
The most recent development in roadway design was representing the road profile by piece-wise-linear grade lines, followed by representing the new road profile by a quadratic function. Quadratic representation had solved the problem of sharp connectivity
Linear programming; Transportation; Earthwork allocation; Roadway grades
We developed a new algorithm for automatic recognition of musical chord notes. In the chord recognition field, we often refer to the "Chord Spectrum", that is the chord representation in the frequency domain. The main concept on which the "chord recogniti
Recognition, Musical Chord, Pattern Recognition in Music
For many humans, interacting with a computer is a cumbersome and frustrating experience. Most people would prefer more natural ways of dealing with computer. The PUI paradigm has emerged as a post-WIMP interface paradigm in order to cover these preference
Human-machine systems, Perceptual user interface, Computer vision, Image sequence processing, Pattern analysis, Hand gesture recognition
Abstract: In this paper we introduce several features of our first generation diagonal aggregating search heuristic system, Dash[17], which results in order of magnitude speed improvement for nucleotide searches when compared to NCBI-Blast 2.2.6[1,7]. Heu
Bio-Informatics, Sequence Alignment, Blast, Genome, FastA
Abstract: as the most noticeable feature of Grid, the sharing mechanism in the wide-area range of software and hardware has several problems needed to discussed and resolved in the process of application. The article discusses the possible problems existi
Grid Computing, Share
5 462-217
6 462-219
5 462-226
5 462-227
6 462-172
The burning of La Fenice Theatre in Venice in 1997 was really a tragedy also for acousticians. In that case, only two months before the burning binaural measurements were performed in the hall, and therefore the acoustics of the theatre was not lost. Desp
Multimedia, VRML, Measurements, Simulation, Acoustical design
The objective of this paper is to develop a method to hide information inside a binary image. An algorithm to embed data in scanned text or figures is proposed, based on the detection of suitable pixels, which verify some conditions in order to be not det
Data hiding, watermark, steganography, binary images, image processing, banking security.
This paper presents pre-processing methods to analyse regression curves of different quality measures that vary with time due to “external impacts”. These “external impacts” can be self-made by management changes or can result from decisions that have no
Three-dimensional regression preparation, Quality management, Statistical pre-processing
This paper proposes a framework for the development of artificial music critics that consists of an architecture and a validation methodology. The architecture is based on two main modules: the first module preprocesses the piece to be criticized and extr
framework, artificial music critic, computer music, artificial art critic, artificial composer, art evaluation
We present the main features of the Distributed Virtual Music Orchestra (DVMO), which simulates music band/orchestra by means of a distributed computing system. In this orchestra, each computer is associated with the one musician or a group of musicians p
Internet and Distributed Computing, Computer Music, Virtual Music Orchestra, Client/Server Technology, Midi, Synchronization Strategies
6 462-126
6 462-105
4 462-156
6 462-158
6 462-101
6 462-110
This paper addresses a novel translation method based on Hidden Markov Model, using template rules that are learned from the bilingual corpus. The method can enhance the translation accuracy and ensure a low complexity in comparing with previous template learning translation method, and presents a new perspective for applying statistical machine learning on example based translation domain.
Machine translation, EBMT, Template learning translation, HMM.
An extranet-based customer-centric model that enables the enterprise to develop a virtual value network linking it together with its business partners and customers is presented. The key to the success of this model is for the enterprise to be able to rap
Extranet, Customer-centric model, Virtual value network, Software development, Security, Performance
The improvement of the aesthetic of the melody line of the music generated by the computer is a big challenge for the scientific world today. In (Goga, 2003) we presented general observations and rules for the music generated by the computer. In this
aesthetics of music, computer music generation, harmony
Over the past few years, XML has become the undisputable lingua franca standard both for semi-structured data representation and exchange format over the Internet, and also content management in various e-business worlds, especially the B2B and B2C enterp
XML, Relational database systems, XML middleware, SQL, XQuery
In this paper, It introduces a simulated annealing method for a network system. Simulated annealing simulates the cooling process of solid materials-known as annealing. However this analogy is limited to the physical movement of the molecules without invo
Artificial Intelligence, Simulated Annealing, Network Systems, Non-linear Programming, Evolutionary Algorithms.
Unitary matrix modulation (UMM) is investigated in multiple antennas system that is called unitary space-time modulation (USTM). In an OFDM, the diagonal components of UMM with splitting over the coherence bandwidth (UMM-S/OFDM) have been proposed. This s
OFDM, Unitary matrix modulation, LDPC code, Coherence bandwidth
5 462-112
9 462-113
4 462-114
5 462-115
NO PAPER NO PAPER
NO PAPER NO PAPER
9 462-120
5 462-121
The customization is one of the aspects practiced often recently. The custom made suite and customized service from the portal site and even customized automobile are some examples. There are millions of customers out there and they all want the service o
Data mining, Decision Making, CRM, Personalize Campaign
Abstract: 'Free will' and its corollary, the concept of individual responsibility are keystones of the justice system. This paper shows that if we accept a physics that disallows time reversal, the concept of 'free will' is undermined by an integrated
Turing machine, behaviour, determinism, free will, nerve synapse
Abstract: - The evolution of HIV-1 infection in the untreated individual can be represented by three stages. Several mathematical models can explain some dynamical aspects of this infectious disease. In this work, it is proposed a four dimensional and
HIV, Mathematical modeling, AIDS
The paper extends the molecular computation model based on splicing system and implemented in vitro by Shapiro. The new restriction enzyme BseMII is proposed. The model of 3-state molecular finite state machine is introduced.
DNA Computing, Finite-State Automata
NO PAPER
NO PAPER
NO PAPER
NO PAPER
This paper addresses the most relevant aspects of lossy image coding techniques, and presents an evaluation study on this subject using several transforms and different methods in the transform domain. We developed different transform based image coders/d
Image Coding, Image Quality, Visual Thresholds, Discrete Cosine Transform, Discrete Wavelet Transform, S Transform.
We can see the 20th Century Music as a bigger dynamic whole, i.e. as a system. Systems theoretical approach and synergetics as a special type of systems theoretical modelling enable to analyse relations of elements, processes and functions in the system a
20th Century Music, Categorization, Feedbacks, Attractors, Self-organizing System
7 462-147
6 462-183
4 462-198
NO PAPER NO PAPER
4 462-196
9 462-139
In coping with the trend toward the much higher powered electric-motor driven injection molding machine, multi-AC servomotors control system has become necessary in order to control the molding machine mechanism. Thus, it is inevitable to use a synchro
Synchronous Positioning Control, Multi-AC Servomotors, Pressure
Neural Networks have shown great success in solving classification problems. One of the most important issues in classification is related to the particular set of features to be extracted using a particular extraction method. Recently, the theory of wave
Neuro-wavelet, Fourier transformation, Feature extraction
We have constructed a simple dynamic model to study the human capital formation under a public education regime when an economy is open to migration. If median voters are low-skilled workers, then the emigration of high-skilled workers will cause a brain
Migration; A public education regime; A brain gain; A brain drain; Median voters; High-skilled workers.
NO PAPER
NO PAPER
This paper describes a localization system composed of a stereovision system with two cameras and an ultrasound (US) system. After calibration of 2 cameras, a mask of infra-red LEDs is mounted on the ultrasound probe. A method for spatial and temporal cal
stereovision, ultrasound imaging, calibration, position control
In this paper the guidelines for applying heteroscedastic linear models for analysing industrial process data is presented. Heteroscedastic linear models are considered as a good model family for the joint modelling of dispersion and mean. The model selec
Heteroscedastic linear model, Model selection, Dual response surface, Dispersion modelling, Process data analysis, Validation, Predictive modelling
8 462-162
6 462-124
9 462-160
6 462-125
5 462-135
In the paper we discuss a possibility of digital-analog CMOS implementation of the artificial neuron learnable to logical threshold functions. The implementation is based on earlier suggested beta-driven neuron circuit consisting of synapses with excitato
Artificial neuron, CMOS implementation, Learnable synapse, On-chip learning algorithm, Excitatory and inhibitory inputs, Non-isotonous threshold logical functions.
Network Programmability is gradually gaining momentum in state of the art network and service management implementations. Most of these implementations rely on distributed programming models (such as CORBA, RMI, DCOM) towards exporting programmable APIs t
Web Services, Programmable Networks, Network Management, Web Based Management
Despite their importance in activities dealing with maintenance, customization, re-use, and re-engineering of relational databases, very few visualization based frameworks for databases are developed. We present a visual framework for facilitating task
software re-engineering, databases, software visualization, visual interfaces, empirical evaluation.
This paper explores the application of Grid computing technology for solving compute-intensive problems in finance. In particular, we propose a high-throughput parallel version of the Monte Carlo algorithm for portfolio VaR simulation, based on a master-w
Grid computing, High-throughput computing, Computational finance, Value-at-risk, Monte carlo simulation.
The aim of this paper is to show and offer a software implemented in FORTRAN 90. It provides a practical statistical algorithm to identify certain multivariate time series models, VARMA models. The theory is developed in [10]. With this method, we can ans
Varma Models, Specification Stage, Minimum Orders, Identifiability
4 462-132
6 462-130
6 462-129
6 462-127
6 462-148
6 462-161
Abstract: -This paper presents work in progress in the field of the simulation of the complex physical systems and discusses methods of visualization to obtain and analyze results in 3-D space. We consider the rapidly spinning gravitating object (compact
Key-Words: - Simulation, visualization, mathematical modeling, pulsars, magnetic field, plasma equilibrium.
In economics there exists a great interest for studying its raw material, the data and obtaining specific properties from data series. This can be useful to help to predict, with certain degree of certainty, the behaviour of relevant economic variables an
Numerical Algorithms, Economics, Time Series Modelling, Expectations, Canary Economy, Banana
Organization of spatiotemporal pattern of spontaneous activity and its role in coding temporal sequence were investigated in the hippocampal network model. Automatic alteration of synaptic conductances through STDP organized radially propagating burst act
Sequential memory, STDP, Hippocampus, Spatiotemporal activity, Rhythmic activity, Propagation
This paper addresses the problem of detection and characterization of borders of expanding cell populations in histological preparations. A well-known biological model for cellular migration was used: that of the neuronal migration in the developing Centr
Border detection, Software algorithm, Cell migration, Nervous system, Embryonic development.
In this paper, we generalize the cobweb model in economics with linear demand and nonlinear supply curves and show that the model exhibits chaotic dynamics in dense of Li and Yorke, Devaney, and Smale. The results are also applicable to the discrete cellu
Cobweb model, Li-Yorke chaos, Devaney's chaos, Smale's chaos
Construction is a highly risk-prone industry with not a very good track in dealing with risks. The participants of the industry, as a result, have been enduring the agonizing outcomes of failure in the form of unusual delays in project completion, with co
Construction, Risk management, Project management, Fuzzy logic models.
6 462-258
9 462-191
9 462-251
5 462-253
4 462-254
6 462-255
This paper presents work in progress and continues a project devoted to developing shape modeling system for surface generation and enhancement. A local mesh enhancement based on statistical characteristics of an initial triangle mesh and a bending energy
Mesh statistics, simplification, radial bases functions, aspect ratio, bending energy
Nowadays it is genrally believed that technology plays a determining role in the economical development of the countries. In general, one of the most fundamental problems of the developing countries and particularly in case of Iran is the technological ga
effective-automotive
Large databases present a major investment. Often they are provided by governmental agencies and fulfill a monitoring and descriptive purpose. Here an overview and experiences are presented from a six year research project using a variety of environmental
Large Digital Databases, Seabird Monitoring, public internet/WWW download, Marine Environmental Information System, Northwest Atlantic
Whereas HTML is commonly used for creating graphical web applications, VoiceXML is used for voice-enabled web applications. But those applications that contain a big data or interaction a single-modality are not suited for small and mobile devices. The mu
VoiceXML, Multi-modal interaction, XHTML, Voice, transcoder
In this paper, we would like to describe a design of web page slit system on hand held devices. The purpose of this study is to display a web page with rich contents on small screen devices. Nowadays, many web sites have rich contents. It is too inconv
web page, division, small screen, document object model, screen size
Abstract: - In this paper we present the experimental study on infant cry aimed to the automatic recognition of patterns of normal and pathological cries. The work is mainly oriented to the identification of three types of cry, normal, hypo acoustic and
Infant Cry, Classification, Pattern Recognition, Neural Networks, Acoustic Features
6 462-279
8 462-277
3 462-291
4 462-294
6 462-247
Abstract: - This paper proposes a dynamic model for the human pinna, or outer ear. This dynamic model is needed to complete the implementation of structural models used for digital audio spatialization. The paper describes the rationale followed to derive
Key-Words: - Dynamic Model, HRTF, HRIR, Pinna, Prony’s Method, Sound Spatialization
This paper introduces a dynamic approach in enhancing the effectiveness of a typical translation memory system towards providing a more flexible translation framework. The system core consists of three basic modules: a) a self-modelling, incremental learn
Machine Translation/MT, Example Based Machine Translation/EBMT, Analogical Modelling, Translation by Analogy
Traditional full-text information retrieval is used to explore the implicit knowledge in large amount of texts by keyword matching techniques. However when the application domain becomes more specific such as the business domain, one can utilize the domai
Sharable ontology, Data and knowledge sharing, Knowledge discovery, Smi-structured data management, Query processing.
Traditional full-text information retrieval is used to explore the implicit knowledge in large amount of texts by keyword matching techniques. However when the application domain becomes more specific such as the business domain, one can utilize the domai
Sharable ontology, Data and knowledge sharing, Knowledge discovery, Semi-structured data management, and Query processing.
The main components of the UML-based specification of the Ultimate Fitness Tracker (UFT) software are presented in this paper. The UFT is a web-based fitness tracking application that allows users to define and plan exercising programs and keep track of t
Fitness tracking software, Web application, Requirements specification, Use cases, Scenarios, UML.
6 462-283
6 462-297
6 462-301
4 462-273
5 462-276
4 462-275
The network design problem considered in this paper is a multicommodity minimal cost network flow problem where it is required to send flows that follow static, nonbifurcated routes to satisfy demands given links with existing capacities, or to install, i
Multiservice IP network design, Integer programming
Quality spatial load forecasting is a major prerequisite for energy distribution systems planning. The load evolution outline depends on the urban expansion and its land usage. This paper presents a methodology for knowledge extraction of the data provide
Neural networks, Kohonen maps, geographical information systems, spatial load forecasting
In this paper, we propose a web page transcoding technique for hand-held devices with small screens. This technique gives the devices successful display of original web pages designed for desktop computers. Our approach is based on the observation that mo
Html, Transcoding, Small screen devices, Web contents, Voicexml
Conformal radiotherapy is a therapeutic method requiring medical imaging, generally CT images to obtain Hounsfield number and electronic density data indications. The use of MRI simultaneously with CT imposes to deform CT images and superimpose them on MR
Mutual Information, Nonrigid Registration, Optical Flow, CT/MRI Multimodality, Matching, Multi-resolution.
We have developed an algorithm that allows the exhaustive determination of words of up to 12 nucleotides in DNA sequences and it is fast enough as to be used at a genomic scale running on a standard personal computer. In this study, we apply our algorithm
Human chromosomes, Alu, repetitive sequences, nucleotide words.
Multivariate non-linear analysis methods are used to study the interdependence between heart rate, blood pressure and respiratory activity in rats both in basal conditions and after the application of two different drugs affecting the cardiovascular syste
Multivariate analysis, Non-linear time series methods, Phase synchronization, Cardiovascular system, Chort term variability.
8 462-278
5 462-102
5 462-288
4 462-300
5 462-299
5 462-263
3D Volume reconstruction from projections is a very interesting field of researching as it can be used within a wide range of civil and scientific applications. In this work we focus on high resolution structure determination of biological macromolecule
3D Electron Microscopy, Tomography, Parallel Algorithms, 3D Reconstruction
After a rapid view of symphonic music of the last three centuries and of the introduction of theword into it, the choral Finale of Beethoven’s Ninth Symphony is analysed in detail, showing its greatstrength in exalting the meaning of the poetic text.
Symphonic music, Ninth Symphony, Ungaretti, Cantata.
- In this paper we transfer to the realm of multistage electrochemical systems of fuel cells type a method of thermodynamic optimization that was developed earlier for thermal machines (engines and heat pumps), aimed at maximum production of power. With t
maximum work, fuel cells, dynamic programming, entropy, optimization
The publication of the standard ISO 10.006 relating to the projects management opens a new path towards the introduction of more formal techniques in projects management. Nevertheless, at the present time, there isn’t any organization that has implanted a
Project Management, Software Engineering, normalization, ISO 10006
The introduction of new technologies and the spread of the computer networks has produced a complete change in the structure of the organizations and on the way it manages its relationships. Specially in some fields, the capability to create automated pro
Knowledge Management, CRM, Workflow, Groupware, Competitive Intelligence
There is a permanent demand for new application and simulation software for power systems. The main idea of this work is purpose architecture of a Multi-Agent System to help operators during restoration task of power substations and distribution systems.
Multi-Agent System, Object-Oriented Approach, and Power System Operation
6 462-235
4 462-234
6 462-242
8 462-237
6 462-245
The design of strategic decision support systems passes by the organization of sources of knowledge. We are interested in acquisition of aggregated knowledge starting from a category of sources, namely the data sources. The approach of knowledge acquisit
Strategic decision support systems, KDD, knowledge acquisition, Requirements, Approach, Data, Aggregation.
This paper describes the VHDL modeling of a Boolean compression algorithm that allows for efficient hardware implementation. The compression algorithm is performed by incorporating Boolean function classification into Huffman coding. This allows for mor
Data compression, Boolean function classification, Boolean compression, Huffman coding
This paper presents a series of signal processing and high performance computation advances for modern 3D audio. The work is focused on challenging practical aspects of such multichannel audio systems and is mainly devoted to: system characterization (a s
Multichannel deconvolution, Multichannel adaptive filtering, High Performance Computing, 3D audio
A model for virtual entity representation in mixed reality is proposed. Virtual entities are actors in this model, which enable real, virtual, natural and artificial objects to interact according to a common ontology. The first part of the paper deals wit
Ubiquitous computing, Augmented reality, Mixed reality, Ontology, Multi-agent systems
Enrique Peacock-Lopez Department of Chemistry Williams College Williamstown. MA 01267 "Ecological model of competitive species and the role of intraspecies interaction in the formation of spatio-temporal patterns" For a simple mod
Intraspecies interaction, Competitive species, Coexistance, Spatio-temporal patterns, Center manifold
7 462-244
3 462-243
4 462-236
5 462-238
6 462-207
NO PAPER NO PAPER
This paper presents the main characteristics of Redwood, an integrated software development environment that proposes a novel solution for supporting software design and implementation activities via extensive use of predefined graphical templates (snippe
Visual environment, Software development, Design, Implementation, Direct manipulation, Snippets, Design tree, Redwood.
Universal Turing machine is a notional computing machine that stimulated work leading to the development of modern computers. The Turing machine operates on finite sequences of symbols by scanning a data type. The striking analogy to information-encoding
DNA computing, molecular neuron, genetic engineering, neural network, molecular computation
In this work we present a mobile agent based tool for arranging and managing communities whose members want to share computing resources. Such a tool will enable community members to suitably arrange their own distributed virtual machine. Mobile Agents ar
Mobile agents, Distributed computing, Resource discovery.
A vital part of an infectious virus particles is the viral capsid, that is a protein shell that protects the viral genome. It is formed from so-called morphological units, which are entities composed of usually five or six proteins. The derivation of math
Caspar-Klug theory, viral capsids, proteins, polyoma virus
In the future most communication networks (wireless and wired) will be required to provide support to a number of different types of traffic, each with it's own particular characteristics and quality of service parameters including e.g. guaranteed bandwid
Traffic classification, Iterative scheduling, quality of service, pricing
NO PAPER
NO PAPER
6 462-268
6 462-257
7 462-286
6 462-128
5 462-269
6 462-265
The problem of known signal detection in Additive White Gaussian Noise is considered. In previous work, a new detection scheme was introduced by the authors, and it was demonstrated that optimum performance cannot be reached in a real implementation. In t
Wavelet, signal detection, Support Vector Machine, signal-to-noise ratio, probability of false alarm, probability of detection.
Abstract: - The application of different multicriteria methods for the election of alternatives for the layout of high-speed railway in one specific corridor is considered in this paper using the outranking MCDM methods: ELECTRE-I and AHP, in comparison
Transportation system, Multicriteria methods, Outranking methods, Decision aiding, Decision theory
This paper proposes three exponentially correlated acceleration approaches for accuracy and computational complexity. These models are Singer model, Bar-Shalom and Fortmann’s model. Simulation results show that the Singer models and the Bar-Shalom and For
Maneuvering Target , Tracking , Singer Model
With the continuous flood of vulnerabilities of computer systems, vulnerability management is a very important task for administrators to keep systems as secure as possible. However current manual vulnerability management by administrators is very time-co
XML, system security, vulnerability management, vulnerability assessment, automated patching
In this paper, we consider a rea-time regulation problem of the traffic within a disturbed urban transportation network. From a given timetable, we aim to find a new schedule of various buses after detection of a disturbance at a given time. The main obj
Transportation systems, Non-Linear Optimisation.
The rapid growth of the Internet and increased demand to use the Internet for voice and video applications necessitate the design and utilization of new Internet architectures with effective congestion control algorithms. As a result the Diff-Serv archite
, M/M/1 queue, congestion control, Fuzzy PID Controller, Diff-Serv
3 462-287
5 462-131
6 462-223
6 462-133
6 462-134
5 462-290
The Cuban Sugarcane Research Institute has two locations with favorable flowering conditions, where on an average 1939 crosses is performed in order to obtain new botanic seed of sugarcane and guarantee superior genotypes that those presently in Cuban pro
Software, Sugarcane, Crosses, Breeding, Hybridization, Seed
This paper focuses on a waveform generation method of speech synthesis using the source-filter model. The excitation signal is a mixture of noise and harmonic components. It is shown that zero-padding a pre-computed waveform produces an excitation with fa
Speech synthesis, Low-cost, Source-filter model, Mixed excitation signal, Line spectrum pairs, Phone duration
Active Queue Management (AQM) takes a trade-off between link utilization and delay experienced by data packets. From control point of view, it is rational to regard AQM as a typical regulation system. In this paper, a new fuzzy adaptive second order slidi
Active queue management, robust control, second order sliding mode, fuzzy logic.
Several mathematical models have been developed to describe the genetic structure of populations. Most of these models focus on only one, or few genetic loci. In this paper, we develop a model to describe a large number of loci simultaneously. Such a mod
recombination, polymorphism, allele, locus, genetic structure,random sets
In this paper we propose a method for tuning output feedback multivariable Hinf controller based on standard theory and on genetic algorithms. Problem design considers time domain specifications such as overshoot, rising time and stationary error for MIMO
Hinf control , robust control, optimisation problem, genetic algorithms, flight control system
While simple pulse excitation of the ultrasound transducer is conventionally used in ultrasound imaging, the coded excitation scheme of the transducer was proposed recently to improve the image quality and penetration depth. In this article, a novel combi
Sonography, Ultrasound imaging, Coded excitation, Matched filter, Chirp, Nonlinear FM signal
6 462-136
6 462-261
5 462-285
7 462-184
6 462-289
6 462-280
The Support Vector Machine (SVM) appears in the late nineties as a new technique with a great number of analogies to Neural Network (NN) techniques. Since Vapnik’s first paper (1992), the number of the applications of this method has experienced an import
Support Vector Machines; Neural Networks; GARCH model; Volatility Forecasting
- In this paper a formal model based on Temporal Database concepts is presented. The model is used for developing the pseudo-code specifications of a Timetabling System. More specifically, a formal model of time is defined, to cater for the storage and
Temporal Database Concepts, Timetabling
The design of new optimal nonlinear voltage regulator for power systems is considered. In the proposed approach, the Hamilto-Jacobi-Belman (HJB), a partial differential equation, is solved using Taylor series expansion of its nonlinear terms. The performa
Nonlinear control, optimal control, power system, voltage regulation, Hamilton-Jacobi-Belman equation.
