[93]S. M., L, S. F., L & Lin, C 2006, 'A HVS-directed Neural-network-based Approach for Salt-pepper Impulse Noise Removal'.
Argent, RM, Voinov, A, Maxwell, T, Cuddy, SM, Rahman, JM, Seaton, S, Vertessy, RA & Braddock, RD 2006, 'Comparing modelling frameworks – A workshop approach', Environmental Modelling & Software, vol. 21, no. 7, pp. 895-910.
View/Download from: Publisher's site
Bergin, J, Lister, R, Owens, BB & McNally, M 2006, 'The first programming course', ACM SIGCSE Bulletin, vol. 38, no. 3, pp. 301-302.
View/Download from: Publisher's site
View description>>
This panel will discuss ways to engage undergraduates in computing and then to keep them as majors. A special emphasis will be on attracting females to computing. The panelists will discuss the relative strengths and weaknesses of four environments especially designed for the teaching of the first programming course.
Cao, YZ & Ying, MS 2006, 'Observability and decentralized control of fuzzy discrete-event systems', IEEE TRANSACTIONS ON FUZZY SYSTEMS, vol. 14, no. 2, pp. 202-216.
View/Download from: Publisher's site
View description>>
Fuzzy discrete-event systems as a generalization of (crisp) discrete-event systems have been introduced in order that it is possible to effectively represent uncertainty, imprecision, and vagueness arising from the dynamic of systems. A fuzzy discrete-event system has been modeled by a fuzzy automaton; its behavior is described in terms of the fuzzy language generated by the automaton. In this paper, we are concerned with the supervisory control problem for fuzzy discrete-event systems with partial observation. Observability, normality, and co-observability of crisp languages are extended to fuzzy languages. It is shown that the observability, together with controllability, of the desired fuzzy language is a necessary and sufficient condition for the existence of a partially observable fuzzy supervisor. When a decentralized solution is desired, it is proved that there exist local fuzzy supervisors if and only if the fuzzy language to be synthesized is controllable and co-observable. Moreover, the infimal controllable and observable fuzzy superlanguage, and the supremal controllable and normal fuzzy sublanguage are also discussed. Simple examples are provided to illustrate the theoretical development. © 2006 IEEE.
Cao, YZ & Ying, MS 2006, 'Similarity-based supervisory control of discrete-event systems', IEEE TRANSACTIONS ON AUTOMATIC CONTROL, vol. 51, no. 2, pp. 325-330.
View/Download from: Publisher's site
View description>>
Due to the appearance of uncontrollable events in discrete-event systems, one may wish to replace the behavior leading to the uncontrollability of pre-specified language by some quite similar one. To capture this similarity, we introduce metric to tradit
Cetindamar, D, Çatay, B & Serdar Basmaci, O 2006, 'Improving the performance of technology partnerships: a case study in the Turkish textile industry', Handbook of Business Strategy, vol. 7, no. 1, pp. 319-323.
View/Download from: Publisher's site
View description>>
PurposeCollaboration is an advantageous strategy for technology‐based competition. Thus, it is of high concern to understand mechanisms behind the success of collaborations such as performance measurement system. This paper will present an empirical study conducted in the Turkish textile industry where performance measures are developed and applied.Design/methodology/approachThe paper utilizes a combination of interviews and surveys to collect data from 3T partners that are six technology supplying and ten dyeing and finishing companies. The findings indicate that besides trust, the existence of a performance measurement system is an extremely important bridge for effective supply chain collaboration (SCC). Such a system should cover metrics related to internal performance, perceptions of partners regarding the alliance performance, and the degree of inter‐firm relationship.FindingsThe paper is based on a technology partnership so the results need to be taken cautiously. However, it is clear that 3T is a successful technological partnership with six new technologies developed in two‐year period. There are some potential improvement areas, particularly in its internal activities and its relationship with the partners. The study shows that as the level of information sharing and communication among the partners increase, the performance and the benefits of the collaboration also increase.Originality/valueSCC can have long‐term goals like continuous product innovation as experienced in 3T and this might increase overall performance of an industry. That is why SCC might be particularly important tool for...
