Loading [MathJax]/extensions/MathMenu.js
2008 International Conference on Computational Intelligence for Modelling Control & Automation - Conference Table of Contents | IEEE Xplore
International Conference on Computational Intelligence for Modelling, Control and Automation, and International Conference on Intelligent Agents, Web Technologies and Internet Commerce

2008 International Conference on Computational Intelligence for Modelling Control & Automation

DOI: 10.1109/cimca15058.2008

10-12 Dec. 2008

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Computational Intelligence for Modeling Control and Automation (CIMCA), 2008 International Conference on

[Front cover]

Publication Year: 2008,Page(s):C1 - C1

[Title page i]

Publication Year: 2008,Page(s):i - i

[Title page iii]

Publication Year: 2008,Page(s):iii - iii

[Copyright notice]

Publication Year: 2008,Page(s):iv - iv

Table of contents

Publication Year: 2008,Page(s):v - xxii

Additional reviewers

Publication Year: 2008,Page(s):xxvii - xxix

Keynote Speakers Biographies and Abstracts

Publication Year: 2008,Page(s):xxx - xxxix
Online auctions have become extremely popular in recent years. Ability to predict winning bid prices accurately can help bidders to maximize their profit. This paper proposes a number of strategies and algorithms for performing such predictions for the first price sealed bid reverse auctions (FPSBRA). The neural networks (NN) and genetic programming (GP) learning techniques are used in the models....Show More
The increasing search for computational solutions to support the decision-making led to the development of new technologies that aim to transform the large volume of data in information and knowledge useful. The data warehousing technology emerged with the aim of structuring the data in the best way possible to facilitate its access, making the process more efficient and effective. Along with it, ...Show More
In this article we focus on the presentation of the inner structure of the database for the content-based image retrieval (CBIR) system containing house images. The part devoted to image processing is signalled to the extent necessary for further database (DB) structure explanations to the reader. In this paper standard DB project methods in the Oracle 10 g system have been used to generate a data...Show More
Employed the characteristic of OFDM in spectrum utilizing-rate highly, 8 bit depth gray scale image instead of simple binary image was embedded in gray carrier image. In OFDM, it is comparatively simpler by using QAM mapping for both embedding process and extracting process. Meanwhile QIM Algorithm proposed by Chen is improved and optimized by using the output of 4-QAM as the awaiting embedded inf...Show More
XML has emerged as a common standard for data exchange over the World Wide Web. One way to manage XML data is to use the power of relational databases for storing and querying them. So the hierarchical XML data should be mapped into flat relational structure. In this paper we propose an algorithm which maps DTD to relational schema and as well as content and structure it preserves the functional d...Show More
The nonstop ageing of population in Europe makes the health system maintenance a worrying and complicated task for every government. In this context, telecare systems emerge as a cheap and effective approach. A telecare system helps elderly and care-dependent people to satisfy their needs and special requirements, requiring fewer resources and enabling users to be at their own homes. The purpose o...Show More
This paper describes the work developed byTelefónica I+D about an application of advanced DataMining, Text Mining and Machine Learning techniquesfor the study of the network elements failures managedby the Trouble Ticketing System of a largetelecommunication company, in order to be able toanalyze, prioritize and, in some cases, solve withouthuman intervention the huge amount of trouble reportsto b...Show More
This paper describes a method based on data mining techniques to classify MIDI music files into music genres. Our method relies on extracting high level symbolic features from MIDI files. We explore the effect of combining several data mining preprocessing stages to reduce data processing complexity and classification execution time. Additionally, we employ a variety of probabilistic classifiers a...Show More
Agile software development principles and methodologies have gained a lot of popularity in recent years. Unlike traditional software processes, agile processes advocate flexible practices that allow coping with changing requirements. Recently, several agile processes have been proposed, which differ in a variety of ways. In this paper, we analyze the characteristics of many agile processes and cla...Show More
An installation that is performed without user interaction and does not display any message or GUI during its progress is known as silent and unattended installation. In this paper we have proposed silent unattended installation package manager (SUIPM) that automates the process of silent unattended installations and un-installations and requires the minimal possible level of interaction with the ...Show More
This article introduces an approach to systematically develop a business domain specific challenge based evaluation for information systems, which is designed to contribute to the innovation of software systems as part of the software engineering or information system investment decisions process. It leans heavily on existing models of software quality measurement and considers business domain spe...Show More
Adaptive game AI improves adaptability of opponent AI as well as the challenge level of the gameplay; as a result the entertainment of game is augmented. Opponent game AI is usually implemented by scripted rules in video games, but the most updated algorithm of UCT (upper confidence bound for trees) which perform excellent in computer go can also be used to achieve excellent result to control non-...Show More
Extensible markup language (XML) is a sub part of the standard generalized markup language (SGML) and is a mother of wireless markup language (WML). This technology is effective for storage, searching and retrieval of data based on query. The bottleneck in the normal search engines is the lackness of proper metadata which proves to be an obstacle in the quick data retrieval. The XML has been repla...Show More
The object of this paper is to propose a method to deal with the problem of modeling user specifications in approaches based on supervisory control and Petri nets. However, most of Petri net approaches are based on forbidden states specifications, and these specifications are suitable the use of tool such as the reachability graph. But these methods were not able to show the user specification eas...Show More
A method to modify curve shape according to the specified radius of curvature distribution is described. The difference between the radius of curvature of the curve and the specified radius of curvature is minimized by introducing the least-squares method. Evaluation of whether the designed curve is fair or not is accomplished by a comparison of the designed curve to a curve whose radius of curvat...Show More
In high-speed networks supported by TCP/IP, congestion control algorithm plays an important role. Real time streaming media, such as video, audio conversations and movies on line, often are transmitted over the Internet. The dominant paradigm for congestion control in the Internet is based on the TCP friendliness. As the load on the network increases, it is critical to find the point at which cong...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Computational Intelligence for Modeling Control and Automation (CIMCA), 2008 International Conference on