With the advent of telemedicine, automated techniques, compression, modelling, and presenting pertinent medical information the best way is imperative for remote diagnosis and second opinion examinations. In the case of liver diseases, this paper presents
2D/3D, MRCP, Automatic modelling, Biliary tree, Medical imaging, Compression
The purpose of this paper is to design a high performance sliding mode controller through the use of a new switching function. This method uses the idea of boundary layer sliding mode while taking the boundary layer width as a function of the angle betwee
Sliding mode controller, chattering reduction, switching function, boundary layer.
Abstract: - It is well established that the benefits obtained from exercising are enhanced if a sufficiently strong cardiovascular response is achieved as result of the exercise sessions. Frequently, the achievement of that critical exercise level is gaug
Exercise Evaluation, Photoplethysmograph, PPG, Blood Volume Pulse, BVP, Dicrotic Notch, Non-invasive monitoring
4 462-106
3 462-107
3 462-231
3 462-230
9 462-262
5 462-229
This paper is an organological ethnography of the Thum Nyatiti and its music. I argue that the Thum Nyatiti has undergone a sociocultural evolution. Colonialism and the subsequent institutionalisation of the lyre have attributed to the transformation of
Nyatiti, Jathum, Japathum, Colonialism, Institutionalization,Culture, Cultural Hybridity,Genre, Lyre,
This paper is concerned with the reduction of the logistics costs in production networks based on Combinatorial Sequencing Theory, namely the concept of Ideal Numerical Rings (INR), which can be used for configure high performance manufacturing based on l
Combinatorial Sequencing Theory, Ideal Numerical Ring, Favourable distribution, Production network, Manufacturing goods, Logistic cost
The viscoelastic rectangular plate with rectangular cutout is considered. The plate with a cutout is presented by a "solid" model-clone with variables in parameters of rigidity and weight, that have gaps of uniformity. An equation of motion for the plate
Free oscillations, rectangular plate, rectangular cutout, variable rigidity, variable weight
The effective Bohr radius of the donor electron in semiconductors extends over several interatomic distances, providing for a potential bonding with a neighboring donor state at both high doping and external excitation. Such a bound state has actually bee
Bound donor-acceptor pair state, semiconductor, AUGER-molecule, emission quenching
ABSTRACT Information Theoretical Approaches to Genetic Regulation Javorszky, Karl [email protected] We present a rational model of theoretical genetics, a bridge connecting information processing in biologic organisms with classical, technical informat
multidimensional partitions, linearisation of structured sets, commutative information processing
The development of a true end-to-end QoS (Quality of Service) presents many challenges, both in the core networks and in the access networks, mainly with regard to the integration of the involved technologies. To obtain best results those technologies nee
Access Network, Protocol, MPLS, QoS, RSVP
9 462-108
6 462-109
5 462-271
5 462-111
4 462-295
6 462-228
In this paper, a sliding mode fuzzy controller for a nonholonomic wheeled mobile robot is proposed for tracking desired trajectories. We know that sliding mode control can deal with non linearities of control system and is robust. However, it has drawback
Sliding mode fuzzy controller, Nonholonomic mobile robot, Tracking trajectories.
A procedure for constructing compactly supported orthogonal multiscaling functions is first given, and then based on the constructed multiscaling functions, we propose a method of constructing multiwavelets, which is similar to that of uniwavelet. Fin
Orthogonal multiscaling functions;Orthogonal multiwavelets; Two-scale matrix equation
Abstract : In the context of mobile communications, the aim of several researchers in recent years is the reduction of Intersymbol interference (ISI). Blind equalizers reduce Intersymbol Interference using second-order statistics without the need for t
Blind channel identification, Blind channel equalization., Isi, Zf, Mmse, Direct methods, indirect methods.
The time course of 8-anilino-1-naphthalenesulfonic acid (ANS) binding to adenylate kinase was a biphasic process. The burst phase ended in the dead-time of the stopped-flow apparatus (about 15 ms), whereas the slow phase completed in about 10 min. A kinet
Adenylate kinase, Proline residue, Multiple conformations, Kinetics, Mutation
Traditional full-text information retrieval is used to explore the implicit knowledge in large amount of texts by keyword matching techniques. However when the application domain becomes more specific such as the business domain, one can utilize the domai
Sharable ontology, Data and knowledge sharing, Knowledge discovery, Semi-structured data management, and Query processing.
The objects appearance in the images is modified because of several external factors (i.e.: illumination, rotate, pose) and the application of the standard comparison algorithms does not answer suitably. For landing this problem, we present here an archit
Categorization, Recognition, Representation, Modeling, Aerial image, Vision.
5 462-259
4 462-117
9 462-119
7 462-222
5 462-224
6 462-185
Abstract In the present paper we have attempted to correlate activity and structural changes of Horseradish peroxidase (which found numerous applications in biotechnological use) with the effects of modification and pH variations to extract information ab
Keywords: Horseradish peroxidase; pH; Structure; Pre-molten globule
Consumption of illicit drugs is a worldwide problem. In this work we setup a model to describe the drug usage dynamics in a given population. Three categories of illicit drug consumers are considered, namely, experimental (E), recreational (R) and heavil
Drugs, Experimental, Recreational, Addicts, Deterministic, Critical point, Asymptotically stable.
In this paper, we present a software and hardware implementation of navigation approach based upon a VHDL description for intelligent autonomous vehicles in unknown environment. The use of Genetic Algorithms (GA) Fuzzy Logic (FL) and Expert Systems (ES) i
Intelligent Autonomous Vehicles (IAV), Expert System ES, Genetic Algorithm (GA), Fuzzy Logic (FL), FPGA implementation, VHDL, Synthesis.
Abstract: - In the last few years, the problem of dynamic adaptive courses and evaluation has become an important research issue. The coupling between dynamic adaptive hypermedia and pedagogical activities is a fundamental element to the integration and a
Key-Words: - Dynamic Adaptive Hypermedia, Pedagogical Activities, Learner Profile .
In this paper, we will use the benefits of fuzzy logic to design a high performance traffic controller of Asynchronous Transfer Mode (ATM). In the proposed fuzzy traffic controller, the actual mean cell rate of traffic source is estimated and the traffic
ATM networks, traffic control, fuzzy control.
A mathematical model is developed based on the interaction function $F_{ij}$ which shows the pattern of inheritance of hemoglobin $S$ (HbS) gene. Polygamy is captured in this study and could be partially responsible of the widespread of sickle-cell Anaem
Polygamy, Sickle-cell anaemia, Population dynamics, Age, Physiological factor
6 462-122
8 462-264
4 462-177
7 462-214
6 462-167
We consider a representation of the stock market as a network, which is constructed by calculating cross-correlations between pairs of stocks based on the opening prices data over a certain period of time. This network is referred to as the market graph.
Stock prices, Market graph, Cross-correlation, Power law, Edge density, Evolution
An existing generic enzyme rate equation, the reversible Hill equation, was generalized to account for modifiers affecting the catalytical properties of the enzyme as well as for the case of several substrates and products. The resulting generalized rever
Metabolic modeling, Enzyme kinetics, Reversible hill equation, Operationally well-defined parameters, phosphofructokinase
An image plays an impotrant role in a Web document represented on a HTML page, but studies on analysis and understanding of this have not been actively performed. Many Web images are used for carrying information, but they are also used only for improving
Image Features, Machine Learning, Analysis of Web Documents
Users can access VoiceXML-based IVR(Interactive Voice Response) systems using their mobile devices such as smart phones in anytime and at any place. Even though their mobile devices have small screens, they have to interact the services using voice-only m
VoiceXML, multi-modal interaction, XHTML+Voice, WWW, Interactive Voice Response services, Mobile devices
The use of digital multimedia for profit is pressing for the development of a robust and indelible method of protecting the rights of intellectual property of the content creators. For the most part the common denominator of many current watermarking tech
Robustness, watermark, data hiding, human visual system (HVS), bit error rate
6 462-182
7 462-241
5 462-252
9 462-173
9 462-174
9 462-189
Abstract: In this paper we analyse a Model that simulates conveniently the interrelations between Inflation, Interest rates, Public Expenditure and national Debt in Spain before the Maastrich' s scenario. We use techniques of Dynamic Simulation and Growth
Key-Words: Macroecomic scenario, Dynamic simulation, Growth Curves, European convergence, Qualitative Analysis, Equilibrium points
Enabled by the evolution in information technology, companies are constantly trying to re-engineer their business processes to be more productive and efficient to respond to the quickly changing environment. A number of workflow management systems (WFMSs)
Workflow, Workflow Management System, Agent, XML, Supply Chain Management
Given a quadruple of matrices $(E,A,B,C)$ representing a two dimensional one input one output generalized linear system $E \dot x = Ax^{(0)}+Bu, y=Cx$, we show its structure hierarchy, that is to say we show all structures that are within the closure of t
Generalized linear systems,orbits, strata.
The rapid growth of the network-centered (Internet and Intranet) computing environments requires new architectures for information retrieval systems. Typically,in these environments, the information resources are dynamic, heterogeneous and distributed. In
Software Agents, Information Retrieval, Search Engine, Mobile Agent, communication
The explosive growth in the volume of information available on the Internet computing environments requires new architectures for information retrieval systems.Typically, in these environments, the information resources are dynamic,heterogeneous and distr
Software Agents, Information Retrieval, Search Engine, Mobile Agent, communication
The real-time transport protocol (RTP) provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. Its companion control protoc
RTP, RTCP, RTCP Scalability, Multimedia Protocols, Real-time protocols.
4 462-176
6 462-164
7 462-250
6 462-179
4 462-181
6 462-202
4 462-203
Was offered the statistical method of the vehicle trajectories researches in an atmosphere. It was based with the theory of Markovian process. It was supposed, that the space vehicle is in the one of the beforehand conditions of a phase space. The vehicle
Statistical method, motion of space vehicle, probability, discretization of a phase space.
Statecharts have been originally created to specify complex reactive systems for use in simulating real-time applications. They are an extension of state transition diagrams with notions of hierarchy, concurrency and synchronization. Recently they have be
Statecharts PcML Performance Markup XML
The rapid growth of the Internet and increased demand to use the Internet for voice and video applications necessitate the design and utilization of new Internet architectures with effective congestion control algorithms. As a result, the Differentiated S
QoS, M/M/1 queue, Congestion control, Sliding mode control, Robust control.
One of the drawbacks of the bootstrap method is that it is time consuming when exucuting its applications, especielly with some statistical software (example: S-plus, Minitab, Gauss..). But when using the programming languages (example: Borland Pascal, C/
Borland Pascal, S-Plus, Blocks bootstrap, Bootstrap for stationary processes.
- Cereal Sunn pest (E. integriceps) is the most important pest in Iran [6]. Based on horizontal life table method, the population dynamics of this pest was studied. Whereas some life stages of this pest are very small and live in soil cracks and microhabi
Eurygaster integriceps, population dynamics, life table
- EbXML provides a complete framework for setting up B2B collaborations. It is a set of documents, with several prototype completed, enabling businesses of any size to do business electronically with anyone else. A lot of work has to be done on the speci
Key-Words: - ebXML, B2B ecommerce, agents, stationary agent, mobile agent, Java technology
Abstract:- When exposed to an external electric a.c. field, the physical mechanics of cell membranes is an essential aspect of cell deformation and shape oscillations. Dielectrodeformation is related to the induction of a dipole moment due to electric cha
Key Words:- forced cell vibrations, bioimpedance spectra, human blood
6 462-190
6 462-298
6 462-103
6 462-175
8 462-146
The advancement in the field of Distributed Object-oriented Computing has motivated the development of flexible telecommunication architectures for the current telecommunication market. The Object-oriented Distributed Service Architectures utilize the pri
Object-oriented Distributed Service Architectures, Load Balancing, Performance, TINA, Computational Objects, CO distribution
Access to the real-time information and consultations, irrelevant of their complexity, focused on exact needs and independent of location are essential factors to all busy people, specifically businessmen and specialists nowadays. In this paper, we presen
Services for 3G+ Networks, Mobile e-Business, Mobile information systems, Intelligent Services, Knowledge-based Consultant Systems, Expert systems, Decision support systems.
In this paper we develop a contingent claims framework for determining the financial value of professional football players. The football players are seen as real assets and this methodology can be used in the football industry, insurance industry and the
asset pricing, geometric Brownian motion; jump-diffusion, Ito's lemma, Poisson process
It` explored the designing of intellectual systems problem, which used for acceptance of the exact and operative solutions at control vehicle remote sounding of the Earth. It have example, where the acceptance of operative solution on elimination of conti
Intellectual systems, control, knowledge base, acceptance of the solutions
This paper presents an on-line fuzzy optimization of the global efficiency of a photovoltaic water pumping system driven by a separately excited dc motor (DCM), a permanent magnet synchronous motor (PMSM), or an induction motor (IM). The optimization pro
Photovoltaic water pumping, Optimization, Fuzzy logic controller, DC and AC actuators
9 462-188
3 462-282
8 462-256
6 462-284
Recently, some problems related to using the real-time control protocol (RTCP) in very large dynamic group have arisen. Some of these problems are: feedback delay, increasing storage state at every member, and ineffective RTCP bandwidth usage, especially
RTCP Scalability, Distributed Management, Multimedia Protocols, Multimedia Communication, RTP.
In this project, we try to use temporal reinforcement learning in solving a combinatorial optimization problem. We have selected STAGE algorithm introduced by Boyan and Moore (1998) as our base algorithm. We have suggested learning structure (CMAC network
Information Technology, STAGE, Different Learning
Distributed data mining has great functionalities that can offer to nowadays applications. That is because the nature of most of these applications is data distribution. One of the potential applications for distributed data mining is the use of OIKI DDM
Facilities Management – Knowledge Discovery – OIKI DDM – Decision Support System– Meta-Benchmarking.
Abstract: - Access to the real-time information and consultations, irrelevant of their complexity, focused on exact needs and independent of location are essential factors to all busy people, specifically businessmen and specialists nowadays. In this pape
Services for 3G+ Networks, Mobile e-Business, Mobile information systems, Intelligent Services, Knowledge-based Consultant Systems, Expert systems, Decision support systems.
6 462-221
9 462-220
6 462-141
6 462-143
7 462-274
8 462-260
In the work there are studied deterministic models of human cells populations. They are described by nonlinear systems of functional-differential equations. The problems of their qualitative analysis are emphasized. There are studied problems of linear st
Population dynamics, immune system, Gompertzian dynamics, delayed system, stability, optimal control, Hopf bifurcation
The feasibility of and the necessity for an objective estimate of the psycho physiological perception of sound after compression are discussed. Some possible methods are studied. The preferable method is the consonance method. The essential principles of
Redundancy, Consonance, Dissonance, Sound distortion
Abstract: - The multimodel approach is a research subject which is recently developed for modeling, analysis and control of complex non linear and non stationary systems. This approach supposes the definition of a base of local models. Each local model ca
Multimodel, Validity Fusion, Fuzzy Supervisor, Models’ Base, Uncertain Systems
Abstract : the main idea of the multimodel approach is to represent a complex system by several models having each a given validity'domain chiffred by a validity’degree. These validities'degrees are exploited in the fusion step of the base'models in order
Multimodel Approach - Uncertain Systems - Validity Computation - New Approach - Residues
The paper deals with a structure for implementing of 8-channel simulation of acoustic rooms (known as artificial reverberation) as a discrete system. The paper begins with a description of essential terminology and parameters. The next chapter starts with
Artificial reverberation, multichannel, simulation, digital audio signal processing
We consider graphs with cliques of size k for k in special intervals to solve the clique-problem in efficient time.
Clique, Independent set, Vertex cover, Strong NP-completeness, Time complexity, Polynomial algorithm
7 462-240
3 462-267
6 462-232
6 462-151
8 462-281
6 462-153
6 462-155
Enabled by the evolution in information technology, companies are constantly trying to re-engineer their business processes to be more productive and efficient to respond to the quickly changing environment. A number of workflow management systems (WFMSs)
Workflow, Workflow Management System, Agent, XML, Supply Chain Management
A method of identifying the order of the switched circuit as a z-domain dynamic system is described. The method is readily algorithmized and it can be implemented into current analyzing programs to avoid zeros and poles, which appear due to numerical inac
Switched Circuit, System Function, z-domain order
Abstract: - In the last few years, the problem of dynamic adaptive courses and evaluation has become an important research issue. The coupling between dynamic adaptive hypermedia and pedagogical activities is a fundamental element to the integration and a
Key-Words: - Dynamic Adaptive Hypermedia, Pedagogical Activities, Learner Profile .
This report is devoted to analysis of Asian options pricing procedure. This procedure is based on binomial approximation of stochastic process of asset price modification; option cost is calculated by backward induction through the tree. This report repr
Asian option, Pricing, Brownian motion process, Asset price, Interpolation
To operate successfully in a complex world, intelligent agents must exhibit context-sensitive behavior. Context impacts the appropriateness of virtually all aspects of an agent's behavior, yet most existing reasoning approaches pay little if any attention
Intelligent agents, Information Technology, Context
In this paper, a novel adaptive control technique based on the auto-tuning gain error matrix is presented. The relations between the proposed controller and the conventional discrete-time PID controller are given. The gain matrix is determined by a ne
Adaptive control; Fuzzy; Discrete-time; Nonlinear
Abstract: - Luckinbill [1] demonstrated in a laboratory that populations of Paramecium aurelia as a prey and Didinium nasutum as a predator could exhibit sustained oscillatory behaviour. Harrison [2] modelled this data for testing predator-prey models and
Paramecium, Didinium, Diffusion, Lotka-Volterra, Response functions and Time delay
6 462-239
9 462-187
3 462-266
3 469-181
6 469-179
4 469-178
Abstract: This paper emphasises on the implementation of the flow control and resource allocation mechanisms of the Medium Access Control (MAC) layer of GPRS. Also, its design for adaptability to the satellite network has been considered. In addition, the
General packet radio service, Geo-mobile satellite systems, Resource allocation, Flow control
Recently, some problems related to using the real-time control protocol (RTCP) in very large dynamic group have arisen. Some of these problems are: feedback delay, increasing storage state at every member, and ineffective RTCP bandwidth usage, especially
RTCP Scalability, Distributed Management, Multimedia Protocols, Multimedia Communication, RTP.
A method for the simulation of general-structure passive ladder filters by means of CDTA (Current-Differencing Transconductance Amplifier) elements is described. These elements with two current inputs and two kinds of current output facilitate the realiza
CDTA, Ladder Filter, Current Mode
Abstract: - We will show in this paper how one can find large k-1-Smith numbers and give examples of large k-1-Smith numbers for different values of the integer k. We will do some computations to support a conjecture of McDaniel on the existence of infini
Smith numbers, k-Smith numbers, k-1-Smith numbers, Repunits, Primes
Abstract: security policy development and regulatory requirements compliance are key success factors for the development of information and communication technology (ICT) systems for the energy Trading & Risk Management (TRM) sector. Most utility TRM syst
Trading and Risk Management, Electric Power Utility, Deregulation, IT Security
The rapid growth of the internet makes it easy and comfortable to share mutual information through a web document. But web document was developed for a desktop user, so he/she must use a mouse and a keyboard to surf the internet. Users want easier and nat
HTML, VoiceXML, contents converter, text extractor, key sentence, web browser
6 469-177
9 469-176
8 469-175
6 469-174
6 469-173
6 469-172
Abstract: - In the course of a travel around the internet, users visit various host servers located all over the world and, inadvertently, place digital traces of their surfing habits. These hosts gather and register information about all users and their
Clustering, Factor Analysis, Web Access, Web Log Analysis, Web Log Visualization
The paper investigates relationship between algebraic expressions and generalized Fibonacci graphs. We propose an algorithm for constructing expressions of generalized Fibonacci graphs. On every step it divides the graph into two parts of the same size. W
Complexity of an algebraic expression, Generalized Fibonacci graph, Optimal representation of the algebraic expression, St-dag, St-dag expression
In this paper a new protocol that allows users to surf on the world-wide-web and yet maintain their anonymity is introduced. The protocol is implemented by several mix servers connected at different points on the Internet and from agents installed inside
Anonymity Privacy WWW
The direct manipulation user interfaces are predominant in a large number of current interactive applications, but they are difficult to design. They require a model to specify a large amount of visual representations such as the user actions and the info
Interaction patterns, Direct manipulation user interfaces, Usability factors and Visual feedback
Current technology in optics provides ways to compensate for some common visual limitations (up to second order visual impairments) through spectacles or contact lenses. Current wavefront sensing techniques provide a model of these visual limitations thr
Point Spread Function, PSF, Wavefront Aberration, Histogram, Edge Masking
Transmission of video data through the Internet is a time critical application. Numerous methods have been suggested for transfer of such data with the focus on quality versus response time. The RTP protocol is commonly used for sending and receiving mult
MPEG, RTP, RTCP, RTP retransmission, NACK, SSRC, Network Processor
6 469-171
4 469-170
8 469-169
6 469-168
6 469-167
4 469-166
7 469-165
In this paper we propose a modification to the Binomial congestion control algorithm for multimedia applications [1]. The Binomial congestion control algorithm increases the window size inversely proportional to a power ΣkΤ of the current window size and
Congestion control, Congestion window, Loss rate, Slow Start, TCP friendliness, IIAD
In this work we deal with the problem of localization established by three objects, a ball and the opponent's goal in a soccer field, exposed to a maneuvering robot. The robot is equipped with a camera, two encoders one for any wheel, as well as three inf
Robot eyesoccer, Algorithms, Amplitude tracking
Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, no
Mobile Agent Security, Secure Ad-Hoc Networks, Secure M-Commerce
Iris recognition system using wavelet transform and direct linear discriminant analysis(DLDA) is presented in this paper. It specifically uses the multiresolution decomposition of 2-D discrete wavelet transform for extracting the unique features from the
Wavelet Transform, DLDA, Iris Recognition, Pattern Matching
Location-based Services, or LBS refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced
LBS, XML Security, XML Web Services, XKMS, XACML, SAML
The rapid growth of Internet together with the high volume of data carried by it and increased demand to use the Internet for time sensitive voice & video applications has necessitated the design and utilization of effective congesti
Throughput, FCCA, TCP Networks, worst case traffic.
The execution of processes can be represented as partially ordered sequences of actions, where each of these sequences might be governed by different security policies. Based on these sequences of actions, and their related security measures, a fine-grain
wrapper, Distributed Applications, security policies, dynamic roles.