Chang, C-L, Fan, K-W, Chung, I-F & Lin, C-T 2006, 'A Recurrent Fuzzy Coupled Cellular Neural Network System With Automatic Structure and Template Learning', IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 53, no. 8, pp. 602-606.
View/Download from: Publisher's site
CHEN, CL, DONG, DY & CHEN, ZH 2006, 'QUANTUM COMPUTATION FOR ACTION SELECTION USING REINFORCEMENT LEARNING', International Journal of Quantum Information, vol. 04, no. 06, pp. 1071-1083.
View/Download from: Publisher's site
View description>>
This paper proposes a novel action selection method based on quantum computation and reinforcement learning (RL). Inspired by the advantages of quantum computation, the state/action in a RL system is represented with quantum superposition state. The probability of action eigenvalue is denoted by probability amplitude, which is updated according to rewards. And the action selection is carried out by observing quantum state according to collapse postulate of quantum measurement. The results of simulated experiments show that quantum computation can be effectively used to action selection and decision making through speeding up learning. This method also makes a good tradeoff between exploration and exploitation for RL using probability characteristics of quantum theory.
Chin-Teng Lin, Chang-Mao Yeh, Sheng-Fu Liang, Jen-Feng Chung & Kumar, N 2006, 'Support-vector-based fuzzy neural network for pattern classification', IEEE Transactions on Fuzzy Systems, vol. 14, no. 1, pp. 31-41.
View/Download from: Publisher's site
Cole, JH, Devitt, SJ & Hollenberg, LCL 2006, 'Precision characterization of two-qubit Hamiltonians via entanglement mapping', Journal of Physics A: Mathematical and General, vol. 39, no. 47, pp. 14649-14658.
View/Download from: Publisher's site
Coulin, C, Zowghi, D & Sahraoui, A 2006, 'A situational method engineering approach to requirements elicitation workshops in the software development process', Software Process: Improvement and Practice, vol. 11, no. 5, pp. 451-464.
View/Download from: Publisher's site
View description>>
AbstractThe elicitation of requirements for software systems is one of the most critical and complex activities within the development lifecycle. Although the subject has received some degree of attention in the research literature, there remains a need for situational methods and processes that can be easily utilized by the majority of practitioners in typical projects. In this paper we present a flexible yet systematic approach to the early stages of requirements elicitation in software development, based on collaborative workshops and the construction of a lightweight situational method, within a general process framework. The research provides practitioners with an approach to requirements elicitation that can be readily applied to real‐world projects in order to improve both the process and the results. The work also offers researchers an example of how lightweight situational method engineering can be applied to very practical activities and situations in the software process. Copyright © 2006 John Wiley & Sons, Ltd.
Curry, J, McGregor, C & Tracy, S 2006, 'A Communication Tool to Improve the Patient Journey Modeling Process', 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 4726-4730.
View/Download from: Publisher's site
View description>>
Quality improvement is high on the agenda of Health Care Organisations (HCO) worldwide. Patient Journey Modeling is a relatively recent innovation in healthcare quality improvement that models the patient's movement through the HCO by viewing it from a patient centric perspective. Critical to the success of the redesigning care process is the involvement of all stakeholders and their commitment to actively participate in the process. Tools which promote this type of communication are a critical enabler that can significantly affect the overall process redesign outcomes. Such a tool must also be able to incorporate additional factors such as relevant policies and procedures, staff roles, system usage and measurements such as process time and cost. This paper presents a graphically based communication tool that can be used as part of the patient journey modeling process to promote stakeholder involvement, commitment and ownership as well highlighting the relationship of other relevant variables that contribute to the patient's journey. Examples of how the tool has been used and the framework employed are demonstrated via a midwife-led primary care case study. A key contribution of this research is the provision of a graphical communication framework that is simple to use, is easily understood by a diverse range of stakeholders and enables ready recognition of patient journey issues. Results include strong stakeholder buy-in and significant enhancement to the overall design of the future patient journey. Initial results indicate that the use of such a communication tool can improve the patient journey modeling process and the overall quality improvement outcomes. © 2006 IEEE.