6 469-164
4 469-163
6 469-162
6 469-161
7 469-160
6 469-159
Many emerging network applications (e.g., teleconferencing, information services, distributed interactive simulation) are based upon group communication model. In near future, the concept of group communication will dominate all other concepts. As a resul
Confidentiality, Group communication, secure group, rekeying, group key management, several server logic
This paper presents some calculus aspects of a helical vibratory conveyor used for bulk solids handling. The conveyor trough is assimilated with a cylindrical helix. Considering a particle in motion on this trough, the focus is to deduce its velocity, use
vibrations, conveyors, vibratory trough, vibratory elevators, particle motion
In this paper, we examine and compare the performance of different Intelligence techniques (such as neural networks, fuzzy logic, genetic programming and combination of these methods) that have attracted a lot of attention in the area of medical diagnosis
Fuzzy, Neural networks, Genetic algorithms, Statistical analysis
The fundamental problem of selecting the order and identifying the parameters that define an AutoRegresive Moving Average model (ARMA), is one that impacts on many important field. In fact, statistical package such as SPSS, Statgraphics, Matlab, etcΖ,requ
Neural Networks, Time Series, Identification, Modeling
Mobile agent computing is an increasingly important paradigm which presents interesting new security challenges. Among these are the protection of host against malicious agents and protecting agents against hosts that execute agents. Especially of inter
Mobile Code Security, Secure Ad Hoc Mobile codes
A linear quadratic differential game related to robust control problems in linear systems is considered. We shall show that computational difficulties, which may arise in obtaining the solution of the game and the optimal control law, are related to the f
Linear quadratic differential game; Linear robust control; Matrix Riccati differential equation; Pseudo-inverse matrix
6 469-158
6 469-157
4 469-156
5 469-155
6 469-154
8 469-153
6 469-152
The study of the approximation quality of the developed by the author GR-method for solution the Dirichlet boundary problem for the Laplace equation is presented. Some modification for improving the approximation property of the algorithm is proposed, re
algorithms, Dirichlet problem, Laplace equation, Radon transformation
This paper presents the evaluation of the new emerging data exchange technologies and development of the novel approach for the access, acquisition, and transmission of multimedia information within Jini federation of intelligent users interconnected over
Distributed system, Jini technology, Mobile agents, Robot remote control
Abstract:-This work deals with nonstationary signals processing of blood cells. The signals under study are represented in a time-scale and statistical techniques are used to characterize their behavior and to identify a data pattern, then assuming tha
Stochastic models, Time series, Forecasting, Autoregressive moving average models
Abstract: - This paper tries to propose a cooperative search method based on using two search algorithms to solve the Weighted Max-Sat problem. The latter is known to be difficult to solve, due to a high number of local minima present in its search space.
SAT, Max-W-Sat, Scatter Search, GSAT, Cooperation, Hybrid meta-heuristic.
This paper has two immediate goals: Developing a simplified lumped parameters model that approximates the distributed parameters structure of steam superheaters; and developing a structure for fault detection and localization using actuators fault detecti
Fault detection and isolation, superheater control, industrial systems control
Business process should support the execution of collaboration process with agility and flexibility through the integration of enterprise inner or outer application and human resources from the collaboration workflow view. Although the dependency of enter
Workflow Modeling, Business Process, Human Error
A new approach to the design of mechanical and electromechanical components and systems was developed by our research group to improve safety and reliability, especially in automotive production. The purpose was to strictly link methodological theories an
Safety, Reliability, Fault injection technique, Software modelling, Matlab Simulink,
5 469-149
6 469-146
6 469-145
8 469-144
6 469-143
6 469-140
N X N bit twoΤs complement parallel Vedic Multiplier based on Ancient Indian Vedic Mathematics is described in this paper. The algorithm of Vedic Mathematics called Urdhva Triyakbhyam is modified to give the new multiplication algorithm and multiplier.
Multiplier, TwoΤs complement multiplier, Arithmetic and logical unit, Parallel algorithm , Vlsi ,Vedic Multiplier, Vedic Coprocessor.
The main objective of this paper is to explore the possibilities of developing a 3-tier architecture model for load flow monitoring of a multi-area power system. An architecture based on single-server serving multiple clients has been proposed, which enab
Load flow monitoring, Distributed computing, Distributed Databases, RMI, client-server model.
In this paper we study how to localize periodic orbits of a polynomial system with help of a finite set of polynomials specially constructed. Our approach is based on high order extremum conditions, high order tangency conditions and algebraic dependence
Polynomial system, Periodic orbit, High order extremum condition, High order tangency condition
- As a number of diverse satellite systems are being designed and deployed, it becomes increasingly important to be able to test these system under realistic traffic loads. In this paper, an improved and efficient method of verification of Satellite Netwo
EP, Back traffic, TCP, UDP, Satellite Networks
The introduction of 3G technologies has not yet been followed by the appearance of a new generation of mobile services. In practice, relatively simple network services such as SMS, call forwarding, and conference calls are still the main revenue sources f
Mobile services, Grid computing, Mobile grid, Virtual organizations
We present an extension of previous work on improving the initial image retrieval set by exploiting both intra and inter-query learning. In most Content-Based Image Retrieval (CBIR) systems based on Relevance Feedback (RF), all prior experience is lost wh
Content-based image retrieval, Relevance feedback, Support vector machine, Inter-query learning, Reinforcement learning
6 469-139
6 469-138
6 469-137
6 469-136
6 469-135
5 469-132
Genetic Algorithm (GA) is deployed for optimal design of both connectivity configuration and the values of coefficients, respectively, involved in GMDH-type neural networks which are used for modelling of level variations of the Caspian Sea. In this way,
Caspian Sea, Group Method of Data Handling (GMDH), Genetic Algorithms (GAs)
Higher order local autocorrelation (HLAC) has been used as feature descriptors for various pattern recognition applications, including 2D image classification, recognition and detection. This paper describes an implementation technique to find 3D mask pa
HLAC Autocorrelation Mask pattern Volume data Shape features
The only form of inter-process communication in E-LOTOS, a standard process-algebraic language for specification of concurrent and reactive systems, is multiway synchronization. In an earlier work, we demonstrated that through abstract interpretation of e
Concurrent systems, Formal specification, E-LOTOS, Synchronous broadcasting
The main objective of this paper is to develop a dynamic model of Unified Power Flow Controller (UPFC) . This model can also be used to represent the system with a Static Synchronous Compensator (STATCOM) or a Static Synchronous Series Compensator (SSSC).
Power System Stability, FACTS, UPFC, STATCOM, SSSC
Abstract: this article discusses new problems which should receive more attention in the process of distributed application: Benefit Feedback Mechanism and segmentation and transfer of data. Moreover, it shows other related problems, such as fault toleran
Benefit Feedback Mechanism, Distributed Computing
Advances of mobile communication technologies and device technologies brought the mobile computing era where people use multiple information devices such as a PDA, a cellular phone and a handheld PC to connect with various Internet services. Very often, t
Synchronization
6 469-131
6 469-130
6 469-129
5 469-128
Web services are self-contained, self-describing, loosely-coupled applications that can be published, located and invoked across the Web. They are becoming the major components for the creation and integration of large-scale distributed systems as they a
Web services, Web services security, XML encryption, XML signature, WS-Security, SAML.
This paper presents results associated with the second stage of the project dedicated to developing, introducing, and employing the xOMNI system (software of the Supervisory Control and Data Acquisition (SCADA) type). This stage is related to the elaborat
Subtransmission System, Energy Management System, Voltage and Reactive Power Control, Regulated and Deregulated Environments, Sensitivity Indices, Experimental Design, Fuzzy Rules, Fuzzy Logic
Optimization models and algorithms for dynamic generation with multiple services in electricity markets are presented in this paper. One of optimal model aims at determining the total quantities of generation for three services such as real power, reactiv
electricity market, reactive market, reserve market, production costs, holding cost, shortage cost, stochastic load.
Abstract : In the context of mobile communications, the aim of several researchers in recent years is the reduction of Intersymbol interference (ISI). Blind equalizers reduce Intersymbol Interference using second-order statistics without the need for t
Blind channel identification, Blind channel equalization., Isi, Zf, Mmse, Direct methods, indirect methods.
8 469-126
6 469-125
6 469-124
6 469-123
7 469-122
6 469-121
To develop a reliable information and communication technology dissemination system, which will technologically empower users and give them responsibility to achieve organisational expectations. In addition, a network link will be developed to provide ef
Autometrics - BioVirtual Network Management - Gapology - Facilities Management - Biometrics - SMEs - ECDL
The new n+pvnp+ structure for the avalanche diode was proposed some years ago to improve the frequency characteristics. This type of the diode was named as the Double Avalanche Region (DAR) IMPATT diode. This structure includes the two avalanche regions
Semiconductor microwave devices, Modeling and simulation, Numerical methods.
The formulation of the process of analog system design has been done from more general approach. This approach produces many different design strategies inside the same optimization procedure and allows determining the problem of the optimal design strate
Generalized design methodology, Time-optimal design strategy
Abstract: - Author discuss the problem of determining parameters suitable systolic arrays for implementation regular 3-nested loop algorithms. It is shown that on that occasion the characteristics of adaptable algorithms to the projection direction should
Systolic arrays, Adaptable algorithms, Systolic arrays characteristics, Matrix multiplication
Users can access VoiceXML-based IVR(Interactive Voice Response) systems using their mobile devices such as smart phones in anytime and at any place. Even though their mobile devices have small screens, they have to interact the services using voice-only m
VoiceXML, Multi-modal interaction, XHTML+Voice, WWW, Interactive Voice Response Services
This paper presents the use of Grey Level Co-occurrence Matrix (GLCM) method together with multilayer fully-connected feed-forward perceptron (MLP) for image texture classification. GLCM method was employed as a features extractor technique and MLP was u
Gray level co-occurrence matrix , neural network, texture and classification
4 469-120
7 469-119
9 469-118
6 469-117
6 469-116
This paper introduces Quaternion Encryption Scheme (QES) as a means to secure data transmission over wireless networks that are vulnerable to attacks. Sampling data of the signal are formulated in a 3-D vector space and are rotated by another key vector s
Cryptography, wireless security, quaternion algorithm, quadripartite rotating key
Most of the local area networks have been designed for non-real time transmission of digital data as text and images. To achieve audio data transmitting over the network in efficiency manner (real-time), the implementation of audio-on-demand using the Rea
Multimedia, Real-time Transport protocol, audio-on-Demand, buffering time, Java Media Framework, Media Locator.
Abstract: as the most noticeable feature of Grid, the sharing mechanism in the wide-area range of software and hardware has several problems needed to discussed and resolved in the process of application. The article discusses the possible problems existi
Grid Computing, Share
Abstract: Ant Colony Optimization (ACO) exhibits parallelism, contains certain redundancy and historical information of the past solutions with pheromone trail, and is suitable for implementation on massively parallel architecture. But it is not easy to a
Flow-shop scheduling problem, Ant colony optimization, Simulated annealing, Hybrid optimization strategy
What are the impacts of different asset price behaviors on Value-at-Risk Mangement? This paper compares the optimal strike price and hedging ratio for risk management of Value-at-Risk minimization with options in two different asset price generating proce
value-at-risk, mean-reversion asset price
6 469-114
6 469-112
9 469-111
6 469-110
6 469-108
- Our task is to develop a computer vision system for solving an image pattern recognition task: graphical object extraction and recognition. First, in the introduction, we provide the general schema of our proposed approach. Then we focus on the object e
image analysis, pattern recognition, graphical objects, image segmentation, graphical primitive, shape recognition, classification, feature extraction, content recognition, histogram
The paper presents results of research associated with the use of the Bellman-Zadeh approach to decision making in a fuzzy environment for solving multicriteria optimization problems. Its application conforms to the principle of guaranteed result and prov
Multicriteria Optimization, Bellman-Zadeh Approach, Resource Allocation, Load Management, Power and Energy Shortage Allocation, Power System Operation
ROBUST FUZZY ENHANCED MANUEVERABILTIY LAW: RELEVANCE TO AUTONOMOUS UNDERWATER VEHICLE GUIDANCE The basic notion of the paper is to develop an indigenous guidance law based on the principle of fusing three contemporary laws used for gui
Fuzzy, Airborne, Line of sigth angle, Range, Range rate, Linguistic variable
The Generalised Mass-Energy Equation Δ┤E = Ac2 Δ┤M; its mathematical justification and application in General physics and Cosmology. Ajay Sharma Community Science Centre. Directorate of Education. Shim
Einstein, mass energy eqaution, limitations
We provide a knowledge compilation technique which deals with the computational intractability of first order reasoning problems. The notion of prime implicates is extended to theory prime implicates in first order case. We provide an ``algorithm'' to co
Theory prime implicates, First order logic, Knowledge compilation
9 469-107
9 469-106
9 469-105
9 469-104
9 469-103
7 469-099
The real-time transport protocol (RTP) provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. Its companion control protoc
RTP, RTCP, RTCP Scalability, Multimedia Protocols, Real-time protocols
Recently, some problems related to using the real-time control protocol (RTCP) in very large dynamic group have arisen. Some of these problems are: feedback delay, increasing storage state at every member, and ineffective RTCP bandwidth usage, especially
RTCP Scalability, Distributed Management, Multimedia Protocols, Multimedia Communication
In the present work we consider the higher order linear parabolic equation in a rectangle with initial and boundary conditions.We establish new a priori estimates for the solutions to this problem in general H÷lder anisotropic norms, under the assumption
estimates,colvability,equations,parabolicity,solution,problem
The explosive growth in the volume of information available on the Internet computing environments requires new architectures for information retrieval systems.Typically, in these environments, the information resources are dynamic,heterogeneous and distr
Software Agents, Information Retrieval, Search Engine, Mobile Agent, communication
The rapid growth of the network-centered (Internet and Intranet) computing environments requires new architectures for information retrieval systems. Typically, in these environments, the information resources are dynamic, heterogeneous and distributed. I
Software Agents, Information Retrieval, Search Engine, Mobile Agent, communication
This paper presents a probabilistic algorithm for fault-tolerant scheduling in heterogeneous multiprocessor real-time systems. This algorithm deals with mixed sets of tasks, as it deals with both periodic and aperiodic tasks. The algorithm is composed of
Heterogeneous, real-time, fault tolerance, probabilistic, periodic, aperiodic, static, dynamic
465-087
465-088
465-089
465-090
The dynamic relation between trading volume and stock volatility: evidence for the G7.The goal of the paper is to reveal some new facts about financial time series. It is generally accepted that financial time series are not following the Brownian random walk process, but rather (multi-)fractional Brownian motion i.e. the fluctuations of financial time series tend to have a memory. While the (multi)fractal description is adequate for the analysis of long-term dynamics, certain aspects of the variability of prices has been left out of focus. In this paper the long-term correlations in short-term variability are studied. The trading data are divided into two categories: “large variability” and “small variability”. These definitions are based on the relative difference between the current price and the periods’ sliding average, using a (adjustable) threshold value T. The sequential “low” volatility trading days make up a “silent” period; the “silent” periods are “ranked” according to their length (measured in the number of trading days N). The rank R of a “silent” period equals to the number of “silent” periods longer than N. The relationship between the rank R and N was studied for various financial data. The analysis was conducted using different threshold values T ranging from 0.25% to 3.00%. The time
fractals, econophysics, scaling, Hurst exponent.
Negative Word of Mouth is considered a strong force in marketing dynamics. Here we present a spatial model of word of mouth propagation that incorporates effects of both positive and negative word of mouth . Our results show a great increase of the percol
We extend the recursive break test procedure of Leybourneet al. by using weighted-symmetric estimation to detect a single change intime series persistence. An application to U.S. Treasury bond on/o spreadsfffinds a significant change in persistence f
Persistence; unit root test; break point; MonteCarlo simulation
465-091
465-092
465-093
465-094
465-095
465-096
Self-Organizing system, wealth distribution,Edgeworth process, Bargaining, Law of Demand
The incumbent presentation shall attempt to delineate our research effort towards an alternative articulation of the interaction between heterogeneous investors in an arbitrarily framed stock market. The idea underlying our research lies along the lines o
This paper examines the long-run relationship between short term nominalinterest rates and in.ation using American data. As there is mixed evidenceon the long run behaviour of real interest rates, we test for a unit root in theframework of a complet
Threshold cointegration, structural breaks, Fisher e¤ect, mon-etary policy regimes.
Immediately after World War II the allied powers began what would be a slow march towards a worldwide economic and political order. They established an organization for political and military crises (the United Nations), economic rehabilitation (the InteOn The Returns Generating ProcessAnd The Profitability Of Trading RulesIn Emerging Capital Markets
This paper examines some of the statistical properties of various Autoregressive Condi-tional Duration (ACD) speci.cations. More speci.cally, the statistical analysis of the long-memory, and exponential ACD models is presented. To allow for non-monoto
Exponential ACD models, Long-memory, Generalized F distribution, Un-conditional moments, Hypergeometric Functions.
465-097
465-099
9 465-100
9 465-101
9 465-102
This paper o ers a reappraisal of the ffinflation-unemployment tradeo ,ffbased on “frictional growth,” describing the interplay between nominal frictionsand money growth. When the money supply grows in the presence ofprice inertia (due to staggered wage
unemployment, Phillips curve, nominal inertia, wagepricestaggering, monetary policy, business cycles, forward-looking expectations.
CREMM is a quantitave model that predicts the chances of large returnsfrom investing in forward foreign exchange markets. More speci¯cally, CREMMuses a small selection of country-speci¯c and general global macroeconomic datato generate probabilities
- A self-adaptive fitness formulation is presented for constrained evolutionary optimization. The method has been formulated to ensure that slightly infeasible solutions with a low objective function value remain fit. This is seen as a benefit in solving
Constraint handling, evolutionary algorithm, fitness, penalty, self-adaptive, real world problems
In this paper we investigate the closed-economy Keynes-Wicksell-Goodwin model of Chiarella and Flaschel (2000) for the case of two interacting open economies. We introduce these coupled two-country KWG dynamics on the extensive form level by means of a su
Interacting KWG economies, stability, instability, persistent cycles, coupled oscillators
In the framework of a Keynesian monetary macro model we study implications of kinked Phillips curves and alternative monetary policy rules. As alternative monetary policy rules we consider monetary growth targeting and interest rate targeting (the Taylor
Feedback channels, instability, monetary policy, wage floors, fluctuating growth, complex dynamics
7 465-103
3 465-104
6 465-105
3 465-106
4 465-107
9 465-108
9 465-109
The present paper describes the design of a chaotic masking system with application to the encryption – decryption of gray-level images using finite time synchronization of two chaotic Lorenz systems. The discrete implementation was realized using the Eul
Finite time convergence, Synchronization, Lorenz systems, Masking systems
In the present work a new chaotic oscillator is presented by immersing the dynamics of the Van der Pol oscillator into a Jerk system (a third order differential equation). The map of Poincaré was used to prove chaotic behavior.
Chaotic oscillator, Van der Pol oscillator, Jerk systems.
Here, we present a methodology for the identification of typical trading days using intraday data from the Athens Stock Exchange (ASE) general index. Each trading day is represented with linear segments that connect the series value at five discrete insta
Stock exchange, high-frequency data, trading day, clustering, EMH
An SCR (Silicon Controlled Rectifier) relaxation oscillator was used to produce chaos via Hysteresis Feedback. Evaluating the facts that a chaotic system presents random like motions with high sensibility to initial conditions and there exits a strange at
Chaotic Oscillator, Silicon Controlled Rectifier
This paper presents an analytical method to calculate the axial magnetic field of a tubular coil. Coils are often used to stabilise and control the arc position inside the plasma torches. The evaluation of the axial component inside the tubular coil is ea
Theoretical study; Mathematical analysis; Magnetic fields; Electric arcs; Plasma torches;
In the present work we consider the higher order linear parabolic equation in a rectangle with initial and boundary conditions.We establish new a priori estimates for the solutions to this problem in general Hölder anisotropic norms, under the assumption
estimates,solvability,equations parabolicity,solution, problem
This paper studies the pricing of European-style options using mixed lognormal distributions. We advocate such distributions as a computationally efficient way to calculate prices of such options: we derive higher truncated moments in analytic form, expl
mixed lognormals, truncated moments
4 465-110
6 465-111
6 465-112
4 465-114
4 465-117
4 465-118
This paper discusses perfect reconstruction (PR) condition of a maximally decimated block filter bank, which uses cyclic convolutions instead of linear convolutions used in the usual filter banks. This type of filter banks is particularly useful for subba
Filter bank, Perfect reconstruction, Real-valued, Cyclic convolution, Block process.
Using a chaotic Jerk system and with an appropiate state space representation, it was possible to solve the synchronization problem and produce a secure communication system where the information signal is added to the dynamic of the chaotic Jerk system.
Chaos, Jerk System, Syncronization, Secure communications
We use an inductive limit construction to examine the existence of Wada lakes for Hénon mappings.
Complex analytic dynamical systems, Hénon mappings, inductive limits, Wada Lakes
Was offered the statistical method of the vehicle trajectories researches in an atmosphere. It was based with the theory of Markovian process. It was supposed, that the space vehicle is in the one of the beforehand conditions of a phase space. The vehicle
statistical method, motion of space vehicle, probability, discretization of a phase space
A number of different chromatic measurement systems have been developed based upon logarithmic, linear and digital signal processing. A comparison between the logarithmic and the linear system shows that the linear system is far more versatile and sensiti
chromatic modulation, chromatic measurement systems
In this study indoor propagation path loss calculations and comparison of path loss techniques according to propagation environment have been investigated in detail. The accuracy of the models was examined and simulated for different environmental paramet
Indoor cellular communication, optimization, path loss, propagation model
5 465-120
6 465-122
7 465-123
4 465-124
5 465-125
Shuha 5 465-129
Whereas HTML is commonly used for creating graphical web applications, VoiceXML is used for voice-enabled web applications. But those applications that contain a big data or interaction a single-modality are not suited for small and mobile devices. The mu
VoiceXML, Multimodal, Interaction, XHTML+Voice, Transcoder
This paper tries to propose a new hybrid algorithm TS+SS for the weighted Max-Sat problem. The latter is known to be difficult to solve, due to a high number of local minima present in its search space. In this Work, we present a meta-heuristic based on T
SAT, Max-W-Sat, Taboo Search, Scatter Search, Solution combination method, Hybrid meta-heuristic.
Users can access VoiceXML-based IVR(Interactive Voice Response) systems using their mobile devices such as smart phones in anytime and at any place. Even though their mobile devices have small screens, they have to interact the services using voice-only m
VoiceXML, multi-modal interaction, XHTML+Voice, WWW, Interactive Voice Response services, Mobile devices
A quantum model of the intermittency of nonlinear waves in the one-dimensional beam of charged particles is presented. Two mode solution of classical problem is received which is the generalization of well-known Akhiezer-Lyubarskiy's one-mode solution of
intermittency, chaos
Flicker, the unnatural temporal fluctuations in perceived image intensity, is a common artifact in old film sequences. Flicker causes much viewing discomfort and is thus much desirable to be removed in old films restoration. In this paper, we propose a ro
Flicker Parameters Estimation, Roosmalen, Stationary Block Re-examination
APPLICATION OF MAGNETIC METHODS FOR THE ANALYSIS OF THE FINANCIAL MARKET Sh.O. Kuvandikov Samarkand State University 15, University blvd., Samarkand, 703004, Uzbekistan, e-mail: [email protected] Regular abstract ID 56498 At the present time number
9 465-130
4 465-132
5 465-133
6 465-134
8 465-135
5 465-136
A semi-analytical approach has been developed in the present theory to determine the geometrical non-linearity effects on the natural frequencies of anisotropic cylindrical tubes conveying axial flow. Particular important in this study is to obtain the na
Non-Linear,Dynamics, Flowing Fluid, Anisotropic,Cylindrical Tubes
In this paper, we would like to describe a design of web page slit system on hand held devices. The purpose of this study is to display a web page with rich contents on small screen devices. Nowadays, many web sites have rich contents. It is too inconv
web page, division, small screen, document object model, screen size
In this paper, we propose an automatic transcoding technology to convert existing HTML documents to HTML + VoiceXML documents which have visual and auditory presentation at the same time. Our transcoding technology provides the function that user can view
HTML, VoiceXML, Transcoding, Audio-Visual Web Contents
In this paper, we propose a web page transcoding technique for hand-held devices with small screens. This technique gives the devices successful display of original web pages designed for desktop computers. Our approach is based on the observation that mo
HTML, Transcoding, Small screen devices, Web contents, VoiceXML
Recent studies of DNA sequence of letters A, C, G and T exhibit the inverse power law form frequency spectrum. Inverse power-law form of the power spectra of fractal space-time fluctuations is generic to the dynamical systems in nature and is identified a
long-range correlations in DNA, self-organized criticality, quantumlike chaos, fractals, inverse power law, nonlocal connections
RLC active circuit model with voltage-controlled voltage-source (VCVS) and current-controlled current-source (CCCS) for the second-order autonomous dynamical system realization is proposed. Its circuit parameters are directly related to the state model pa
Dynamical systems, State models, Active equivalent circuits, Piecewise-linear controlled sources
5 465-137
6 465-138
7 465-139
9 465-142
In the context of mobile communications, the aim of several researchers in recent years is the reduction of Intersymbol interference (ISI). Blind equalizers reduce Intersymbol Interference using second-order statistics without the need for training seque
Blind channel identification, Blind channel equalization., Isi, Zf, Mmse, Direct methods, indirect methods.
An algorithm basing on numerical differentiation and central Lagrange interpolation with multi-points is presented for the fundamental frequency estimation of non-sinusoidal signals in this paper. The signal is sampled at a fixed sample frequency of 2560
frequency estimation, fundamental harmonic, nonsinusoidal signal, numerical differentiation, Lagrange interpolation
This work tries to simulate the behaviour of a group of voters when subject to an Υ external opinion source Υ ,; this kind of influence has been widely discussed in many countries . . The group of voters has been modelling using a version of a fi
Simulation , social system , cellular models , electorateΤs behaviour , mass-media influence econophysics
Many control system design problems can be formulated as multi-objective problems: that is there are several competing objectives that need to be simultaneously satisfied (system step response, rise time, overshoot, disturbance rejection, or integral abso
Linear control systems, Optimal control, Eigenvalues assignment, Load frequency control,Proportional plus integral contri\oller
6 465-143
6 465-144
7 465-145
6 465-146
5 465-147
Access to the real-time information and consultations, irrelevant of their complexity, focused on exact needs and independent of location are essential factors to all busy people, specifically businessmen and specialists nowadays. In this paper, we presen
Services for 3G+ Networks, Mobile e-Business, Mobile information systems, Intelligent Services, Knowledge-based Consultant Systems, Expert systems, Decision support systems.
Active Queue Management (AQM) takes a trade-off between link utilization and delay experienced by data packets. From control point of view, it is rational to regard AQM as a typical regulation system. In this paper, a new fuzzy adaptive second order slidi
Active queue management, robust control, second order sliding mode, fuzzy logic.
This paper proposes three exponentially correlated acceleration approaches for accuracy and computational complexity. These models are Singer model, Bar-Shalom and FortmannΤs model. Simulation results show that the Singer models and the Bar-Shalom and For
Maneuvering Target ,Tracking , Singer Model
Heating, Ventilating and Air Conditioning (HVAC) plant is a multivariable, nonlinear and non minimum phase system, which control of this plant, is very difficult. This paper presents a new approach to control of HVAC system. The proposed method is a hybri
HVAC System, Fuzzy Logic, PID Controller,
This paper proposes the design of power system stabilizer based on fuzzy logic and the sliding mode controller. The control objective is to enhance the stability and to improve the dynamic response of a single-machine power system operating in different c
power system stabilizer, Fuzzy sliding-mode control, Single-machine
8 465-148
8 465-149
9 465-150
7 465-151
6 465-152
The navigation strategy comprises two phases. Firstly, the local path planning generates an immediate goal position and collision-free reference trajectory. Secondly, the security strategy of the trajectory tracking method generates a safe goal position a
Fuzzy logic control, Trajectory tracking, Car-like mobile robot.
The fine grained parallelism inherent in Field Programmable Gate Arrays (FPGAs) may be well exploited to implement the computation-intensive discrete wavelet transform. In this paper, we describe a parallel implementation of the discrete wavelet transform
Discrete wavelet transform, Parallel distributed arithmetic, Implementation, Virtex FPGAs.
In this paper, we study non-linear dynamics in the CAC 40 stock index. Our empirical results, suggest combining seasonality, persistence and asymmetric effects to model the conditional volatility. We observe that seasonality can have an asymmetric impact
GARCH processes, Conditional volatility, non linear dynamics, Seasonality, Asymmetric models,
Enabled by the evolution in information technology, companies are constantly trying to re-engineer their business processes to be more productive and efficient to respond to the quickly changing environment. A good number of workflow management systems (W
Enabled by the evolution in information technology, companies are constantly trying to re-engineer their business processes to be more productive and efficient to respond to the quickly changing environment. A good number of workflow management systems (W
In this paper, a new robust adaptive FIR filter algorithm with variable forgetting factor for time-varying parameters estimation in the presence of impulsive noise is discussed. The proposed algorithm is based on the robust recursive least square and para
Adaptive filtering, Fir filtering, No-gaussian noise, Robust estimation
6 465-153
9 465-154
5 465-155
6 465-157
9 465-158NONE NONE 3 465-159
6 465-160
6 465-161
Radiation; Synergism between magnetic fields and lead overload on the permeability of the blood brain barrier in mice; Simplified model of the human-generated electromagnetic field during an ESD event
EM effects on the human body and equipment
Classical models often fail to predict values arising from crises events, partly, because they are based on the assumption that financial return series follow normal distribution. On the other hand, recent empirical studies have shown that financial data
Extreme Value Theory, GARCH models, Conditionality, Risk Management, Capital Requirements
Dynamical systems of class C are described by the 3rd-order autonomous differential equation with nonlinearity given as a three-segment piecewise linear (PWL) function. Argument of this function is a linear combination of state variables. These systems fo
systems, piecewise-linear, chaos, topological conjugacy
Identification process of the distillation column is the first step for design and implementation decoupling controller for binary distillation column control. For high purity products, the dynamics of the column become highly nonlinear and coupled and th
Identification, Distillation control, Multivariable system, Interactions, Decoupling.
Wavelets by construction are able to show us ``the forest as well as the trees". They are compactly supported functions that allow us to localise in frequency as well as in time whereas traditional Fourier analysis focuses only on frequency. This makes w
Wavelet transforms, Scalograms, Multiresolution analysis, Financial time series analysis.
- The goal of this work is to present a quasilinearization technique designed to find a maximal and minimal solution for a particular nonlinear initial value problem make some remarks about how the technique can be used to study the generalized Verhulst e
Time scales, Hilger derivative, Quasilinearization, Verhulst equation
In this paper we examine the transverse geometry of control-affine systems. We point out the importance of dynamics defined on submanifolds that are transverse to the control distribution. This setting is then used to compare the back-stepping methodology
Geometric control, backstepping, control design, Lyapunov functions
7 465-162
9 465-163
4 465-164
4 465-165
5 465-166
8 465-167
Over-constrained can usually be encountered when some real-life applications are described as Distributed Constraint Satisfaction (DisCSP). When a solution is required in this case, one or more constraints should be released. This paper focuses on the con
CSP, Constraint relaxation, DisCSP, Agent, Influence factor
The purpose of this article is to show that there is a link between imperfections of competition and occurrence of endogenous fluctuations. We consider a two sector model in which a perfectly competitive final good sector uses inputs that are produced in
Cournot competition, Endogenous Fluctuations
The paper presents the optimal control problem of the heat transfer in the steady-regime, using boundary commands, whose positions are known. In this paper we limit our discussion to the case of bounday control of a high-voltage direct-current electrical
Key-Words: - CAD, finite element method; inverse problem; heat transfer; electrical cables.
This paper deals with the heat generated by ohmic losses in High-Voltage (HV) solid imperfect dielectrics. An algorithm is proposed for the solution of coupled electric and heat dissipation problems in solid dielectrics of the HV electric cables A lumped
Keywords - Finite element method; DC cables; Coupled-problems.
While simple pulse excitation of the ultrasound transducer is conventionally used in ultrasound imaging, the coded excitation scheme of the transducer was proposed recently to improve the image quality and penetration depth. In this article, a novel combi
Sonography, Ultrasound imaging, Coded excitation, Matched filter, Chirp, Nonlinear FM signal
In the area of robust intelligent control one of the focus is on controllers development that can maintain good performance even if there exists a poor model of the plant and if there are some plant parameter variations. The aim of this paper is an effici
Robust Intelligent Control, Neural Control, Artificial Neural Networks, Robustness, Stability
7 465-168
465-170
4 465-172
5 465-173
8 465-175
6 465-176
In this contrubition, the problem of identifiability and equalizability of nonlinear channels is addressed. We use the difference algebra approach developed by Fliess, that we have presented in preceding communication, to analyse the question of perfect e
Equalizability, Identifiability, Nonlinear channel, Difference Algebra, Invertibility, Observability.
Correlating event streams or development paths of observed behavior that involves disparate typesof data is a common problem in many applications including biomedical and clinical diagnosis systems. Wepresent a new problem formulation of specifying fe
database queries, dissimilarity measures, prior knowledge
This paper describes a novel low phase-noise CMOS folded-cascode QVCO (quadrature voltage controlled oscillator) design using the TSMC 0.18mm 5M1P CMOS process technology. The startup behavior of the proposed QVCO indicate that, the QVCO is free of
Quadrature VCO, phase noise, CMOS, folded cascode, negative resistance
In this work we extended the classical notion of digital image, in the which each pixel has as degree of intensity an exact value for the interval digital image one, where each pixel possesses an interval intensity that can be seed as an approximate of th
Images Processing, Interval Mathematics, Interval Images Processing and Interval Images
Modeling emotions has attracted much attention in recent years, both in cognitive psychology and design of artificial systems. Far from being a negative factor in decisionmaking, emotions have shown to be a strong faculty for making fast satisfying decisi
Context, Nonlinear Systems, Temporal Difference
A novel approach about an auditory-speech analysis technique is presented in this paper. This analysis is based on an atomic decomposition of speech signal into a family of gammachirp functions. A peripheral auditory model is used to simulate the outer an
Speech Analysis, Gammachirp Spectrogram, Auditory System Model, Masking Properties
4 465-177
4 465-178
6 465-179
5 465-180
5 465-181
7 465-182
Switched Reluctance (SR) drive technology is a serious contender for replacing the existing technologies, because of its technical and economic advantages. If some remaining problems like excessive torque ripple could be resolved through intelligent contr
Genetic Algorithm, SR Motor, Torque Ripple, Speed Control
In this paper, the idea of emotional critic based fuzzy controller is generalized in order to control of nonlinear, MIMO HVAC System. The proposed methodology is composed of a set of neurofuzzy controllers, the weights of which are adapted according to em
Nonlinear Systems, HVAC, Intelligent Controller
This paper presents a new algorithm for robust speech classification in adverse conditions, using an appropriate wavelet packet decomposition of the speech signal. The classification is achieved by generating a Sub-band Crosscorrelation Analysis of differ
Wavelet Packet Expansion, Crosscorrelation Analysis, Voiced / Unvoiced / Silence Classification
This paper proposes a new Maternal and fetal ECG separation method using two pass Pitch Synchronous Wavelet Transform (PSWT). This representation is based on a modeling concept which is able to capture the harmonic behavior the signal by means of basis el
Fetal ECG extraction, Pitch Synchronous Representation, Pitch Synchronous Wavelet transform
With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. To address this needs ISO/IEC JPEG2000 and MPEG-4 VTC image coding standard has been developed. Lossless and lossy compression, prog
Multiresolution techniques, Image coding algorithms.
In this paper a clustering algorithm based on the computation of gravity is described. The gravity supports the modeling of attractors in an artificial world. The classifier is described as an internal observer of the feature space.
Affinity, Gravity, Field, Classifier, Observer
6 465-183
6 465-184
4 465-185
9 465-186
7 465-187
Quality measures play an important role in the field of image processing. Such measures are commonly used to assess the performance of different algorithm that are designed to perform a specific image processing task. In this paper we propose two novel in
Image quality assessment, discrimination information measures, fuzzy cross-entropy
In this work, a development of optimal design of the high level radioactive waste repository using wavelet Galerkin method (WGM) and Genetic Algorithm (GA) hybrid system. WGM is used to solve the system of partial differential equations arising from the m
Optimal design, High level radioactive waste, Wavelet, Genetic Algorithm, Canister-array
Typical data visualization involves graphically displaying selected segments of data and making judgments on the resulting features. Techniques to re-examine, zoom, magnify, multiply, amplify, optimize, and finally focus are being developed for large data
Visualization, Data mining, Data manipulation, Data streams, Rule mining
In the present work Multi-Layered Perceptrons (MLPs), optimized by a modified genetic algorithm (GA) and trained using the Multiple Extended Kalman Algorithm (MEKA), were tested on the prediction of nonlinear timeseries. The modified GA was utilized for
Evolutionary Neural Networks, Genetic Algorithms, Multiple Extended Kalman Algorithm, Magnetoengephalogram, Magnetogardiogram, Lorenz system, timeseries prediction
The objective of the presented work was the development of a software package able to overcome the limitations imposed by the actual Scorbot ER VII robot’s controller. The developed users friendly “winATS” software runs in a windows platform such as 95, 9
Robot, Parallel process, C++, Control, Serial RS232 protocol, Application software.
9 465-188
5 465-189
6 465-190
6 465-191
In this paper, the problems of exponential convergence and the exponential stability of the periodic solution for a general class of non-autonomous competitive-cooperative neural networks are analyzed via the decomposition approach. The idea is to divide
Competitive-cooperative neural networks; Time delay; Trapping region; Exponential convergence; Periodic solution.
This paper studies responses of three-dimensional (3-D) spiking oscillators to pulse-train input. The 3-D spiking oscillator consists of a linear subcircuit and a state-resetting switch. In order to analyze responses of the circuits, we introduce a mapp
Nonautonomous system, Pulse-train, Mapping procedure, Chaos, Bifurcation, Synchronization
Fuzzy control techniques are of interest for practical applications. Hence, it is important to understand their features. In this paper some results of computer-experimental analysis of behavior of a fuzzy controller for the cart-ball variant of inverted
Expert systems, fuzzy logic, fuzzy expert systems, fuzzy controllers, uncertainty, robustness, inverted pendulum, cart-ball system, computer engineering.
This paper describes a ESCA(Error Sharing & Classification Agent running on Multimedia Collaboration Environment). It is a multi-agent based fault-tolerance system with function for an error detection, classification and recovery automatically. It consist
ESCA, a multi-agent based fault-tolerance system, an error detection, an error classification, an error recovery, an error sharing & classification system
6 465-192
7 465-193
6 465-195
6 465-196
6 465-198
- In this paper, we study the effect of the round trip propagation delay on performance measures of WDM networks and adopt a dynamic policy and a synchronous transmission procedure to access data channels. Also we propose a new control architecture for WD
Wavelength Division Multiplexing (WDM), round trip propagation delay, electronic processing bottleneck, Multichannel Control Architecture (MCA).
Since the electronic processing bottleneck that the single control channel architecture introduce is high, we propose a new WDM control architecture, for WDM star-coupled photonic networks, to overcome this problem. Also the proposed network architecture
:-wavelength division multiplexing WDM, Multichannel Control Architecture, receiver, electronic processing bottleneck, queueing model, Markov chain.
Mobile commerce (m-commerce) activities, which make use of wireless transactions to provide personalized and location-based services to users of high-speed mobile devices and mobile networks around the world, are getting more and more popular nowadays. C
Mobile Commerce, Wireless Internet, Application Engineering, J2ME
- In this paper we provide a periodical solution of a Dirichlet problem using the Fast Fourier Transform (FFT). The presented algorithm allows a considerable reduction of the operations number necessary to solve a partial differential equation, which appe
Periodical Solution, Finite Difference Methods, Fast Fourier Transform (FFT), Interpolation Polynomial, Interpolation Error
We establish the existence of at least one nonnegative solution for the problem where a and f satisfy conditions near zero. Here the novelty is that we do not need restrictions on the nonlinearities at infinity. Therefore, we can consider subcritical
Positive solution; Quasilinear problems; Critical problems
5 465-199
6 465-200
6 465-201
5 465-202
5 465-203
5 465-204
Abstract We consider a semilinear problem of the type Lu=f(b,u) in , where f(b,u)bu as u0 and f(b,u)bu as u (b<b). We assume that the essential spectrum of L is bounded below by a number greater than b and that there exist a finite number of eigenvalues
Nonlinearity crossing a finite number of eigenvalues; Linking inequalities; Limit relative category; Schroedinger equation
In this paper, some application of computational intelligence techniques in active networking technology well be presented. Computational intelligent techniques, e.g., neural networks, fuzzy systems, neuro-fuzzy systems, and evolutionary algorithms have b
Active Networks, computational intelligence, fuzzy logic, neural networks.
Active Queue Management (AQM) takes a trade-off between link utilization and delay experienced by data packets. From control point of view, it is rational to regard AQM as a typical regulation system. In this paper, a new fuzzy adaptive second order slidi
Active queue management, robust control, second order sliding mode, fuzzy logic..
Active Queue Management (AQM) takes a trade-off between link utilization and delay experienced by data packets. From control point of view, it is rational to regard AQM as a typical regulation system. In this paper, a new fuzzy adaptive second order slidi
Lead-lag type compensator, all stabilizing parameters, continuous-time systems, linear programming.
In this paper, the problem of stabilizing an open-loop unstable second-order system with time delay is considered. A constant feedback gain is utilized to stabilize the system. Using a modified version of Hermite-Biehler Theorem, which is applicable to qu
Second-order systems, open-loop unstable plants, feedback stabilization, time delay, constant feedback gain.
In this paper, we will use the benefits of fuzzy logic to design a high performance traffic controller of Asynchronous Transfer Mode (ATM). In the proposed fuzzy traffic controller, the actual mean cell rate of traffic source is estimated and the traffic
ATM networks, traffic control, fuzzy control.
4 465-206
7 465-207
7 465-208
4 465-211
9 465-212
When changes occur in complex images that involve minute details, it is usually a daunting task to track the changes that may have occurred between two time periods. We will be presenting a method for identifying these changes through digitizing; anchorin
image visualization, data mining, data manipulation, data streams, rule mining, spatial temporal data mining.
This paper contributes to the analysis and the prediction by the Artificial Neural Networks (ANN), taking into account uncertainty, of the deviated intentional behaviours of the human operators in the Human-machine systems. This type of behaviours is a pa
Artificial neural networks, Prediction, Uncertainty, Human-machine system, Human reliability, Violation, Barrier removal.
This paper presents a method to design conditionally reset linear systems that exhibit chaotic behavior. The proposed systems are constructed from building blocks (e.g. reset integrator, nonlinear controller, summer and gain amplifiers), which can be eith
Chaotic circuits, Chaos, Attractor, Bifurcation, Oscillator
In this paper, an improved implementation of the ChuaΤs circuit is proposed. The new realization consists of only RC elements and op amps. Both computer simulations and laboratory measurements have confirmed the chaotic behavior and show the existence of
ChuaΤs circuit, Chaos, Attractor, Bifurcation, Oscillator
A general contour constrained optimization approach is formulated to extract a target contour in an image for various applications. These different approaches of mean field annealing method, variational method, and evolutionary strategy are derived to pro
Image Segmentation, Deformable Contour Methods, Constrained Optimization
7 465-213
6 465-215
4 465-216
5 465-217
4 465-219
This paper presents a new method for numerical simulation of D - distributions and the corresponding algorithm. For numerical generating of random variable having D Ψ distribution we mixed two random variables, one having gamma distribution and the secon
D - distributions, substitution sampling, acceptance-rejection algorithm, gamma distribution, simulation tehniques
A highly desirable function in image retrieval is that of finding images based on their semantic content, for example their topic or contents. Currently there are two major image retrieval paradigms that attempt to provide this: text-based metadata image
Image Retrieval, Ontology, Similarity, Semantic, Combined Concept Entity, Attributes
This paper describes an instrument that can compose a song using predicates of Ancient Greek Music. It employs the methodology and musical notation of this specific music system and at the same time, it provides a mapping mechanism that depicts the whole
Ancient Greek Music, Music Composers, .NET Framework, Csound
Correlating event streams or development paths of observed behavior that involves disparate types of data is a common problem in many applications including biomedical and clinical diagnosis systems. We present a new formulation of the following dual prob
Database Queries, Dissimilarity Measures, Prior Knowledge
The paper presents the design of nonlinear state feedback controller for a rigid manipulator. In order to obtain such controllers, a partial differential equation, HJB equation, should be solved, which is difficult to find a closed solution of that. In th
Rigid robot manipulator, nonlinear state feedback control, optimal control, HJB equation,Taylor series expansion.
9 465-220
5 465-221
6 465-222
6 465-223
Abstract: To reinforce its western network, which was operated close to its stability limits, Maharashtra Electricity Regulatory Commission, India proposed the static VAR Compensator and Unified Power flow controller. The control in the system includes Au
Keywords: Static VAR Compensentor (SVC), Unified Power flow controllers (UPFC), STATCOM (Static Synchronous Compensators), Eurostag, Hierarchical Fuzzy Control, Double Contingencies, Pattern Recognition, Non linear Oscillation
We present an efficient dataflow modeling of Multilayer Perceptron (MLP) algorithm based on the directed graph concept but with controlled global states. More specifically, we investigate the dataflow implementation of two efficient and widely used MLP tr
Dataflow Modeling, Multilayer Perceptrons, Computer Aided Diagnosis.
A novel approach is presented for approximating real continuous functions of many variables using a two-stage neural network technique. In the first stage, a group of Support Vector Machines (SVMs) is involved in approximating the function based on differ
Robotics, Wavelet Transform, Support Vector Machines
In this paper, three radio architectures named high IF, low IF and direct conversion, for wireless communication transceiver systems are reviewed. Based on the literature results, we propose three new and promising adaptive RF receiver system architecture
RF transceiver system, High IF receiver, Low IF receiver, Direct conversion receiver, Integrated circuits, Wireless communication
7 465-225
6 465-226
We study the nonlinear propagation of electromagnetic wave [EMW] in an isotropic charge-free antiferromagnetic medium by considering the two-sublattice model at low energy configurations. It is found that in the case of isotropic medium the dynamics is go
Nonlinear wave, Integrable system, Soliton, Antiferromagnet, Nonlinear analysis
Abstract: - Image flicker, defined as the unnatural temporal fluctuations in perceived image intensity, is an annoying artifact existing in many old film sequences. For this reason, flicker removal is an integral part in any old film restoration process.