Davis, AM & Zowghi, D 2006, 'Good requirements practices are neither necessary nor sufficient', REQUIREMENTS ENGINEERING, vol. 11, no. 1, pp. 1-3.
View/Download from: Publisher's site
Deyrich, M & Dyson, LE 2006, 'Integrating cultural language development with technology in curricular design', International journal of learning, vol. 13, no. 2, pp. 103-112.
Duan, R, Feng, Y & Ying, M 2006, 'Partial recovery of quantum entanglement', IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 52, no. 7, pp. 3080-3104.
View/Download from: Publisher's site
View description>>
Suppose Alice and Bob try to transform an entangled state shared between them into another one by local operations and classical communications. Then in general a certain amount of entanglement contained in the initial state will decrease in the process of transformation. However, an interesting phenomenon called partial entanglement recovery shows that it is possible to recover some amount of entanglement by adding another entangled state and transforming the two entangled states collectively. In this paper, we are mainly concerned with the feasibility of partial entanglement recovery. The basic problem we address is whether a given state is useful in recovering entanglement lost in a specified transformation. In the case where the source and target states of the original transformation satisfy the strict majorization relation, a necessary and sufficient condition for partial entanglement recovery is obtained. For the general case we give two sufficient conditions. We also give an efficient algorithm for the feasibility of partial entanglement recovery in polynomial time. As applications, we establish some interesting connections between partial entanglement recovery and the generation of maximally entangled states, quantum catalysis, mutual catalysis, and multiple-copy entanglement transformation. © 2006 IEEE.
Duan, R-Y, Ji, Z-F, Feng, Y & Ying, M-S 2006, 'Some issues in quantum information theory', JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, vol. 21, no. 5, pp. 776-789.
View/Download from: Publisher's site
View description>>
Quantum information theory is a new interdisciplinary research field related to quantum mechanics, computer science, information theory, and applied mathematics. It provides completely new paradigms to do information processing tasks by employing the pri
Dyson, L & Underwood, J 2006, 'Indigenous People on the Web', Journal of Theoretical and Applied Electronic Commerce Research, vol. 1, no. 1, pp. 65-76.
View/Download from: Publisher's site
View description>>
This paper explores the ways in which Indigenous people around the world are participating in the World Wide Web, through establishing their own websites or accessing services via the Web. Indigenous websites are remarkably diverse: in addition to those representing Indigenous organizations and promoting Indigenous e-commerce, many websites have also been established to further unique concerns of Indigenous communities such as the maintenance and revitalization of Indigenous cultures, intercultural dialogue between Indigenous and non-Indigenous people, political advocacy and mobilization, community rebuilding and social support for disadvantaged communities. Despite the early involvement of Indigenous people on the Web, there still remain many unresolved issues, which include low levels of computer literacy and Internet connectivity, the cost of the technology, low levels of business understanding to support e-commerce, and concerns over the misappropriation of Indigenous knowledge and culture.
Dyson, LE 2006, 'Indigenous Australian cookery, past and present', Journal of Australian Studies, vol. 30, no. 87, pp. 5-18.
View/Download from: Publisher's site
View description>>
It can be claimed that Indigenous Australian cookery is the world's oldest living culinary tradition. How ancient a tradition it can be considered depends on whether one has a scientific or a spiritual worldview. Most anthropologists' estimates of when Aboriginal people first set foot in Australia vary from 45,000 to 55,000 years ago. (1) Many Indigenous Australians, on the other hand, believe that they have been in Australia from time immemorial and therefore their culinary culture also dates ab origine, 'from the beginning'. People, culture and place are inextricably intertwined and bound together as far back in the past as human memory or imagination will reach.
Dyson, LE & Koruth, S 2006, 'Improving business performance through supply chain intelligence: An Australian perspective', ICFAI journal of supply chain management, vol. 3, no. 1, pp. 31-40.
Evelyn Dyson, L & Robertson, T 2006, 'Indigenous Participation in Information Technology Project: Achievements and Challenges of the First Three Years', The Australian Journal of Indigenous Education, vol. 35, no. 1, pp. 11-20.