Flicker Parameters Estimation, Roosmalen Method, Repetitive Corrections
Farzin Ahmadianpour, M. Omair Ahmad 451-221
A new fast block matching algorithm for motion estimation is introduced. This algorithm uses a new enhanced motion vector system combined with an effective DC matching technique. The proposed method transforms the expensive 2-D block-matching problem into
M Y Siyal 451-208
Personal identification numbers (PIN), passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce applications. However, these means do not really identify a person, but only knowl
R. Yu, C. C. Ko, S. Rahardja, X. Lin 451-292
This paper introduces a cascaded RLS-LMS predictor for lossless audio coding applications. In this proposed predictor, an LMS predictor with high-order is employed in order to capture the ample tonal and harmonic components of the audio signal for optima
451-307Marco Antonio Busetti de Paula, Denise Curanishi
This article presents the case study as research strategy to be used in the project of optimization of food safety that includes the automated monitoring of the critical control points using Advanced Manufacturing Technology (AMT´s), under the visio
451-276Seedahmed S. Mahmoud, Zahir M. Hussain, and Peter O’shea
In this paper we present a comparative study of two important adaptive algorithms for channel impulse response estimation: the decision directed recursive least square (RLS) and the decision directed least mean square (LMS) algorithms, weighted and unweig
451-265Zhang Zhen, Yang Huazhong, Luo Rong, Wang Hui
Large RC(L) subcircuits generated by automatic parasitic-extraction tools are used as the typical models for interconnect of integrated circuits in recent years. In order to simulate this large-scale subcircuits easily, being an efficient choice, Krylov-
451-228Joonsuk Yu, Jaedeok Lim, Jeongnyeo Kim
Cryptographic file systems are effective way to protect userκψs sensitive data from unauthorized disclosure and most of the cryptographic file systems that have been developed only support data protection based on individual user. However, this approach h
Leong Chee Hoong, Dr Lee Sai Peck 451-315
It is undeniable that report generation is one of the most important tasks in many companies regardless of the size of the company. A good report generation mechanism can increase a companyΤs productivity in terms of effort and time. This is more obvious
Zhongkang Lu, Eam Khwang Teoh 451-169
Model-based lane detection plays an important role on road following of outdoor robots. Literature review shows that almost all the algorithms use explicit lane models, such as circular arcs or B-Spline curves on a flat ground plane. In this paper, a free
451-279Wen-Ching Chang, Chun-Hung Lien, Yu-Chung Wei
This paper describes a fully integrated CMOS phase-locked loop (PLL) with a transconductance-C (Gm-C) filter. This PLL is used in consumer implemented in the 0.5 Ήm CMOS technology without the need of any external component. The resulting layout area and
Junyi Shen, Hui Liu, Qinke Peng 451-176
This paper presents a grid architecture for E-Service. It comprises nine semantic components: port, probe, adapter, action, activity, workflow, E-Service, constraint and trigger, which form four different integration levels while each level could handle t
451-314Seong yong Lim, Sung hei Kim, Kyu ho Lee
Modeling and Simulation methodology permits analytic and mathematic performance estimation. Recent switched router systems have been more complicated and functional, and so performance estimation is more difficult. This paper shows application capability
Shibnath Mukherjee 451-126
With the rapid emergence of mobile commerce, numerous issues challenging its development have come to the highlight over the past few years. Two major ones are first ,handling long lived transactions while preserving database consistency and concurrency d
451-242
Hamid Ebrahimzad, Hamidreza Amindavar, Jahangir Dadkhah Cheymeh, Mohsen Khansari
This paper presents a new approach for multi-user detection in code division multiple access (CDMA). Proposed detector is an adaptive nonlinear parallel interference cancellation scheme that uses a nonlinear function (hyperbolic tangent) as decision devic
Kahlouche Souhila, Achour Karim 451-101
This paper presents a new approach to image segmentation using genetic algorithm (GA) in conjunction with morphological operations. The proposed method consists to classify each pixel of the image in pixels belonging either to the object or to the backgro
Yongtae Do 451-317
In this paper, a new design of neural network is proposed for camera calibration. Unlike most existing methods, where camera parameters are determined so that the projection from 3D points to their corresponding image points is as accurate as possible, th
M Y Siyal 451-204
- In recent years an upsurge in the business-to-business electronic commerce has been observed. The popularity of electronic commerce among the masses is still not what it was expected and the fall of DOT.COMs has made it even worst. Whereas business-to-b
M Y Siyal 451-207
Real-time qualitative road traffic data analysis is the cornerstone for any modern transport system. So far, most of the analysis is done manually and the use of image processing techniques for qualitative analysis is at its early stage. In this paper we
451-277Wen-Ching Chang, Chun-Hung Lien and Tung-Chi He
This paper describes a novel technique to increase the operating range of Delay-Locked Loop (DLL) with Frequency Selection Block (FSB). A FSB is attached to a conventional DLL and the frequency of input reference signal would be detected by FSB to select
451-182Yumnam Kirani Singh & Swapan Kumar Parui
Proposed here is a generalized transform entitled ISITRA for signal decomposition and reconstruction. Its decomposition scheme is a single input multi-output transform like 2- channel filter bank. The existing perfect reconstruction theory of 2-channel fi
Hui Liu,Qinke Peng,Junyi Shen 451-117
This paper proposes a six-layers reference model for E-Commerce, including infrastructures, science techniques, elementary services, business strategies, business modes and society environment layer. Main classifications and some concrete entities in each
Kiyotoshi Matsuoka, Satoshi Nakashima 451-236
Conventional algorithms for blind source separation do not necessarily work well for real-world data. One of the reasons is that, in actual applications, the mixing matrix is often almost singular at some part of frequency range and it can cause a certai
Sen Wang, Yang Sheng Wang 451-109
A critical step in automatic fingerprint identification is to automatically and reliably decide which part of the fingerprint image belongs to the foreground, the noisy area, and the background. In this paper, we define the background as an area except fo
451-143Yan-Ping Wang, Zne-Jung Lee, and Shun-Feng Su
In this paper, a robust fuzzy credit assignment CMAC (FCA-CMAC) is proposed to speed up the learning ability and to increase the robust capability of CMAC. The FCA-CMAC is to combine the fuzzy logic concept and credit assignment ideas to provide fast and
X. K. Yang, X. Lin, W. S. Lin 451-191
A new mesh generation algorithm is proposed for mesh-based video coding. The still segmentation result of watershed segmentation is projected onto motion segmentation result of change region detection in proposed algorithm. Therefore, mesh presentation ge
Vincent K. S. Ong and Poh Chin Phua 451-308
A new method of reconstructing the distribution of the charge collection probability (CCP) from the measured collection efficiency data is proposed. Direct reconstruction of the CCP from the measured collection efficiency profile is usually performed by
J.Roushanian,F.Nadjafi 451-157
A simplified approach for the design of an efficient alternative to adaptive flight control system based on combination of invariance theory and high gain feedback has been developed. The derivation of the algorithm is presented. The application of this m
451-298Mi-Ryong Park, Joo-Myung Seok, Kyou-ho Lee
This paper presents a SIP(Session Initiation Protocol) load balancer to make an enlargement performance of call processing at enterprise networks. We believe that currently Internet, SIP is a trend of VoIP(Voice over IP) service and will be better deploye
Inge Koch and Belinda Faddy 451-231
The Zhu and Yuille region competition is considered for image segmentation. The algorithm has successfully been applied in simulations and real applications. Based on their ideas, we address a number of issues not covered in their treatment. In particular
451-128Seedahmed S. Mahmoud, Zahir M. HussainN, and Peter O'Shea
In this paper, we present a geometrical and time-variant wireless vector channel model with hyperbolically distributed scatterers for a macrocell mobile environment. This model is based on the assumption that the distances between mobile and local scatter
451-309C.W. Chan , C.S. Thian, K.V. Ling, X.M. Zhang, H. Cai and A.Q. Liu
A digital control system was implemented to operate the microelectromechanical (MEMS) variable optical attenuator (VOA) using two photodetectors, two couplers, an analogue to digital converter (ADC) and a digital to analogue converter (DAC). A 1550 nm las
Jan herman Verpoorten 451-142
Interaction is an essential hallmark of education. Therefore widgets are relevant in educational software. This article describes a taxonomy that is capable of describing a possibly infinite widget collection in a finite way by drawing a distinction betwe
M Y Siyal 451-206
Various researchers for a number of years have investigated traffic data collection and analysis. Many techniques have been proposed to speed up the operations and some intelligent approaches have been developed to compensate the effects of lighting, shad
Rohanin Ahmad, Mohd Ismail Abd Aziz 451-249
The Dynamic Integrated Systems Optimization And Parameter Estimation (DISOPE) algorithm is an algorithm for solving nonlinear optimal control problems and is of the gradient descent type. One of the major setbacks to this type of algorithms is the slow ra
Rohanin Ahmad, Mohd Ismail Abd Aziz 451-248
The Dynamic Integrated Systems Optimization And Parameter Estimation (DISOPE) algorithm is an algorithm for solving nonlinear optimal control problems and is of the gradient descent type. One of the major setbacks to this type of algorithms is the slow ra
451-201Pan Feng, Z. G. Li, K. P. Lim, D. J. Wu, R. S. Yu, G. N. Feng
Realtime video coding over handheld devices needs to meet the rigorous limitation of the available computational capacity, and to make the things worse, the computation power allocated to the encoding process varies dramatically from time to time as the C
451-316Ebrahim Karami, Jahangir Dadkhah Chimeh, Mohsen Khansari
The central theme of this paper is to demonstrate how a neural network can be incorporated into an antenna array for adaptive beamforming. Specifically, the problem considered involves a single desired signal arriving at the array simultaneously with an u
Patrick Keleher Russel Stonier 451-199
We extend the adaptive model reference treatment of an articulated two link manipulator described by Slotine [1] by incorporating state constraints. We incorporate constraints upon the physical movement of link 1, analogous to a shoulder-elbow assembly, b
451-212Fredric Lindstrom, Mattias Dahl, Ingvar Claesson
Abstract: - This report proposes a new method for obtaining satisfying "full-duplex feeling" in hands-free communication units at low computational cost. The proposed method uses a combination of an acoustic echo cancellation unit and an adaptive gain uni
B. Barkat and M.Y.Siyal 451-290
In this paper, we consider the analysis of frequency modulated (FM) signals corrupted by heavy-tailed additive noise. Here, we use time-frequency analysis for such signals. However, for a good performance we need a pre-processing of the noisy signal. This
Bijan Shoushtarian, Helmut E. Bez 451-156
Many approaches for background subtraction have been proposed in recent years. In this paper, three new real-time dynamic background generation techniques called ΥSelective update using temporal averagingΦ, ΥSelective update using an exponentially weighte
451-218Fredric Lindstrom, Mattias Dahl, Ingvar Claesson
Abstract: - This paper proposes a new Least Mean Square (LMS) based algorithm aimed for acoustic echo cancellation. The algorithm is an elaboration of an existing algorithm developed for the Konftel 200 conference phone. The purpose of the algorithm is to
Kingliana Loeis, Endra Joelianto 451-311
This paper deals with the application in control of boiler using Signal Interpreted Petri Net (SIPN), which is an extension of the ordinary Petri Net (PN) with interaction between input and output signals. For automation purposes, this control system sees
Babak Badrzadeh,S.M.Shahrtash 451-122
Partial discharges are caused by various defects such as voids, shield protrusions, contaminants, advanced stages of water tree, etc and known the main cause of breakdown in insulation materials. Partial discharge (PD) location is a powerful and useful to
451-287
Abstract: - In this paper, we apply a new approach, called optimal fuzzy control based on linear TS type fuzzy model, to deal with nonlinear magnetic bearing systems. The linear TS type fuzzy model is used to represent the nonlinear plant. To obtain the l
Bo Meng,Qianxing Xiong,Xinming Tan 451-282
In electronic commerce protocols, atomicity and accountability are very important properties. Atomicity consists of money atomicity, goods atomicity and certified delivery, while accountability consists of money accountability and goods accountability. If
451-220Zdenek Kolka, Dalibor Biolek, Viera Biolkova
The paper deals with an enhanced method for matrix-based approximate symbolic analysis. The method assures the validity of approximated expressions over a certain interval of network parameters by means of the sensitivity analysis. A computationally effec
451-181Mikael Soini, Reino Aarinen, Lauri Sydϊnheimo, Markku Kivikoski
In this paper, a shop2box system is presented in which a customer can order over the Internet grocery that is delivered to a receiving box leased by the customer in his or her neighborhood. The aim of this paper is to focus on a Bluetooth application desi
shurong li,zte corporation 451-167
Based on frequency domain measurements in the 2.4GHz band, an autoregressive (AR) model for the frequency response of the indoor radio channel is introduced. A comparison is made between the statistical characteristics of the empirical data and of the cha
Radu Mutihac, Marc M. Van Hulle 451-288
Image entropy as prior in Bayesian inference was applied to the restoration of X-ray digital images with additive zero mean Gaussian distributed noise. An iterative algorithm based on a conjugate gradient method with numerical evaluation of partial deriva
Soufyane Abdelaziz 451-102
We study the uniform stabilizability of a Timoshenko beam by one control force. We prove that under, one locally distributed damping, the exponential stability for this system is assured if and only if the wave speeds are the same.
So-hee Park, Jae-hoon Nah 451-219
IPsec has now become a standard information security technology throughout the Internet society. It provides a well-defined architecture which takes into account confidentiality, authentication, integrity, secure key exchange and protection mechanism agai
451-224
Balasundram MANIAM, Claudia S. DAVIS, Gurinderjit B. MEHTA, Sanjay S. MEHTA
This article describes two approaches to selling, the “brick and mortar” type of retailing and the E-tailing marketing approach on the Internet. The growth of the new companies on the Internet has newcomers and established companies rushing t
451-285alireza babaei, ebrahim karami, mohsen khansari
As you know in IS95 cellular system, in contrast with 3rd generation CDMA-based cellular systems, the only coding scheme is (3,1,8) convolutional code in reverse link, and (2,1,8) convolutional code in forward link, both with constraint length equal to 9.
Michael Cowling, Renate Sitte 451-217
This paper is the continuation of previously published work in which we have been analysing different methods Ψ traditionally used in speech recognition Ψ for their suitability to be applied to Environmental Sound Recognition. While current research devot
M. Fikret Ercan, Yu-Fai Fung 451-203
Streaming SIMD Extensions (SSE) is a unique feature embedded in the Pentium III and Pentium IV classes of microprocessors. By fully exploiting SSE, parallel algorithms can be implemented on a standard personal computer and a significant speedup can be ach
451-121Ashish Panda, Thambipillai Srikanthan, Saurav Bhattacharyya
Abstract:- Speaker Verification is a memory and compute intensive process, giving rise to area and latency concerns in the way of its System-On-a-Chip implementation. The training schemes for computing the speaker models contribute significantly to the ov
QingTang Liu 451-239
The paper discusses the construction of the virtual learning environment in E-learning with streaming media, and explores the strategies of building interactive environment. Some ways that is suitable for web-based interactive environment have been develo
Chidentree Treesatayapun 451-103
This paper presents a parallel adaptive networks controller which is implemented by our Fuzzy Input Adaptive Network (FIAN). The FIAN is easy to be set initial parameters and structure by the human sense. All FIAN parameters can be adjusted by gradient de
Lewis Asiedu,Oppong Harison Steward 451-259
We report on the design and status of an implementation of a high speed distributed data storage system which will meet the data collection and access requirements of Fermilab experiments for the next collider run. Enstore's architecture is based on the D
451-170Y. Liu, T. P. Chen, M.S.Tse, P.H.Ho, T.B. Chong, D. Gui, J. H. Hsieh
In this paper, we report an approach to determine the depth profiles of Si nanocrytals fraction distributed in SiO2 films based on spectroscopic ellipsometry (SE). In the SE analysis, a Si implanted SiO2 film is divided into m sub-layers with equal thickn
Huijong Yu, Hyungon Kim 451-202
AAA protocol is a framework that provides AAA (Authentication, Authorization and Accounting) function on multiple network and platforms. Diameter is the newest AAA protocol that can displace RADIUS which has been used as AAA protocol. There are some Diame
Ashoka Jayawardena Chris Radford 451-262
We look at the design of oversampled filter banks and the resulting framelets. The undecimated wavelet transform is known for its shift invariant properties and has applications in areas such as denoising. The framelets we will design, will have improved
451-153Yang-seo Choi, Byong-cheol Choi, Dong-ho Kang, Seung-wan Han, Dong-il Seo
Recently the number of Internet user has very sharply increased, and the number of intrusion has also increased very much. Because of that, security products are developed and adopted to prevent systems and networks from hacking and intrusion. But even if
Yao Susu 451-196
The theory and design of optimal uniform orthonormal filter banks has been investigated for a long time. It has been proven that the theoretic coding gain of a uniform paraunitary analysis/synthesis filter bank system is maximized if and only if the filte
Bo Meng,Qianxing Xiong,Xinming Tan 451-272
With the development of applications of XML and the publication of XML schema recommendation by W3C, XML+XMLschema-based EDIFACT is becoming a good solution to the electronic commerce applications. Now a lot of large-scale enterprises want to make the tra
B. Barkat, M.Y.Siyal and J. Yingtuo 451-291
In this paper, we consider the detection of a known frequency modulated signal corrupted by known heavy-tailed additive noise. Two different techniques will be presented. The first one is based on the Neyman-Pearson theorem and the second technique is bas
Heung-gyoon Ryu 451-273
PLL(phase locked loop) frequency synthesizer takes a long switching time because of the inherent closed-loop structure. The digital hybrid PLL(DH-PLL) which involves the open loop structure in the conventional PLL synthesizer has been studied to overcome
J÷rg Velten, Marco Krips, Anton Kummert 451-136
Industrial safety devices are an interesting field of application for video surveillance and image processing. Complex production processes often can not be protected sufficiently by usual light row based safety devices. In the present paper, a fully vide
Mahmoud El-khouly, Iman Badr 451-124
- This paper introduces a novel hybrid algorithm that combines, Genetic Algorithms (GA) with the Naïve Bayesian Classifier (NBC) to be employed in a Web filtering agent. The GA-NBC searches for a near optimal Bayesian profile using the power of GA. A
L. Dong, W. Lin*, P. Xue 451-245
Abstract: - This study aims at identifying effects of different coding artifacts towards video quality in various situations, via comprehensive analysis of VQEG test results. It confirms that an individual coding artifact factor (e.g., blockiness or edge
L. Dong, W. Lin*, P. Xue 451-244
Abstract: - This study aims at identifying effects of different coding artifacts towards video quality in various situations, via comprehensive analysis of VQEG test results. It confirms that an individual coding artifact factor (e.g., blockiness or edge
451-296Ahmad Sharifinejad and Hassan Mehrpour
Today’s trend in multimedia is towards providing real time voice and video services over a diverse range of channels without compromising their quality. As the network switching capability has dramatically increased over the last decade, the concent
451-294B. Visvesvara Rao, K. R. Rajeswari, Satyam Bheemarasetti
Abstract: - This paper addresses the paramount importance of addressing the requirements of all departments in the government, other related organizations and individuals ‘together’ and defines a coordinated ‘integrated’ approach t
Dr. Li Lue 451-264
E-Government: Behind the High Tech LI, Lue Abstract E-Government can be simply defined as delivering government services in the digital world. It has only a few years history but has already become reality from a dim vision. Someone believes that E-Govern
Masoud Aliakbargolkar 451-263
Electric power quality is an aspect of power engineering that has been with us since the inception of power systems; however, topics in power quality have risen to the forefront since the advent of high power semiconductor switches and networking of trans
451-129
Abstract: The Internet is an extremely important new technology, and its revolution is bigger than any one realized. This paper is based on a survey of 467 companies that use Internet or have their own domain name and/or web site. This paper discusses ab
451-198Hing-Yan Lee, Khee-Erng Lau, Chun-Keat Wong
After we examine the pros and cons of e-surveys for e-marketing and e-government purposes, we argue why it remains an incomplete solution from the practical angle and propose a multi-mode approach to conducting surveys, even as the Internet becomes ever m
451-303Luigi Di Stefano, Stefano Mattoccia, Giovanni Neri, Daniele Piccinini
This paper addresses the problem of noise-generated, spurious temporal variations of disparity measurements produced by real-time dense stereo matching algorithms. To deal with this problem, we propose a filtering technique based on the exploitation of su
Dalibor Biolek, Viera Biolkova 451-147
On the basis of the well-known modified nodal analysis, universal matrices-stamps are defined for modeling more types of current conveyors. From these stamps, modified Mason-CoatesΣ graphs are derived for fast analysis of circuits with current conveyors C
451-250Tetsuo Hattori, Hiroyuki Kitajima and Toshinori Yamasaki
An automated feature extraction and evaluation method of feeling information from printed and handwritten characters is proposed. This method is based on image processing and pattern recognition techniques. First, an input binarized pattern is transformed
Magdy Saeb, Sherif Hegazy 451-127
In this work, we present an approach for fingerprint identification based on the Finite Element Technique (FIFE). The basic notion behind this approach is to generate a feature matrix of the fingerprint employing the standard Galerkin weighted residual me
Tetsuya Hirotomi and Nikolay N. Mirenkov 451-185
F-Mail communication system to support e-mail like communication of users with disabilities is presented. This system is a part of a more general multimedia communication environment based on self-explanatory component and multiple interface concepts. In
451-210B. Fong, P. B. Rapajic, G. Y. Hong, and A. C. M. Fong
High-speed multimedia data transmission is vulnerable to burst errors primarily due to its frame structure. Forward error correction (FEC) codes mitigate the effects of multipath fading as some form of time diversity by adding redundancies into the trans
451-211B. Fong, P. B. Rapajic, G. Y. Hong, and A. C. M. Fong
High-speed multimedia data transmission is vulnerable to burst errors primarily due to its frame structure. Forward error correction (FEC) codes mitigate the effects of multipath fading as some form of time diversity by adding redundancies into the trans
Gerhard. H. Schildt 451-133
After an introduction to safety terms fundamental principles for safety relevant system design for electronics are presented. These design principles comprise: fail-safe design, watch dog function, dynamization of signals, qiescient current principle, mon
451-151
Chaned Wichasilp, Vasutan Tunbunheng, Watcharachai Wiriyasuttiwong, Kajornsak Kantapanit
A Fuzzy c-Means Clustering designed FLC (fuzzy logic controller) is presented in this paper and applied to air-conditioning system. In the design procedure, the auto-tuning PID controller was used to operate the plant of air-conditioning system and the pl
451-154N. Nagarajan Ling Keck Voon Tan Soon Hie
:- Stereo imaging is an important application of remote sensing from satellites. This is achieved by tilting the camera in the cross track direction on different days. Another strategy, is to use a pair of cameras in the along track direction with approp
Timo Mantere, Jarmo T. Alander 451-281
In this paper we evaluate the potentials of using co-evolutionary optimization method to automatically generate both halftoning filters and their test images. The genetic algorithm generates halftone filters and at the same time, tries to create the harde
Hamza A. Ali and Mikdam Al-Salami 451-180
This paper presents an approach to cryptanalysis of RSA cryptosystem based on the application of genetic algorithm. The search utilizes the idea of timing attack as computation time information may leak due to different modular operations throughout the R
Li-Der Chou, Chich Feng Lai 451-241
Wireless personal communication systems grow very fast, and the Code Division Multiple Access (CDMA) system has become the key technology for multiple accesses in the third generation communication systems. Unlike conventional FDMA and TDMA systems, the c
Hai Jin, Li Guo, Zongfen Han 451-312
This paper presents a novel architecture of a single system image built on cluster system, named Glosim. This system orientates to cluster system middleware, which provides global system image support. It not only supports global IPC objects including mes
451-155Peiqing Xia, Keck Voon Ling, N. Nagarajan
This paper presents the theory and simulation results of a GPS-based Azimuth/Gradient determination instrument for a land vehicle, using two GPS receivers to realize interferometry. Our purpose is to design a system, which is both robust and accurate. A s
451-240Naresh Sarwabhotla, Saurabh Kumar Sahu, Rangarajan.P
This paper deals with simulation of a Serial Least Mean Square (SLMS) adaptive filter algorithm for echo cancellation of speech-band data transmission with higher computational speed. A regular dial-up telephone network has been chosen for this applicatio
451-104Hariram Subramanian , Dr.Narayanan Srinivasan
A new technique is presented that will substantially improve equalization and noise cancellation, problems in communication systems. The system designed in more robust for worst channel deformalities and fading conditions. Our simulation results and syste
Endra Joelianto 451-310
Hybrid systems have emerged as a rapidly expanding field for modeling and analyzing systems which have a mixture of continuous and discrete valued state variables. The modeling framework of hybrid systems has received considerable attention over the past
451-106Rupak Venugopal, Deep S. Kolhatkar, Dr. S. S. Mantha
Abstract: This paper is an effort on our part to develop a method that enables a robot to reach the target from the starting point in the most optimum manner, avoiding all the obstacles (both static and moving) that come in it's way. In the process of doi
451-267MAJED AL-MASHARI* AND YOSOUF AL-OHALI
Electronic commerce is emerging as the new Internet business model. In electronic commerce, most net traffic is multimedia-based, which means that there is a real need for an efficient hybrid multimedia compression technique that improves the communicatio
451-304
KUGAN VIVEKANANDARAJAH, THAMBIPILLAI SRIKANTHAN, SAURAV BHATTACHARYA, PRASANNA VENKATESH KANNAN
Abstract: - A filter cache is proposed at a higher level than the L1 (main) cache in the memory hierarchy and is much smaller. The typical size of filter cache is of the order of 512 Bytes. Prediction algorithms popularly based upon the Next Fetch Predi
Marco Krips, J?rg Velten, Anton Kummert 451-172
Colour is an important feature for object classification in digital video images, where shape-based techniques are not practicable. This can be the case if real-time processing has to be applied to situations where many candidate shapes can occur. However
Amol Dabholkar, Yow Kin Choong 451-232
We propose a mobile agent based information retrieval system for wireless personal area networks. A shopping complex scenario is used to demonstrate the proof of concept. We study a number of ways in which mobile agents can be used to retrieve information
K.A. Hawick and H.A. James 451-302
Management Information Systems (MIS) and associated commercial products are now an important part of both enterprise and smaller scale businesses. MIS products are available for premium prices, but do not always meet business's expectations particularly
451-254
This paper suggests that the immune network algorithm based on fuzzy set can effectively be used in tuning of a PID controller for multivariable process or nonlinear process. The artificial immune network always has a new parallel decentralized processing
S. S. Ge, H. F. Wang and L. Y. Li 451-261
This paper presents the design of a safe, friendly, and living autonomous Interactive Robotic Usher (IRU). IRU is able to run independently to achieve specific commands, intelligently interact with humans and environments, move safely and avoid obstacles
451-238Antonio Pescape', Stefano Russo, Vincenzo Vecchio, Giorgio Ventre
Distance Learning has largely benefited from the incredible progress that internetworking technologies have made in the last years. Simulation applications are nowadays used within distance learning processes, in combination - and sometimes in substitutio
R. Yu, C. C. Ko, S. Rahardja, X. Lin 451-247
This paper introduces a cascaded RLS-LMS predictor for predictive lossless audio coding applications. In this proposed predictor, a LMS predictor with large order is employed in order to capture the ample tonal and harmonic components of the audio signal
marie kim, hyungon kim 451-216
The Diameter-Based AAA (Authentication, Authorization and Accounting) System manages transport connection using two finite state machines, which are Peer State Machine defined in Diameter Base Protocol [1] and Failover State Machine defined in AAA Transpo
451-260Akiva Vexler, Igor Polyanskyand RaphaelGorodetsky
Abstract: The mechanical properties of the skin are known to be age, sex and race dependent and reflect different physiological skin conditions as well as skin disorders. Therefore, monitoring alteration in the mechanical properties of the skin may help t
R.W. Jones, A. Lowe, M.T. Tham 451-222
The utility of alarm systems currently used in the operating room is not high. They have low specificity and do not help the anaesthetist in assessing patient threatening situations. For these reasons, there is a continuing interest in developing intellig
451-111
Valeriy Alekseevich Udaloy, Nikolay Mihailovich Ivanov, Nikolay Leonidovich Sokolov, Vladimir Urievich Pazdnikov
There are various Mission Control Centers (MCC) in many countries. But analysis of the existing literature proves absence of general idea of MCC structure optimization although optimal structure of MCC could allow to increase profitability of mission cont
Ken Hawick and Heath James 451-297
Mobile commerce is an exciting and very recent addition to modern business enterprise. M-commerce allows levels of sales and management interaction at unprecedented new turn-around times. The technologies for M-commerce are still in their infancy. While n
Rachid Benlamri 451-313
This paper describes a new model-based approach to recognize occluded curved objects from single range images. Image segmentation is based on surface curvature detection. Object representation is expressed in terms of an edge-junction graph and a surface-
W. L. Lee, Angus Wu 451-300
Iterative decoding of Low Density Parity Check (LDPC) codes using the Parity Likelihood Ratio (PLR) algorithm have been proved to be more efficient compared to conventional Sum Product Algorithm (SPA). However, the nature of PLR algorithm tends to put nu
451-160
A multi-channel auto-gain controllable receiver module for a 40Mbit/s LED based non-directed infrared wireless link is implemented using photodiode array followed by multi-channel transimpedance-summer architecture, band-pass filter, AGC, with EM shieldin
451-319Shinya Matsufuji, Yoshihiro Tanada, Aki Fujimoto, Naoki Suehiro
A perfect sequence, whose out-of-phase periodic auto- correlation function takes zero, can be successfully applied for communications and signal processings. This paper makes clear the construction of a multi-dimensional perfect sequence, which is genera
Emanuel Diamant 451-125
Inspired by the analogy between computer-based visual systems and their biological counterparts, we propose to take advantage of some concepts borrowed from the field of biological vision and not recognized yet in today’s engineering systems. What w
A. G Deshpande Dr. T. R. Sontakke 451-115
ABSTRACT This paper presents computerized analysis of wounds(injuries) in which different edge detection techniques are used. Their performance evaluation is done . Parameters for performance evaluation are Edge Detection Error Ratio (EDER).