View/Download from: Publisher's site
View description>>
Abstract In 2002 the Faculty of Information Technology at the University of Technology Sydney began a major initiative to improve the participation of Indigenous Australians in the Information Technology (IT) sector. This followed an initial study which showed that very few Indigenous students undertook studies in IT at university and therefore few found employment as IT professionals. As a result of the new programme, the Faculty’s first Indigenous staff were hired, an Indigenous resource centre was established and the first postgraduate students recruited. In addition, an IT tertiary preparation short course, the Indigenous Pre-IT Program, was launched successfully, the Faculty’s first Indigenous-specific course. With the project, Indigenous student enrolments have increased, mainly as part of the Pre-IT Program and as a result of recruitment of undergraduates from amongst successful Pre-IT Program students. However, retention of undergraduates recruited via special admission provisions has proved difficult despite attempts to secure scholarships and to provide academic support. This paper traces the development of the project and analyses the achievements and challenges in the first three years.
Feng, Y, Duan, R & Ying, M 2006, 'Relation between catalyst-assisted transformation and multiple-copy transformation for bipartite pure states', PHYSICAL REVIEW A, vol. 74, no. 4, pp. 1-7.
View/Download from: Publisher's site
View description>>
We show that in some cases, catalyst-assisted entanglement transformation cannot be implemented by multiple-copy transformation for pure states. This fact, together with the result we obtained in R. Y. Duan, Y. Feng, X. Li, and M. S. Ying, Phys. Rev. A 71, 042319 (2005), namely that the latter can be completely implemented by the former, indicates that catalyst-assisted transformation is strictly more powerful than multiple-copy transformation. For the purely probabilistic setting we find, however, these two kinds of transformations are geometrically equivalent in the sense that the sets of pure states that can be converted into a given pure state with maximal probabilities not less than a given value have the same closure, regardless of whether catalyst-assisted transformation or multiple-copy transformation is used. © 2006 The American Physical Society.
Fincher, S, Lister, R, Pears, A, Sheard, J, Tenenberg, J & Young, A 2006, 'Multi-institutional teaching communities in computer education', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 7-10.
Gabrys, B & Ruta, D 2006, 'Genetic algorithms in classifier fusion', Applied Soft Computing, vol. 6, no. 4, pp. 337-347.
View/Download from: Publisher's site
Goldweber, M, Bergin, J, Lister, R & McNally, M 2006, 'A comparison of different approaches to the introductory programming course', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 11-13.
Greentree, AD, Devitt, SJ & Hollenberg, LCL 2006, 'Quantum-information transport to multiple receivers', Physical Review A, vol. 73, no. 3.
View/Download from: Publisher's site
Guo, YG, Zhu, JG & Lu, HY 2006, 'Accurate determination of parameters of a claw-pole motor with SMC stator core by finite-element magnetic-field analysis', IEE Proceedings - Electric Power Applications, vol. 153, no. 4, pp. 568-568.
View/Download from: Publisher's site
View description>>
Effective and accurate prediction of key motor parameters, such as winding flux, back electromotive force, inductance and core losses, is crucial for design of high-performance motors. Particularly, for electrical machines with new materials and nonconve
Hussain, OK, Chang, E, Hussain, FK & Dillon, TS 2006, 'A methodology for Risk measurement in e-transactions', COMPUTER SYSTEMS SCIENCE AND ENGINEERING, vol. 21, no. 1, pp. 17-31.
View description>>
Risk is present in almost every activity. Alternately speaking, almost every activity may have some undesired outcomes which the person doing the activity hopes that they do not occur when it undertakes that particular activity. The quantification of tho
Ji, ZF, Feng, Y, Duan, RY & Ying, MS 2006, 'Boundary effect of deterministic dense coding', PHYSICAL REVIEW A, vol. 73, no. 3, pp. 1-3.
View/Download from: Publisher's site
View description>>
We present a rigorous proof of an interesting boundary effect of deterministic dense coding first observed by S. Mozes, J. Oppenheim, and B. Reznik [Phys. Rev. A 71, 012311 (2005)]. Namely, it is shown that d2 -1 cannot be the maximal alphabet size of any isometric deterministic dense coding schemes utilizing d -level partial entanglement. © 2006 The American Physical Society.