451-120Ms. Anjali Deshpande, Dr. T. R. Sontakke, Ms. M. S. Joshi
ABSTRACT This paper presents computerized analysis of wounds(injuries) in which different edge detection techniques are used like Sobel, Prewit, Robert , Laplacian. Their performance evaluation is done. Parameters for performance evaluation are E
Sangseung Kang 451-227
E-commerce systems, which support information security functions, should have cryptographic functions for information in order to storage and communicate securely, including management of cryptographic keys and recovery of lost keys. In this paper, we pre
Bello Hassan Onimisi 451-271
Abstract: The had been over the years a lot hues generated by the menace of malaria attack, especially in Africa. Many conferences have been held and countless papers have been published on the matter. But little or no resultant effect had been felt. This
451-230Pradeep Koodali Edathil, John Lim, Ng Irwan Gunawan, M. Fikret Ercan
In this study, we deal with a mobile robotΤs navigation in an unknown but static terrain. The terrain model, two dimensional and populated by obstacles, is not known a priori, but robot is equipped with a number of proximity sensors and the navigation pat
451-171Y. Liu, T. P. Chen, M.S. Tse, P.F. Ho, A.L.K. Tan and Y.C.Liu
A quantitative approach to determination of depth profiles of optical properties of Si-implanted SiO2 films based on spectroscopic ellipsometry (SE) is presented. From the SE measurements, the depth profiles of the complex refractive index of SiO2 films
Tawiah Junior Akwasi,Randolph Adade 451-258
Remote sensing has played an increasing role in the routine monitoring of oil pollution and in support of the operational response to major oil pollution incidents. This study develops the technique of optical measurement for the detection of oil in the M
Russel Stonier Mike Drumm Jason Bell 451-243
In this paper we examine the application of hierarchical fuzzy control and evolutionary algorithms to find closed-loop control solutions of the optimal control problem arising from semi-discretisation of a linear parabolic tracking problem with boundary
Adeel Abbas, Shoab Khan 451-119
As a result of enormous competition in the system-on-chip industry, the current trends of system level design flows focus on the use of automated tools construction and verification, behavioral modeling and code generation. This paper presents a design me
451-183Maryam Mizani, Abdolreza Nabavi, Mohsen Nabipour
Turbo codes have become part of the third generation W-CDMA systems because of their extraordinary coding performance. However, decoder implementation in commercial systems suffers from power, latency and complexity limitations. Here, we address new optim
Xue LI,Yikang Yang,Yongxuan Huang 451-233
The IIR filter design under the mixed-criterion of H2 norm and ∞ norm is proposed in this paper, and genetic algorithms(GA) is introduced to realize the filter design based on such criterion. By this approach, the disadvantage of other conventional
Monehiro Doi, Tsuyoshi Yamamoto 451-283
In this paper, we introduce a new panoramic movie system that can capture and play 360 degree viewing angle. The system captures surround movie by using four wide-angle video cameras, and then the video streams are encoded as a single stream of common vi
Dong Hwa Kim 451-252
Abstract – In this paper auto-tuning scheme of PID controller based on the reference model has been studied by immune algorithm for a process. Up to this time, many sophisticated tuning algorithms have been tried in order to improve the PID controll
Dong Hwa Kim 451-251
Abstract – In this paper auto-tuning scheme of PID controller based on the reference model has been studied by immune algorithm for a process. Up to this time, many sophisticated tuning algorithms have been tried in order to improve the PID controll
451-253
Abstract – In this paper auto-tuning scheme of PID controller based on the reference model has been studied by immune algorithm for a process. Up to this time, many sophisticated tuning algorithms have been tried in order to improve the PID controll
451-113
Valeriy Alekseevich Udaloy, Nikolay Mihailovich Ivanov, Nikolay Leonidovich Sokolov, Vladimir Urievich Pazdnikov
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Centre and Modeling (MCC-M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of Eart
451-112
Valeriy Alekseevich Udaloy, Nikolay Mihailovich Ivanov, Nikolay Leonidovich Sokolov, Vladimir Urievich Pazdnikov
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Centre and Modeling (MCC-M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of Eart
A.N. Gaikwad ,N.B.Pasalkar. 451-318
Fingerprint is the most vital & unique biometric feature used for personal identification. The manual fingerprint verification is tedious, time consuming & incapable of meeting the increasing performance requirements of today’s e-commerce & other a
A.N.Gaikwad N.B.Pasalkar 451-150
Fingerprint is the most vital & unique biometric feature used for personal identification. The manual fingerprint verification is tedious, time consuming & incapable of meeting the increasing performance requirements of today’s e-commerce & other a
451-140
This paper presents a method to determine an accurate position by using a low cost GPS receiver and proposes a fuzzy system for better accuracy in GPS positioning. At first the fixed position parameters, such as DOP (Dilution of Precision) and SNR (Signal
451-158Mukesh A. Zaveri,Uday B. Desai,S.N. Merchant
A wavelet based technique for multiple point targets detection in InfraRed image sequences in presence of clutter is proposed. Most existing approaches assume target of several pixels size or of Gaussian shape with variance of 1.5 pixel. We develop de
451-226Rogerio Nascimento, Joaquim Martins, Joaquim Pinto
Our main goal is the interrelation amongst the new metadata paradigm - the XML family - and the Workflow Process Automation, and its integration and interaction with database legacy systems. We intend to answer two fundamental subjects: the granularity o
Jianfeng Chen 451-148
In this paper the power conversion efficiency of airborne parametric array is studied and an explicit expression of the relationship between the power conversion efficiency and the primary wave power, primary wave frequency, and secondary frequency is ded
Zhengmao Ye 451-144
Automotive powertrain system consists of several interactive and coupled nonlinear systems. This research focuses on the coordination of Gasoline Direct Injection (GDI) engine, transmission and emission aftertreatment systems. The goal is to design an opt
451-141
This paper presents a method to determine an accurate position by using a low cost GPS receiver and proposes a adaptive neural network for better accuracy in GPS positioning. At first, we introduce the GPS system errors. Then measuring the errors of posit
451-135Magdy Saeb, Meer Hamza, Ashraf Soliman
Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symp
Yao Susu 451-194
In this paper, we propose an effective post-processing algorithm with low computational complexity for removing coding artifacts that severely degrade visual quality of the decompressed images. The proposed method is based on a fuzzy model and recursive f
451-278Haiwei Sun, Yappeng Tan and Yongqing Liang
Video downsizing transcoding is a common technique for adapting the bitrate or spatial/temporal resolution of a compressed video to suit different transmission bandwidths or receiving devices. In arbitrary downsizing video transcoding, although the transc
451-268Haiwei Sun, Yappeng Tan and Yongqing Liang
In arbitrary downsizing video transcoding,although the transcoder can adjust the size of a pre-coded video to meet the requirements of different transmission channels or receiving devices, there is however no model to illustrate the relation between bitra
451-293Jiri Nemecek, Viera Biolkova, Otakar Wilfert, Dalibor Biolek
The article presents some problems of optical wireless link (OWL) reliability. The influence of atmosphere on OWL reliability is explained. There are link models from which it is possible to determine a dependability of characteristics. A summary of basic
SONG anjun 451-235
-The paper analyze the characteristic of Parallel Computing Model of BSP and NOWS, Research on Parallel Computing Model of BSP in the NOWS fit Environment. Indicate: some algorithm that designed rationalization parallel computing, acquire an approximately
H.K.Mammi, Dr.M.O.Tokhi 451-274
As E-activities begin to acquire a more sure footing in today’s society, more and more groups, organizations and individuals are contributing to determining its safety and security. But safety and security of any scale will not endure the test of ti
Chih-min Lin Chun-fei Hsu 451-269
In this study, a robust adaptive fuzzy control (RAFC) system is proposed. The RAFC system is comprised of a computation controller and a robust controller. The computation controller containing a neural-network-estimator is the principal controller and th
kai yu, chang-an zhao 451-114
This paper is concerned with the problem of robust output tracking of single-input and single-output nonlinear systems with partially known uncertainties. Based on Lyapunov method and input/output linearization approach for nonlinear state feedback synthe
Altug Iftar 451-116
Robust tracking and disturbance rejection problem, which is commonly referred as the robust servomechanism problem, is considered for linear hybrid systems. The necessary and sufficient conditions for the existence of a solution to this problem are presen
N.G. Shankar and Z.W. Zhong 451-237
Abstract A template-based vision system for the 100% inspection of wafer die surfaces has been developed. Design goals included a requirement for the detection of flaws as small as two thousandths of an inch on parts up to 8-inch wafer size. Each die is
451-186Sakina I K Zabuawala, Avinash A Ravichandran, Narayanan Srinivasan
AR modeling is commonly used in modeling various signals. The sample size of the signals used for AR modeling as well as AR order is typically chosen based on prior knowledge or experience with those signals. In this paper we estimate the optimal AR order
S. Impedovo, R.Modugno, L. Sarcinella 451-299
The advent of the world wide web (www) and hypertext transfer protocol (http) has greatly changed the use of Internet. It has been, and probably will remain for several years, one of the fastest and easiest ways to share documents and exchange information
Jooyoung Lee, Kiyoung Moon 451-229
Companies across the world are turning to mobile commerce because mobility brings competitive advantages through personal contact, resource flexitbility and streamlined processes enabling comapanies to enhance revenue generation. Therefore success in the
451-130Su-hyung jo, Jeong-nyeo kim, Sung-won sohn
Electronic business is rapidly popularized and extended through Internet. Internet has many security weaknesses, so we need the security solution such Intrusion Detection System that minimizes the damage of hacking and responds the intrusion dynamically.
Lihui Zhou,Peng Li,Hairong Sun 451-295
With regard to nonlinear plants in process control, generalized predictive control strategy based on neural-network is analyzed. To ease real-time applications, a simplified algorithm is presented with an adaptive tuning coefficient and non-derivative opt
Radu Mutihac, Marc M. Van Hulle 451-289
Our contribution highlights the statistical properties and biological interpretation of the basis vectors (filters) that result from applying topographic independent component analysis (ICA) to feature extraction from patches of natural images. The consis
Jan Pieter Khilburg, Moshtaq Ahmed 451-107
Electronic governance offers an opportunity for governments to re-invent themselves, get closer to the citizenry and forge closer alliances and partnerships with diverse communities of interest, practice expertise, conviction and inter-dependence within t
Jan Pieter Khilburg, Moshtaq Ahmed 451-108
Electronic governance offers an opportunity for governments to re-invent themselves, get closer to the citizenry and forge closer alliances and partnerships with diverse communities of interest, practice expertise, conviction and inter-dependence within t
J. Huang, T. P. Chen, and M. S. Tse 451-159
Abstract: In this work, gate dielectric degradation under dynamic Fowler-Nordheim (FN) stress is studied. A novel interface characterization technique, direct-current current-voltage (DCIV) technique, is used to measure the interface trap generation cause
B.Sheela Rani, S.Renganathan 451-255
This paper describes a Genetic Algorithm based approach to classify textures at multiple scales using Wavelet Transform. If textures have no significant dominant frequency channel such as random texture or where multiple textures have similar dominant fre
451-256Hyun-ik Shin,Joong-soo Lim,Sang-Kyu Kim,Jae-Jun Kim,Whan-woo Kim
In modern radar systems, digital pulse compressor (DPC) is becoming more common with the development of digital signal processor (DSP). The DPC is implemented using finite impulse response (FIR) filter algorithm in time domain or fast Fourier transform (F
H.K. Lee, J.H. Nah and S.W. Sohn 451-301
Generally, mobile device must be light and small to make it more portable. So, mobile devices may have fewer resources and less computational power. When we design protocols for mobile communication environments, we should minimize the computational amoun
Omair A. Rahman 451-134
Those in the world of Automation and Control, and especially those like me that are at the stepping stones get baffled by the number and the type of controllers available; getting even more astounding if you add the constellation of communication componen
451-223
Tony Chan, Frank T. M. Chen, Jersen Chen, Philip Chuang, Jenq-Neng Hwang, Qiang Liu, Yen-Hao Tseng, Robert Wang
The Multimedia Messaging Center, which consists of a Web Application and a Meeting Server, is an innovative solution that illustrates both versatility and flexibility for wide area network based interactive multipoint/multimedia distance collaboration and
451-193Limin Liu, Shiping Wang and Hongxing Zhao
The automatic controls of some industrial processes have not been completed because it is difficult to find their amenable mathematical models or the mathematical models are too complicated to be used. The Intelligent Fuzzy Control makes it be possible to
451-152Shiwei Ma, Tetsuya Sasaki, Etsuji Yoshihisa and Takashi Honda
In nondestructive material evaluation technique, ultrasonic echoes exhibit critical time and frequency information. A time-frequency distribution can provide an effective tool to obtain frequency dependent ultrasonic characteristics related to certain mat
451-131Soyoung Doo, JeongNyeo Kim, EunBae Kong,
Authentication is an important issue in E-Commerce. This paper describes a method of providing a trusted path between a user and a system using an access control processing technique. The method of providing a trusted path between a user and a system incl
Minh H. Le and Ranjith Liyana-Pathirana 451-213
Wavelets are being utilized in various communications applications either as an alternative to short time Fourier transform for spectral analysis of non-stationary data or as a new tool to bridge between time domain and frequency domain analysis. A wavele
X. K. Yang, X. Lin, W. S. Lin, Z. G. Li 451-189
In this paper, we present a novel unequal loss protection (ULP) algorithm for robustly transporting data-partitioned MPEG-4 video over the packet erasure networks. To minimize the overall distortion in a frame, a redundancy-distortion optimization scheme
Jiayi Chen,Tele Tan, Philippe Mulhem 451-168
We present in this paper a system for image indexing and retrieval through speech annotation made directly on a digital camera. The annotations are based on a pre-defined structured syntax and transcribed by an automatic speech recognition engine. N-best
Frank T.M.Chen,Pd.D. , Alvin Y. L. Goh 451-195
A task is core when its outcome directly affects the competitive advantage of the company in its targeted markets. In any given category of business, one company's core may well be another company's context. Outsourcing the context and enhancing the core
EePing Ong 451-197
In this paper, a video object segmentation algorithm with robust reference frame generation has been proposed. This algorithm uses a robust approach for obtaining a reference background frame in order to improve the results of change detection and also s
451-192Yao Susu; Lin Weisi; Lu Zhongkang; Ong Eeping
In this paper, a new method for perceptual video quality evaluation is proposed. The method is based on multi-feature of visual perception and various coding artifacts. A radial basis function neural network is used to give discrimination. The proposed me
L. Dong, W. Lin*, P. Xue 451-246
The study aims at identifying effects of different coding artifacts towards video quality in various situations, via comprehensive analysis of VQEG test results. It confirms that each coding artifact factor (e.g., blockiness or edge damage) may play diffe
451-123Ji Hu, Michael Schmitt,Christoph Meinel,Mingyu Wu
Leveraging the Internet, e-commerce marketplace, including business-to-consumer (B2C) and business-to-business (B2B) online trades, booms greatly in recent years. For small or medium-size enterprises which hope to operate online shops, it is difficult an
Chanjoo Chung, Yong Lee, Jai-il Lee 451-225
Recently, the number of Korea wireless mobile terminal users surpassed the thirty million mark. This drastic increase in wireless data communication necessitates a component called security. As a solution for security in the wireless environment, wireless
452-230Matija Marolt, Alenka Kavcic, Marko Privosnik, Sasa Divjak
- This paper presents our recent work in developing a system for transcription of polyphonic piano music. Our goal is to build a system that would automatically transcribe polyphonic piano music from the audio signal, discovering notes, their onsets and o
452-198Mourad Elloumi, Mondher Maddouri and Fawzi Mhamdi
Biological sequences, i.e., DNA, RNA and proteins, are coded by strings called primary structures. During the last decades, the number and the complexity of these primary structures is growing exponentially. Analyzing this huge volume of data to extract p
452-171Sachin B. Patkar, Viraj Kumar, Hardeep Kaur, Bijit Hore
{\em Abstract: -} We describe here a graph partitioning system that aims at producing naturally unbalanced multiway partitions of a large graph. This system makes use of ideas of 2-phase FM (coarsening,partitioning,refinement), multilevel refinement and
452-199Soosun Cho, Heesook Shin, Dongwoo Lee, Dongwon Han, and Chijung Hwang
The ubiquity of the Internet has brought about an increasing amount of multi-formatted Web documents. If images in a Web document can be classiffied by which have particular information or not, then it would be very useful for analysis and multi-formattin
Sophia A. Maggelakis 452-196
A mathematical model, which describes the control of the development and growth of a healing unit, is presented. The replacement of epidermal injured tissue, which is controlled by a negative feedback mechanism, is modeled in one-dimensional geometry. T
Yalcin Cekic, Aydin Akan, Mahmut Ozturk 452-223
In this work, we present a multiple window Evolutionary Spectral analysis on a non-rectangular time-frequency lattice based on a discrete fractional Gabor expansion. The traditional Gabor expansion uses a fixed, and rectangular time-frequency plane tiling
452-218Mohamed Hariti, Yassine Ruichek, Abderrafiaa Koukam
Passive stereo vision is a well known approach for recovering 3D information from two or more video images. The key task is the so-called correspondence problem. It consists of identifying features in the left and right images that are projections of the
M. Halimi,A. Kaddai,M. Bengherabi 452-143
Abstract: - This paper proposes a new multistage technique of algebraic codebook in CELP coders called Trellis Search inspired from the Trellis Coded Quantization (TCQ). This search technique is implemented into the fixed codebook of the standard G.729
452-130Ltaief Majda, Ben Abdennour Ridha, Abderrahim Kamel, Ksouri Mekki
Abstract: - In this paper we suggest a strategy for the systematic determination of a base of models for the representation of the uncertain discrete linear systems. This strategy is based on a numerical data classification approach and it is divided into
Sen Wang, Yang Sheng Wang 452-167
Fingerprint image segmentation is one of the most important steps in automatic fingerprint identification, and it heavily influences the performance of fingerprint identification system. Minutiae are local discontinuities in the fingerprint pattern which
452-103Adeel Abbas, Affan Ahmed, Waheed Uz Zaman Bajwa
In this paper, we describe an efficient and flexible generation scavenging garbage collector toolkit. Our methodology exceeds in systems where the cost associated with any single operation is bounded by small time constant. The collector maintains several
Cailian Miao, Yangsheng Wang 452-111
The model adaptation scheme PMC plays an important role in robust speech recognition. However, There are still some open problems in the PMC: how to get the model of convolutive noise, how to work efficiently in low SNR, etc. In this paper, the innovation
Ying Xiao Winfried Just 452-193
The formation of fruiting bodies by myxobacteria colonies involves altruistic suicide by many individual bacteria and is thus vulnerable to exploitation by cheating mutants. We report results of simulations that show how in a structured environment with
Chyun-Shin Cheng,Shiuan-Sz Wang 452-210
Facing the development of microarray technology, clustering is currently a leading technique to gene expression data analysis. In this paper, we propose a novel algorithm called repulsive clustering, which is developed for the use of gene expression data
452-164Nikolaos C. Kourogenis, Alexandros Benos
In this paper we study the dependencies between bid or ask orders and realized stock transactions. The stock price is considered as a moment where the maximum bid price and the minimum ask price coincide. Using information from the order book of the Frenc
452-182Jani Nurminen, Ari Heikkinen, and Jukka Saarinen
In parametric speech coding, the accuracy of parameter quantization has a significant effect on speech quality. In this paper, we present a flexible and high-fidelity multi-mode quantization approach that combines the beneficial features of predictive vec
Harry Santoso, Pandu Poluan 452-142
Conformance Testing is based on Abstract Test Suites (ATSs) and Protocol Implementation Conformance Statement (PICS) proformas. Standardized ATSs are usually written in the Tree and Tabular Combined Notation (TTCN). However, TTCN has some serious limitati
452-209
Array Management Database (AMANDA) is a relational database designed and developed as a tool for the management and storage of data obtained from microarray experiments. The data base it is also a laboratory information management system as it is able to
452-115Radu Tunaru Ephraim Clark Howard Viney
In this paper we develop a contingent claims framework for determining the financial value of professional football players. The football players are seen as real assets and this methodology can be used in the football industry, insurance industry and the
M.A.Azadpour, T.S.Kalkur 452-150
- Due to decreasing device sizes and increasing clock speed, the interconnect delay is the dominant factor in clock skew. This delay has been extracted as RC component in available EDA tools. In this paper, we model the interconnect as RLC for systems run
452-180Alberto Bonastre, Juan V. Capella, Rafael Ors
A distributed expert system has been proposed for the smart house control. Its configuration is mainly based on the use of distributed nodes connected by means of a CAN network. This kind of systems permit the implementation of highly flexible control sys
452-124Fernando Ferreira, Nuno Pereira, Pedro Cravo
In the last fifteen years, the automatic payment in Portugal has showed periods of very strong growth. In fact, the present Portuguese banking net system has a capacity of more than 90.600 point-of-sale machines, where it is allowed to buy and pay any ser
Vladimir Ryabov, Vagan Terziyan 452-166
Temporal representation and reasoning has been implemented so far to many areas including medical applications. Mining and identification of temporal patterns plays an important role in medical diagnostics. Temporal scenarios of different diseases, therap
J. Orozco-Garcia, Carlos A. Reyes-Garcia 452-157
This work presents the development of an automatic recognition system of infant cry, with the objective to classify two types of cry: hunger and pain. In this study, we used acoustic characteristic obtained by means of the Linear Prediction and Intensity
Stanislava Labatova and Dusan Berek 452-122
Assessment of Role of Exclusion and Partition in HPLC of Macromolecules by Computer Processing of Experimental Data. Stanislava Labátová, Institute of Informatics, Slovak Academy of Sciences, 842 37 Bratislava, Slovakia, and Dušan Berek, Laborato
Simon Wiest, Andreas Zell 452-213
Content-based information retrieval is becoming increasingly important for audio document collections. We present a segmentation algorithm for discreetly sampled music documents that employs similarities in the frequency domain between small time slices.
452-254Salvatore Pennacchio, Francesco Maria Raimondi
Electronic commerce business to business using mobile agents is one of the most important future promise and also one good result of global mobility code. As we will show later, classic commerce model and electronic commerce model both introduce advantage
Vagan Terziyan, Oleksandra Vitko 452-159
The problem of profiling and filtering the Web content is important particularly for the mobile applications where wireless network traffic and mobile terminal size are limited comparing to the Internet access from the PC. Dealing with uncertainty when so
452-170Sachin B. Patkar,Ravi Gautam,V. Goel,P. Srivastav
Generating a Surface of a desired shape as a single patch is computationally complicated and inefficient. We need to use simple small patches approximating small portions of the given/probable surface. For generating the surface as a patchwork
Stanislava Labatova 452-125
Abstract. Software agents are automating many tasks that used to be done by people. As agents begin to address more complex domains of human life, they will need to develop an understanding of dominance hierarchies that people understand intuitively. Tur
Jari Turunen, Pekka Loula, Juha T. Tanttu 452-225
In this paper we present an adaptive Block Oriented Model (BOM) realization for speech coding. The proposed structure has nonlinear feedback property and speech frame based coefficient identification that can be utilized in speech coding.
452-244Emmanuel Dellandrea, Pascal Makris, Nicole Vincent, Michele Boiron
We present in this paper a comparison of audio signal codings that we have developed in order to study xiphoidal sounds. These sounds are produced by the lower oesophageal sphincter whose dysfonctionnement can be responsible for the gastro-eosophageal ref
452-178Hatsuo Hayashi, Motoharu Yoshida, and Satoru Ishizuka
Evidence for chaos in the brain has been provided using CA3 slices of the rat hippocampus. It has also been reported that a CA3 network model developed on the basis of physiological knowledge reproduces complex activity including chaos. Complex CA3 activi
Ross Clement 452-127
Computer models show that sympatric speciation is possible given a simple and intuitive set of assumptions. Hard evidence suggests that sympatric speciation is at most a rare occurrence. Previous models assume unrealistic small overlaps between feeding ni
Luis Gracia Josep Tornero 452-148
In this paper, we have highlighted the importance of the wheeled mobile robot (WMR) model for designing control strategies. In this sense, the differential model has been used as reference model in order to design the control algorithm. After the control
Stanislav Milanovic 452-175
Many mobile operators around the world will implement 3G systems over the next few years and will gain a competitive advantage in the marketplace as a result. The question will be whether the operators can move to 3G economically, with a cost base that su
Nikolai Buzikashvili 452-158
The effectiveness of metasearch data fusion procedures crucially depends on properties of common documents distributions. Because we know neither how different search engines assign relevance scores nor the similarity of these assigments, common documents
Marcos Simões 452-250
The purpose of this work is to present a methodology for the decision fuzzy making in applications on the industry productive chain. The decision fuzzy process is divided in two levels. In the first one, a formal net is held responsible for the transition
Elisabeth J. Umble, Michael Umble 452-161
Abstract: - The classical definitions of producer’s and consumer’s risks assume fixed values of the proportion defective. Graves and Ringuest suggest that these risks should instead be defined to allow proportion defective to be a random variable [4]. T
452-203Lamberto Tronchin Valerio Tarabusi Paola Ricciardi
Sound quality is a relevant key factor in the restoration of theatres. Italian theatres, especially Opera Houses, are usually characterized by a typical horse-shoe shape. In this paper, an innovative technology has been carried out, in order to predict an
452-212Ulrich Reiter, Oliver Baum, Helge Drumm, Michael Schuldt
This paper deals with an important aspect of user immersion in interactive virtual environments. Problems with virtual objects located between sound sources and listener in virtual scenes are discussed. Three different methods of detecting sound source ob
Anna Madatova 452-118
The majority of Russian enterprises has been using the cost-based pricing till now. Obviously there are modern ways, that are more efficient because knowing buyer’s needs you will sell more. But it is not right practice to move from cost-based practice to
452-252
G. Lambert Torres, L.E. Borges da Silva, A.R. Aoki, C.H.V. Moraes, B.R. Costa and J.A. Barbosa
This paper presents the developments made in the Technological Development and Research Program from Brasilia Energy Company (CEB) in the same subject of this paper. This project has set up a set of procedures that were introduced into computer packages,
452-228Joaquim A. Martins, Hélder T. Zagalo, Joaquim S. Pinto
We are building a set of middleware Web Services to support a digital library, offering improved scalability, reliability and interoperability. This paper describes one module of this overall middleware related with the conception and implementation of a
D.a.Linkens,C.h.Ting.A.Angel 452-242
The whole question of consciousness,awareness and depth of anaesthesia is both timely,little understood and deeply challenging.Models of the underlying neural pathway mechanisms/dynamics are necessary for understanding the interactions involved and their
452-174Benedetto Ballarò, Piergiorgio Reas, DomenicoTegolo
The retrieval of information in a standard database can be obtained in different way and in some cases a lot of steps occur to extract the searched information. More difficult exist when we are looking for a pictorial information in a database. This paper
452-201radhika sharma, ulrich neumann, choon-woo kim
: In this study we report the results of automatic emotion recognition experiment performed on spontaneous emotional utterances from movie sequences for three emotions: anger, happiness and sorrow. Bayesian classifier and radial basis function networks t
452-172
Abdullah M. S. Alkahtani, M. E. Woodward, K. Al-Begain and Abdullah Alghannam
In this paper, we propose two algorithms. The first supports Enhanced Best effort Quality of service Routing with Multiple and Prioritised Metrics (EBQRMPM). The second supports Enhanced Best effort Quality of service Routing with Multiple Metrics (EBQRMM
452-194Logandran Balavijendran, Cheong Soon Nyean, Azhar Kassim Mustapha
One of the most common things we use the Internet for is to read the news. But there is so much news catering for so many people, that it often gets confusing and difficult to read what you want to read about. This system uses an Intelligent Agent to gues
452-247Monica Dascalu, Eduard Franti, Goschin Sergiu
The paper presents a traffic simulator intended to be used in Bucharest, Romania, in order to solve usual traffic problems and obtain better traffic management performances with the same basic route network. The simulator makes short time traffic predi
452-249M. S. Escudero, L. M. Bergasa, E. López, R. Barea
This paper proposes the application of Genetic Learning as a procedure for the optimal design and training of neuro-fuzzy systems. Once this learning procedure has been implemented, hybridization between Genetic Algorithms (GA) and the traditional local s
452-248L. M. Bergasa, R. Barea, E. López, M. Escudero, J. I. Pinedo
In this paper we describe a real time facial features tracker applied to the detection of some basic drowsiness behaviours in drivers, with a colour camera. It uses stochastic colour segmentation to robustly track a person’s skin and some facial features
Kimmo Kaario, Rauno Veijola 452-144
Need for deterministic performance and network redundancy have been the most challenging issues to be solved before getting Ethernet as the base for process control networks. This paper introduces Fault-Tolerant Ethernet (FTE), a protocol that makes it po
452-208Mamun Bin Ibne Reaz, Mohd. Shahiman Sulaiman
In this paper, we present the FPGA realization of fuzzy based subway train braking system on Altera FLEX10K device to provide an accurate and increased speed of convergence of the network. The fuzzy based subway train braking system is comprised of fuzzif
Regina Lanzillotti , Haydee Lanzillotti 452-162
The objective at this paper was to delineate a diagnosis system that translates the interactive effect of the calcium and of the ascorbic acid intake on nonheme-iron absorption from a meal. It was used the fuzzy arithmetic mean, an extension of the arithm
452-241Tibor Tari, Sándor Könczöl, László T. Kóczy, Antal Penninger
Abstract - The application of fuzzy control methods in systems with highly non-linear dynamics has proved successful in many areas. Fuzzy control can be found in lots of consumer electronics devices and especially in the field of air conditioning and heat
452-185Leopoldo Armesto, Juan Carlos Torres Josep Tornero
This paper deals with the general problem of designing hardware architectures for mobile robots. In particular, four different architectures of mobile robots have been studied. An architecture for an industrial forklift, used in the automation of manageme
Umberto Iemma, Francesco Cecconi 452-188
The aim of this paper is to present a recently developed methodology for the prediction of the harmonic response of arbitrarily shaped pipes of musical interest. The accurate prediction of the input and radiation spectra of the resonating air-column repr
452-211Heesook Shin, Soosun Cho, Dongwoo Lee, Pyeongsoo Mah
We propose a new HTML page transcoding technique for hand-held devices connected to the wireless Internet in order to give successful display of original web pages designed for desktop computers in wired network. Our approach is based on the observation t
Ross Barnard 452-104
'Free will' and its corollary, the concept of individual responsibility are keystones of the justice system. This paper shows that if we accept a physics that disallows time reversal, the concept of 'free will' is undermined by an integrated criminal j
Elhalwagy Y. Z., Tarbouchi M. 452-108
This paper presents the application of hybrid direct adaptive fuzzy control techniques to a missile autopilot design. The proposed control structure is to augment existing conventional controller with a fuzzy model reference learning controller (FMRLC). T
T.Newe,T.Coffey 452-214
Hybrid cryptographic security protocols find applications in many areas of communications, none more demanding than in the mobile security sector. In recent years a number of hybrid cryptographic security protocols have been proposed for use with 3G mobil
William Berthomiere 452-102
With the migratory awakening of the Soviet Jewish population shortly after the events of 1989, Yitshak Shamir, the then Prime Minister of Israel, affirmed that "a great immigration requires a large Israel". This declaration has underlined the permanence o
452-192Francisco Rodriguez, Jose C. Campelo, Juan J. Serrano
Control flow monitoring using a watchdog processor is a well-known technique to increase the dependability of a microprocessor system. Most approaches embed reference signatures for the watchdog processor into the processor instruction stream creating not
452-107O.Djekoune , K. Achour, M. Halimi and S. Kahlouche.
Hough transform is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. Its advantage is the ability to detect discontinuous patterns in noisy images, but it requires a large amount of computing power. This
Winfried Just Fang Zhu 452-121
The War of Attrition model of John Maynard Smith predicts a single, mixed evolutionarily stable strategy (ESS) for animal contests which are settled by conventional displays with no assessment of the opponent's fighting ability. We test the predictions o
Angelo Farina 452-109
In the design of concert hall and opera houses, many acoustical parameters should be xonsidered in order to properly calculate sound propagation in audience area. Diffusion, scattering, sound insulation should be considered, as well as the correct charact
Mahmut Ozturk, Aydin Akan 452-149
We present a method for estimating the instantaneous frequency of a signal. This method involves the calculation of a time-frequency energy density of the signal, then obtaining an instantaneous frequency estimate from this joint density. Time-frequency e
Mohammad Badri, Firouzeh Danafar 452-221
The paper describes some important aspects of the application of intelligent agent technology to bioinformatics domains. The adoption of an agent-oriented approach to developing software systems in bioinformatics are discussed: the characteristics of bioi
452-253
G. Lambert Torres, L.E. Borges da Silva, A.R. Aoki, C.H.V. Moraes, B.R. Costa and J.A. Barbosa
This article presents the developments made on Technology Development and Research Program from The Brasilia Power Company (CEB) in the same title of this paper. This project has developed an automatic analysis methodology and a computer package, aiming
Stanislav Milanovic 452-226
Most operators will aggressively deploy Third Generation networks (3G) on their markets focusing on Wireless Multimedia and Mobile Internet. This will result from regulatory demands or from being in a very competitive market where quick 3G rollout is seen
452-220Mahmut Yalcin, Aydin Akan, Mahmut Ozturk
We present a multi-window method for obtaining the time-frequency spectrum of non-stationary signals such as speech and music. This method is based on optimal combination of evolutionary spectra that are calculated by using multi-window Gabor expansion. T
M. Halimi,A. Kaddai,M. Bengherabi 452-179
In this paper, a low delay 16 kb/s wideband speech coder with a buffering delay of 1.25 ms is introduced. This coder is basically inspired from the G.728 LD-CELP standard for narrowband speech signals. Our main goal is to reduce the implementation complex
A. E. Mahdi and J. Zeller 452-216
This paper describes a computer-based system for visualisation of the human vocal tract shapes during vowel articulation. Based on the assumption that the speech production process is an autoregressive (AR) model, the system estimates the vocal tract shap
A. E. Mahdi and J. Zeller 452-217
This paper describes a computer-based system for visualisation of the human vocal tract shapes during vowel articulation. Based on the assumption that the speech production process is an autoregressive (AR) model, the system estimates the vocal tract shap
ivica ico bukvic 452-136
With the technological advancements in computer technology, the making of the real-time computer-aided interactive music has become a reality. However, due to lack of comprehensive software, such form of artistic expression still proves to be a daunting t
Ernst R Egelid, Catharina Candolin 452-189
452-63
Providing security services to the society is a difficult task. The main problems stem from the fact that predicting the occurence of possible threats has become more difficult and the threats are no longer one-dimensional, i.e. purely military. Thus, dif
Mohamad R. Khaldi 452-176
In large-scale power systems, generating plants provide energy to consumers through exceedingly flexible and dynamic networks. The delivered electrical energy is maintained in high quality and the voltage profile is kept within acceptable limits by the ut
452-204S.V. Nedea, J.J. Lukkien, A.P.J. Jansen, P.A.J. Hilbers
We study the opportunities for parallelism for the simulation of surface reactions. We introduce the concept of a partition and we give new simulation methods based on Cellular Automaton using partitions. We elaborate on the advantages and disadvantages o
452-181
Julia Ponomarenko, Galina Orlova, Tatyana Merkulova, Elena Gorshkova, Gennady Vasiliev, Oleg Fokin, Anatoly Frolov, Vadim Valuev, Mikhail Ponomarenko
Since Human Genome is sequenced, the Genome Annotation (i.e., the computer-based predictions addressed to the experimental identifications for the protein-coding and regulatory gene regions), becomes a challenge of bioinformatics. With this in mind, we ha
452-183
Julia Ponomarenko, Galina Orlova, Tatyana Merkulova, Elena Gorshkova, Gennady Vasiliev, Oleg Fokin, Anatoly Frolov, Vadim Valuev, Mikhail Ponomarenko
Since Human Genome is sequenced, the Genome Annotation (i.e., the computer-based predictions addressed to the experimental identifications for the protein-coding and regulatory gene regions), becomes a challenge of bioinformatics. With this in mind, we ha
452-137Nikolaos C. Kourogenis, Alexandros Benos
In this paper we study the dependencies between bid or ask orders and realized stock transactions. The stock price is considered as a moment where the maximum bid price and the minimum ask price coincide. Using information from the order book of the Frenc
John Guardiola and Antonia Vecchio 452-202
Mathematical models of viral dynamics are useful for describing viral progression upon infection and viral decline after drug treatment. HIV-1 models including intracellular delays and pharmacological delays appear to be a more accurate representation of
Andreas Savakis 452-195
Rendering document images for scanning and printing applications typically involves binarization via adaptive thresholding, halftoning, or color dropout. While bitonal rendering is often adequate, there are cases where multi-level rendering is required t
452-239Muhammad Suzuri Hitam, Suresh Gobee and Khairanum Subari
In this paper, we extend the method introduced by Bowles and Peláez (1995) for the risk ranking in Failure Mode and Effect Analysis (FMEA). This method is called as multi-ranking method allows combination of both the quantitative method (numeric ranking a
452-169Emilia Gómez, Fabien Gouyon, Perfecto Herrera, Xavier Amatriain
The aim of this paper is to review and discuss possible ways of describing the content of musical files in the context of a specific software application (a tool for content-based management and edition of samples and short audio phrases). Available or fe
452-153C.S. Zhou, E. Allaria, F.T. Arecchi, S. Boccaletti, R. Meucci and J. Kurths
We present numerical and experimental evidence of noise-induced synchronization (NIS) and coherence resonance (CR) in homoclinic chaos. These two constructive effects of noise are realized in one experimental laser system, and for weak noise intensities t
452-229Michele Barbi,Santi Chillemi,Angelo Di Garbo,Piero Amodio,Sara Montagnese
Abstract: - The electroencephalogram (EEG) is frequently altered in cirrhotic patients. We therefore undertook a study aiming at ascertaining the features and the prognosis of cirrhotic subjects followed up during the time course of their illness. The stu
452-177Jong-min lee, dae-jin kim, in-young kim, sun i. Kim
The purpose of this paper is to compare the characteristics of EEGs, which typically exhibit non-stationarity and long-range correlations, by calculating its scaling exponents in between sleep apnea and the normal conditions. Detrended fluctuation analysi
Nadjim Mehdi HORRI , Stephen Hodgart 452-231
Failure of mechanical controllers onboard a satellite is a well known phenomenon that has already been disastrous for several space missions. In the case studied here, we take as an example the mini-satellite UoSat-12 built by SSTL at University of Surrey
C.N. Rautenberg and C.E. D’Attellis 452-120
An HIV-1 model involving the dynamics of HIV-1 and CD4 and CD8 lymphocytes in human blood is considered. A feedback control derived from the geometric nonlinear control theory, and a discrete-time version of that control is analyzed. Results obtained in c
452-200Ms. A.G. Deshpande, Dr. T. R. Sontakke, Ms. M.S. Joshi
ABSTRACT This paper presents computerized analysis of wounds(injuries) in which different edge detection techniques are used like Sobel, Prewit, Robert , Laplacian. Their performance evaluation is done. Parameters for performance evaluation are
452-205M. S. El-Mahallawy, W. Fakhr and N. Hamdy
A single-channel speech enhancement technique using a combination of “Wiener filtering” and spectral subtraction in the wavelet domain is proposed and evaluated. In particular, the technique was compared to several other common enhancement methods such a
M. Esteban-Bravo and J. M. Vidal-Sanz 452-154
The aim of this paper is to describe the wavelets-projection methods for computing dynamic equilibria in macroeconomic models. Wavelets are families of orthogonal basis functions with special properties, particularly useful for solving functional systems
Diana Rubio, Maria Ines Troparevsky 452-128
The Forward Problem in EEG consists on finding the scalp potential due to current sources within the brain. Electrical activity in the brain is governed by the laws of electromagnetics. Thus, to solve the problem, Maxwell Equations must be solved in a vol
Dulce Magalhães de Sá 452-131
Operational risk in banking and finance has been worrying international supervision organizations. This can be partially explained by the fact that the significant losses that occurred recently do not fit into other types of financial risks for which seve
J. Smieja, A. Swierniak 452-255
- The paper is concerned with development of optimal chemotherapy protocols which take into account both action of several drugs and the evolution of drug resistance. First, a biological background is given. Subsequently, the developed technique is presen
D. Picovici and A. E. Mahdi 452-215
This paper proposes a new output-based method for assessing speech quality and evaluates its performance. The measure is based on comparing the output speech to an artificial reference signal representing the closest match from an appropriately formulated
452-191A. Martí Campoy, A. Perles, S. Sáez, J.V. Busquets-Mataix
The unpredictable behavior of conventional caches presents several problems when used in real-time multitask systems. It is difficult to know its effects in the Worst Case Execution Time and it introduces additional delays when different tasks compete for
452-135Yoshiaki Tadokoro,Takeo Morita,Michiru Yamaguchi
- This paper proposes a simple pitch detection method using the parallel connected comb filters. We can know the pitches of a musical sound by detecting the smaller outputs in twelve comb filters connected in parallel. Each comb filter has zero points cor
452-129Michiru Yamaguchi and Yoshiaki Tadokoro
A new pitch estimation method for song sounds using twelve comb filters and singular value decomposition (SVD) processing is presented. This method is based on the ability of a comb filter, corresponding to one tone, to eliminate the tone's pitch and harm
Simoni Luciano 452-147
The musical creation is examined and compared with an engineering project. The two works proceed in a similar manner, starting from an idea that gives rise to a project and finally to the completed work. The composer’s path is thus similar to that of any
Mohamad R. Khaldi 452-236
- Power systems are spread over a large area of land, and their operation constantly undergoes changes due to components’ governing physical laws, operational mishaps, or natural disasters. Consequently, power systems can be classified as spatial, tempora
Eric Graubins, David Grossman 452-138
The application of KDD (Knowledge Discovery in Databases) techniques to the analysis of stock market data has been validated as an effective method for the identification of high performing stocks. Using a database of firm fundamental information for the
452-126S.Gigola, F.Ortiz, C.D’Attellis, S.Kochen, W.Silva
Records of brain electrical activity from intracranial EEG are analyzed to predict the epileptic seizure onset. We present a method based on the evolution of the accumulated energy, but using wavelet analysis. This mathematical tool allows to analyze the
A.I. Ledesma and C.E. D'Attellis 452-117
The concentration of circulating blood elements shows a remarkable temporal variability. In this paper the hematocrit time evolution is analyzed as a stochastic process. Several methods for estimating the parameters of the stochastic model are compared. A
Antony Brown, Carsten Maple 452-184
There has been a lot of interest in applying modelling techniques cancer statistics for a variety of analytical reasons. Haukulinen and Dyba [4] have applied linear, log-linear and non-linear regression to the problem of predicting incidence rates. In thi
Roland Billen Eliseo Clementini 452-165
Among Geographic Information Systems functionality is the retrieval of spatial data by using various spatial operators. The proposal of this paper is about the definition of new spatial operators that are based on projective and affine geometric invariant
452-132S. Bespamyatnikh, H. Edelsbrunner, J. Rudolph
Protein-protein interactions are essential to all cellular processes. Given the recent increase in protein structural information, mostly of monomeric proteins, the need to understand protein-protein interactions from a computational approach is increasi
Li Zhang, William Edmondson 452-173
This paper presents an account of the use of syllable structure as the basis for a novel approach to speech recognition. This contrasts with the serial organization of more conventional phonetic segments, and their use in speech recognition systems. It
Kimmo Kaario Timo Hämäläinen 452-237
Internet has opened traditional process control networks. In most of the cases, system maintenance people can do their work by using Virtual Private Networks (VPN) and other securing mechanisms, and the production process can be observed via web browsers
Jacek Plodzien, Kazimierz Subieta 452-151
The paper presents the general framework of a special object-oriented query language which incorporates the concept of dynamic object roles. A number of questions both for the language and its data model (the so-called stack-based approach) are covered, a
452-139Vassilia Pashaloudi Konstantinos Margaritis
Sign languages are the basic means of communication between hearing impaired people. The work presented in this paper continues our previous work, aiming at developing a system that could recognize and translate isolated and continuous Greek Sign Language
Mojtaba Valinetaj,Bahjat Forouzandeh 452-222
There is an increasing demand for the low-cost and high-efficient speech coders used in personal multimedia communications and Voice over IP applications. In this paper we present the general aspects of ITU-T recommendation G.729 8 kb/s CS-ACELP coding sc
Abdullah Gani, N.Abouzakhar, G.Manson 452-134
This paper presents an intelligent User Manager Agent System (UMAS) that has a capability of controlling users’ requests for accessing network resources. In performing the tasks, UMAS requires several sets of training data for decision-making process in w
K.Y. Foo, P. R. Atkins, T. Collins 452-123
Synthetic aperture techniques have been of interest to the sonar imaging community, but suffer from the problems of maintaining phase coherence and a slow mapping rate. The need for rigorous and accurate platform trajectory monitoring often increases the
M. Flissi 452-160
In this paper, an algorithm is proposed for Harmonic/stochastic decomposition of the signal for synthesis speech. This Algorithm is based on representation the periodic portion (Voicing, pitched ) of speech by a sinusoidal model and the stochastic portion
452-251H. SAYOUD, S. OUAMOUR and M. BOUDRAA
Abstract: - Speaker indexing can broadly be divided into two problems: Locating the points of speaker change (Segmentation) and Identifying the speaker in each segment (Labeling). An important obstacle, in the speaker tracking, is the corruption of the sp
452-105I-Ching Yang, Ying-Ying Chen, Beverly Chen, Chi-Ching Chen
In the DNA sequences of human, genes are about 3%, and the others are repeat sequences. More and more experiments appear that the repeat sequences should influence the expression of genes. Microsatellites, one kind of repeat sequences, are tandem repeatin
452-207Jari Turunen, Damjan Vlaj, Pekka Loula, Bogomir Horvat
Speech recognition over different transmission channels will set demands on the parametric encoded/decoded speech. The effects of different types of noise have been studied a lot and the effects of the parametrization process in speech has been known to c
R.O. Sirne and C. E. D'Attellis 452-119
An algorithm for detecting spikes in electroencephalograms of epileptic patients is introduced. It is based on a multiresolution analysis defined from a Daubechies wavelet. The results obtained from two patients implanted with depth electrodes are shown.