Ji, ZF, Feng, Y, Duan, RY & Ying, MS 2006, 'Identification and distance measures of measurement apparatus', PHYSICAL REVIEW LETTERS, vol. 96, no. 20, pp. 1-4.
View/Download from: Publisher's site
View description>>
We propose simple schemes that can perfectly identify projective measurement apparatuses secretly chosen from a finite set. Entanglement is used in these schemes both to make possible the perfect identification and to improve the efficiency significantly. Based on these results, a brief discussion on the problem of how to appropriately define distance measures of measurements is also provided. © 2006 The American Physical Society.
Kau, L-J, Lin, Y-P & Lin, C-T 2006, 'Lossless image coding using adaptive, switching algorithm with automatic fuzzy context modelling', IEE Proceedings - Vision, Image, and Signal Processing, vol. 153, no. 5, pp. 684-684.
View/Download from: Publisher's site
Kay, R & Dyson, L 2006, 'Learning to Collaborate and Collaborating to Learn: An Experiential Approach to Teaching Collaborative Systems', Journal of Theoretical and Applied Electronic Commerce Research, vol. 1, no. 2, pp. 36-44.
View/Download from: Publisher's site
View description>>
This paper describes the use of experiential learning theory in the development of an undergraduate subject in collaborative systems. The purpose of the subject was to introduce students to the design, development and use of collaborative systems in organizational environments. Early in the subject’s development it was decided that in order for students to gain a deeper understanding of the issues involved in the development of collaborative systems, they should collaborate using an e-learning system so that they could experience these problems first hand. The paper provides an overview of the subject structure, the views of students with regard to the learning approach and some of the outcomes that were observed. The findings revealed that the experiential approach was successful in providing students with a good understanding of the issues associated with the design and use of collaborative systems. However, while many achieved deeper learning outcomes than would normally be provided by a traditional didactic approach, there were students who failed to achieve the desired learning levels. The findings not only provide support for Perry’s model of intellectual development and the value of setting unstructured problems, but also demonstrate the need for structure in early experiential events to which students are exposed.
Kutay, C & Lister, R 2006, 'Up close and pedagogical: Computing academics talk about teaching', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 125-134.
View description>>
This paper describes and enacts a process for bootstrapping a more systematic discussion of computing education within a school of computing at a researchintensive Australasian university. Thus far, the project has gone through three stages. In the first stage, some academics were interviewed about their approach to teaching. In the second stage, selected anonymous quotes from the interviews were presented and discussed by other interested members of the school at workshops. In the final stage, selected anonymous quotes from the interviews and workshops were placed on a web-based survey, to which interested members of the school responded. These forms of data will be used to drive further stages of debate within the school. The theoretical underpinnings of this project are Wenger's concept of a community of practice, phenomenography, and socially constructivism. The aim is not to instruct the academics in any 'right way' to teach. Instead, the aim is to facilitate debate, where the teachers identify the problems, and in finding the solutions they construct their own 'pedagogic reality'. As facilitators of this process, the authors of this paper highlighted dialectically opposed views in quotes from the teachers, and then allow the teachers to synthesise those views into a more sophisticated view. Our ultimate project aim is to grow a teaching community that balances reified theories of teaching and learning with participation in a community of practice. © 2006, Australian Computer Society, Inc.
Lee, MJW & Chan, A 2006, 'Exploring the potential of podcasting to deliver mobile ubiquitous learning in higher education', Journal of Computing in Higher Education, vol. 18, no. 1, pp. 94-115.
View/Download from: Publisher's site
View description>>
This paper addresses one of the main barriers to the widespread adoption of mobile learning in higher education, that of cost. Usage charges billed by telecommunications providers and the cost of mobile hardware are identified as the key cost issues. However, opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. The authors describe two experiments in low-cost mobile learning: one that uses packet technology (mobile WAP/WML) to build low-cost interactivity in the classroom and the second that involves mobile-supported fieldwork using several cost-saving strategies
Li, J & Hao, P-W 2006, 'Smooth interpolation on homogeneous matrix groups for computer animation', Journal of Zhejiang University-SCIENCE A, vol. 7, no. 7, pp. 1168-1177.