Raquel Flórez-López 452-190
The segmentation of clients in a specific market is very useful to identify different groups of them that let develop specific marketing policies to better suit the demand and to get a higher market share. This item is specially relevant when a new produc
Gordon Hunter, Mark Huckvale 452-187
This article describes some preliminary investigations into the statistical properties of the transcribed dialogues that were collected for the British National Corpus of English. Our aim has been to look for evidence of linguistic structure which could
452-163
Haydée Lanzillotti, Emilson Portella, Eliane Soares, Mônica Borges, Regina Lanzillotti
The objective of the study is to compare the methods of Monsen and Hallberg/Hulthen to calculate the nonheme-iron absorption in the meals. Transversal retrospective study of case used an accidental sample with 72 meals. The calculation of nutrients was m
452-168Wlodzimierz Klonowski, Elzbieta Olejarczyk, Robert Stepien
We analyze sleep EEG-data using two analytical methods – the first is based on Higuchi’s fractal dimension of the signal and the second is a symbolic method applied to signal’s derivative. We demonstrate that the fractal dimension method differentiate bet
Michael Ellerbrock 452-106
The worldwide eruption of controversy over Bjørn Lomborg’s book, The Skeptical Environmentalist [1], focuses debate on the proper measures of environmental quality, use of the scientific method, economic versus engineering frameworks of analysis, validity
452-235José Luiz de Freitas Júnior; Edilberto Teixeira; João Souza
Abstract: - This work presents some performance results of the utilization of the IDEA cryptographic algorithm with OPC standard using automation interfaces. The application developed in this paper uses the OPC standard, furnished by the OPC Foundation, a
452-240Mat Amin Amiza and R.K. Owusu Apenten
The thermal inactivation parameters of cod pepsin, cod pepsinogen and porcine pepsinis were compared at pH 2, 40-65oC.
Cod pepsinogen and cod pepsin were less stable than porcine pepsin mainly as a result of large value of activation entropy.
Ramon Prieto Sora Kim 452-219
We describe a pitch tracking method based on a time delay estimation technique. Given two frames of voiced speech and it's time delay, we will run a linear regression on the unwrapped phase of the quotient of the spectrum of both frames. A weighted linea
Christopher Ankersen 452-113
Since September 11th there has been a rise in jingoism within Canada. There has been wide support for Canadian participation in the war on terrorism and enthusiasm for Canada’s role in ‘offensive’ operations in Afghanistan, rather than a continuation of
452-186Leopoldo ArmestoJosep Tornero Juan Carlos Torres
This paper deals with transport process automation of industrial plants with industrial forklifts. In particular, a forklift has been completely automated based on external and internal sensors. A specific hardware architecture have been implemented and t
M.Rabbani, A.A.Zamani 452-133
In this paper, a method is developed to minimize the expected warranty servicing cost per item sold. In this method, to be decided to repair or replace a failed item. These kinds of items work in multi-state deteriorating and they may fail in every state.
452-141Abdullah Gani, N.Abouzakhar, Gordon Manson
This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users’ requests for accessing network resources. A conventional users’ request for acc
452-155Emilia Gómez, Fabien Gouyon, Perfecto Herrera, Xavier Amatriain
The aim of this paper is discussing possible ways of describing some music constructs in a dual context: that of a specific software application (a tool for content-based management and edition of samples and short audio phrases), and that of the current
452-114
New topological valence charge-transfer indices are applied to the calculation of dipole moments. The algebraic and vector semisum charge-transfer indices are defined. The combination of the charge-transfer indices allows the estimation of the dipole mom
452-243López M.E.,Barea R.,Bergasa L.M.,Escudero M.S.
This paper presents a new approach to robustly track a robot’s location in indoor environments using a partially observable Markov model. This model is constructed from topological representation of the environment, plus actuator an sensor characteristics
452-238Joaquim A. Martins, Hélder Zagalo, Daniel Santos, Sérgio Postilhão
The objective of this work is to build a gateway to allow a Z39.50 distributed search system to have a friendlier web based user interface. To achieve this, a conversion between MARC and XML is done, using the Dublin Core profile to do the translation. Th
Haret Rosu 453-164
We discuss the digital disorder of Davydov beta kinks introduced by Rosu and Canessa a decade ago [Phys. Rev. E 47, R3818 (1993)]. The digitally-disordered Davydov beta kinks display self-organized features, i.e., power law correlations both in time and s
Wook hyeon Shin, Won don Lee 453-139
Within restricted response time, in order to track pulse train of Radar and predict the next pulse time, we propose the Neural network with Dynamic structure. This Dynamic structure consists of basic structures. And it is a variable structure in that the
453-137
Hwa-Min Lee Kwang-Sik Chung Sang-Chul Shin Young-Jun Lee Won-Gyu Lee Heon-Chang Yu
To support fault-tolerance in distributed computing system, a recovery technique using multi-agent is suggested in [1]. However, fault-tolerance system using multi-agent doesn¡¯t support fault-tolerance of multi-agent. Agent failures may lead to inconsist
T.Lachman; T.R.Mohamad 453-108
Abstract This paper presents an alternative formulation and new algorithms for computation of the nonlinear magnetizing characteristics of Switched Reluctance Motors (SRMs). In this paper Frohlich’s equations are reviewed which are used for modeling non-
453-156Soumia Elhani; Noureddine Elalami; Said Guédira
Abstract. This note focuses on three major concepts: First, application of quadratic stabilisation of linear system with norm-bounded time varying uncertainty in the state matrix. The desired stabilizing law is constructed by applying an algorithm based o
Alexander Anyutin , Alexander Kyurkchan 453-128
Wavelets technique is applied for solving of the 2D (-or 3D) Dirichlet, Neumann or mix boundary problems when scattering bodies are perfect conducting (-or dielectric) cylinders with complicated cross sections, screens and bodies of revolution. The deve
M. Planat 453-162
Partition functions Z(x) of statistical mechanics are generally approximated by integrals. The approximation fails in small cavities or at very low temperature, when the ratio $x$ between the energy quantum and thermal energy is larger or equal to unity.I
nadjim mehdi Horri , stephen Hodgart 453-140
Failure of mechanical controllers onboard a satellite is a well known phenomenon that has already been disastrous for several space missions. In the case studied here, we take as an example the mini-satellite UoSat-12 built by SSTL at University of Surrey
Minghua He and Ben M. Chen 453-134
We present in this paper computation algorithms for the structural decomposition of general linear multivariable singular systems. Such kind of decomposition has a distinct feature of capturing and displaying all the structural properties, such as the fin
Andris Buikis and Harijs Kalis 453-145
In many technological applications it is important to mix and heat an electro-conductive liquid. In practice, such processes are realized with the help of various magnetic fields acting upon the liquid.The distribution of electromagnetic fields, forces an
Ben Jemaa Zouhair - Belghith Safya 453-142
In this paper, we will show that a simple one dimension nonlinear map allows generating binary sequences that have better correlation properties then classical pseudo random ones. Using performance criterion that is suitable for CDMA application, the perf
453-147Alfred Voglgsang, Rudi Knorr, Stefan Lindenmeier
The performance of xDSL-systems is determined by the existing crosstalk interference. xDSL-systems are optimised to the existing crosstalk interferences in a cable bundle. The crosstalk interference leads to unwanted restrictions in the number of xDSL-sys
453-125Sun Zhifang, Liu Hongjie , Kenji Amei, Masaaki Sakui
: In converters system, the supply voltage can be in unbanlanced condition for some reasons, and noncharacteristic harmonics will be produced in both DC and AC side. This paper proposes an analytical method for calculating the harmonic currents of DC and
453-158
G. Lambert Torres, L.E. Borges da Silva, A.R. Aoki, C.H.V. Moraes, B.R. Costa and J.A. Barbosa
This paper presents the developments made in the Technological Development and Research Program from Brasilia Energy Company (CEB) in the same subject of this paper. This project has set up a set of procedures that were introduced into computer packages,
453-1121)Saloman R.M.Danaraj, 2)Dr.F.Gajendran
This paper presents a new and efficient way of implementing quadratic programming to solve the Dynamic economic dispatch problem. Dynamic economic dispatch is an extension of the conventional economic load dispatch, problem that takes into consideration o
Dariusz Szwedowicz 453-160
In this paper, numerical and experimental techniques for elastic impact analyses between two vibrating beams are presented in details. A load sensor developed for measurements of elastic impact forces and the designed vibration exciter are also discussed
Francisco Torrens 453-115
The pathways that exist in porous membranes used to deliver drugs form fractal percolating paths. For a homologous series of 4-alkylanilines, the fractal dimension D is calculated as a model for transdermal-delivery drugs. Our program TOPO is used for th
Ralph W. Oberste-Vorth 453-159
Dr Eleni Mangina 453-126
We use the projective limit construction to examine the connections between one- and two-sided shifts and the dynamics of quadratic polynomials in one variable and quadratic Henon mappings.
Electrical utilities need to use their equipment closer to their design limits and require extending their operating life through automatic condition monitoring systems. Data interpretation is of high importance to infer the state of the equipment and is
453-138Kari Salonen, Jouni Smed, Mika Johnsson, Olli Nevalainen
We consider the machine setup problem of printed circuit board (PCB) assembly as a combination of a job grouping problem and a minimum setup problem. We formulate the problem as a MIP-model, where the objective is to minimize the weighted sum of the numbe
453-113Leonardo M. Honório, A . C. Zambroni de Souza, Geraldo L. Torres
Abstract – This paper deals with the problem of chose local control actions in power systems. The planning scenario is considered, and the aim of the study is to determine the most effective actions to lead the system to a better operating point. The too
M. Mahmoud 453-148
Traditionally, crude oil flow metering is an important process; it has economic impact on oil producers and oil buyers. The main problem of the current flow metering techniques that involve mechanical wetted moving or rotating components is the continuous
M. Mahmoud 453-149
Olfactory sensors have been attractive for scientific research and industrial applications. In this paper a new type of olfactory sensors based on compact size and passive fiber optic components “Fiber Bragg Gratings Technology” is introduced and its math
453-106
At present the problem of dynamic characteristics identification (DChI), alternating pressure transducers (APT) is extremely actual. There are transducers reasons for that: of creation mechanical tested signals difficulties, closed to its characteristics,
453-103
Valeriy Alekseevich Udaloy, Nikolay Mihailovich Ivanov, Nikolay Leonidovich Sokolov , Vladimir Urievich Pazdnikov
There are various Mission Control Centers (MCC) in many countries. But analysis of the existing literature proves absence of general idea of MCC structure optimization although optimal structure of MCC could allow to increase profitability of mission cont
Mohamad A. Habli 453-102
Micro opto-electronic device (MOED) are proposed for 2-D optical cross-connect. The MOED consists of an array of control units and polarization beam splitters (PBS). The control unit of MOED is a optp-electronic unit (OECU). The proposed device will eithe
A.P. ANYUTIN and V.I. STASEVICH 453-121
A new modification of the method of discrete sources are applied for solving a 2D scattering problems by metal or dielectric cylindrical structure covered with dielectric layer. The developed method. The problems of accuracy, choosing auxiliary contour
M. Planat 453-161
A number theoretical model of 1/f noise found in phase locked loops is developed. Oscillators from the input of the non linear and low pass filtering stage are shown to lock their frequencies from continued fraction expansions of their frequency ratio, an
M. Mahmoud 453-150
Monitoring oil fields reservoirs for optimizing the production have been satisfied by wellhead sampling and test separator metering. Development and research work have been taking place to develop smaller size and lower cost multiphase flow meters that im
Babak Badrzadeh,S.M.Shahrtash 453-109
Partial discharges are caused by various defects such as voids, shield protrusions, contaminants, advanced stages of water tree, etc and known the main cause of breakdown in insulation materials. Partial discharge (PD) location is a powerful and useful to
Daniela Carstea, Ion Carstea 453-118
Abstract: This paper deals with the heat generated by ohmic losses in dielectric insulation of the electrical devices. A description is given of the solution of coupled electric and heat dissipation problems in high-voltage (HV) insulation formed by so
Martin Lopez Morales 453-114
Abstract:-We consider the Cauchy problem for higher order linear parabolic equations in a layer.We establish new a priori estimates for the solution to this problem in general anisotropic Hölder norms, under the assumption that the coefficients and the in
Martín López Morales 453-111
On the Cauchy Problem for Higher Order Parabolic Equations Martín López Morales. Monterrey Institute of Technology. Campus Mexico City. Mexico. (Abstract ) In the present work we consider the Cauhy problem for higher order li
Noureddine El alami Hafida Benazza 453-135
E.I.Verriest and F.L.Lewis have presented in [1]a new method to approach the minimum-time control of linear continous-time systems avoiding the Bang-Bang control. Their method relied on the optimization of a cost including time energy and precisions terms
453-117N. Ratier, M. Addouche, D. Gillet, R. Brendel
Parsing a Spice netlist is the first step of all circuit simulation programs. This part is usually done by low-level coding techniques in C or Fortran language. The aim of this paper is to show the usefulness of functional programming techniques to the ne
453-104
Valeriy Alekseevich Udaloy , Nikolay Mihailovich Ivanov, Nikolay Leonidovich Sokolov , Vladimir Urievich Pazdnikov
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Centre and Modeling (MCC-M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of Earth and World ocean remote
453-105
The method of the processing of the short reactions data by means of uneven weighing is described. The methods of parametrical spectral analysis are taken as a basis. The comparison of the methods, resolutions is given. There is also a discussion of real
Tao Qian and Liming Zhang 453-146
Based on a mathematical analysis involving Radon measure explicit formulars of continuous (integral) wavelet transformations are given and further used to direct how to use rotational wavelets in edge detection.
453-136Peixia Gao, Sabine Wittevrongel, Herwig Bruneel
In this paper, we consider a discrete-time multiserver queueing system with infinite buffer size, geometric service times and a FCFS (first-come-first-served) queueing discipline. A relationship between the probability distributions of the system contents
Aosheng Rong and Andreas Cangellaris 453-131
This paper presents a numerically stable integral equation methodology for the full-wave electromagnetic analysis of the three-dimensional interconnect networks, integrated passives and power distribution grids used in high-speed digital and mixed-signal
H. Gopalkrishna Gadiyar and R. Padma 453-163
In this paper the ideas of Rota and Ramanujan are shown to be central to understanding problems in additive number theory. The circle and sieve methods are two different facets of the same theme of interplay between probability and Fourier series used to
E.Macer-Story 453-130
Abstract:-In previous papers, [1]the existence of an additional energy to the electromagnetic has been described and designated as [fluidice//traction fluidice]. This living energy operates to transduce information into the electromagnetic, molecular cont
453-124
Valeriy Alekseevich Udaloy, Nikolay Mihailovich Ivanov, Nikolay Leonidovich Sokolov, Vitaliy Valerievich Astafiev
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Centre and Modeling (MCC-M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of Earth and World ocean remote
M.Mitrouli, A.P.Markovskyy, N.G.Bardis 453-157
453-116
Properties of the total and conditional entropy are studied. The theorems that have been proved state the necessary and sufficient conditions for the total and conditional entropy maximum of the special type functions, namely, D-functions. A procedure for
To be send later.
Murat Akin, Atilla Bir 453-151
The aim of this paper is to develop a new approach for a solution of the continuous-time Hinf model matching problem with a static output feedback by using Linear Matrix Inequalities (LMIs). The main contribution is to reformulate the continuous-time Hinf
Murat Akin, Atilla Bir 453-154
The aim of this paper is to develop a new approach for a solution of the discrete-time Hinf model matching problem with a static output feedback by using Linear Matrix Inequalities (LMIs). The main contribution is to reformulate the discrete-time Hinf mod
Dhurjati Prasad Datta 453-165
We discuss brief\mbox{}ly how the recently uncovered time asymmetric solutions to linear ordinary differential equations can provide a consistent framework to address the 1/f noise problem. We also point out its relevance in the theory of prime numbers.
Hesham Nasif, Atsushi Neyama 453-123
Justice Opoku Dankwah 453-132
Abstract:- A probabilistic performance analysis is one of the key tools that will be used to assess the acceptance of the proposed repository for the high-level radioactive nuclear waste in Japan. We present an integrated tool to determine the uncertaintyNot yet writen
Hira N. Narang, Rajiv K. Nekkanti 453-110
The Wavelet solution for boundary-value problems is relatively new and has been mainly restricted to the solutions in data compression, image processing and recently to the solution of differential equations with periodic boundary conditions. This paper i
453-155M. M. S. Lira, H. M. de Oliveira, R. J. de Sobral Cintra, R. M. Campello de Souza
New elliptic cylindrical wavelets are introduced, which exploit the relationship between analysing filters and Floquet's solution of Mathieu differential equations. It is shown that the transfer function of both multiresolution filters is related to the s
453-107
The method of the processing of the short reactions data by means of uneven weighing is described. The methods are used for the analysis of dynamic characteristics' pressure sensors on the basis of the reactions to impulsive and multistage influences.