View/Download from: Publisher's site
Lin, C & C. L., C 2006, 'Using Fuzzy Inference and Cubic Curve to Detect and Compensate Backlight Image'.
Lin, CT 2006, 'ACM's 2006 general elections', Communications of the ACM, vol. 49, no. 7, pp. 13-13.
View/Download from: Publisher's site
Lin, CT, Fan, KW, Yeh, CM, Pu, HC & Wu, FY 2006, 'High-accuracy skew estimation of document images', International Journal of Fuzzy Systems, vol. 8, no. 3, pp. 119-126.
View description>>
This paper presents a new skew angle estimation algorithm for binary document images based on the FCRM (fuzzy c-regression models) clustering method with the aim to resolve the disadvantages of low accuracy and robustness of the existing approaches. This algorithm consists of four processes. The first process transfers the input image into parallel straight lines through image analysis. The second process uses the operating window selection to accelerate the executing time. The following process magnifies the image by fast interpolation to increase the accuracy of skew angle estimation. Finally, the FCRM method is applied to estimate the skew angle. A test set of 184 documents of different kinds is used to measure the performance of the proposed algorithm. Experimental results show that the proposed method has a high precision rate for different document types; it is able to accurately estimate the skew angles that range between -89° and +89°. © 2006 TFSA.
Lin, C-T, Ko, L-W, Chung, I-F, Huang, T-Y, Chen, Y-C, Jung, T-P & Liang, S-F 2006, 'Adaptive EEG-Based Alertness Estimation System by Using ICA-Based Fuzzy Neural Networks', IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 53, no. 11, pp. 2469-2476.
View/Download from: Publisher's site
Lister, R 2006, 'Call me Ishmael', ACM SIGCSE Bulletin, vol. 38, no. 2, pp. 11-13.
View/Download from: Publisher's site
View description>>
It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair, we had everything before us, we had nothing before us ...[2].
Lister, R 2006, 'One room, four meetings', ACM SIGCSE Bulletin, vol. 38, no. 4, pp. 11-13.
View/Download from: Publisher's site
View description>>
Over the last couple of years, I have attended regular meetings with a group of colleagues who share my interest in computer education. After two years, I've realized that my colleagues and I are all in the same room, at the same time, but there are four different meetings going on at once. Only one of the meetings is about education research. As an education researcher, I often find the other meetings frustrating, but I have also come to see that there are positives to all four types of meetings. Each meeting has its weaknesses, including the research meeting, and these respective weaknesses are ameliorated by the other meeting types.
Lister, R, Berglund, A, Clear, T, Bergin, J, Garvin-Doxas, K, Hanks, B, Hitchner, L, Luxton-Reilly, A, Sanders, K, Schulte, C & Whalley, JL 2006, 'Research perspectives on the objects-early debate', ACM SIGCSE Bulletin, vol. 38, no. 4, pp. 146-165.
View/Download from: Publisher's site
View description>>
In March 2004, SIGCSE members contributed to a mailing list discussion on the question of whether programming should be taught objects first or imperative first. We analyse that discussion, exploring how the CS community debates the issue and whether contributors' positions are supported by the research literature on novice programmers. We applied four distinct research methods to the discussion: cognitive science, rhetorical analysis in the critical tradition, phenomenography and biography. We identify the cognitive claims made in the email discussion and find there is not a consensus in the research literature as to whether the objects first approach or the imperative approach is harder to learn. From the rhetorical analysis, we find that the discussion was not so much a debate between OO-first versus imperative-first, but instead was more for and against OO-first. Our phenomenographic analysis identified and categorized the underlying complexity of the discussion. We also applied a biographical method to explore the extent to which the participants' views are shaped by their own prior experience. The paper concludes with some reflections upon paradigms, and the manner in which the CS discipline community defines itself.
Lister, R, Schulte, C, Whalley, JL, Berglund, A, Clear, T, Bergin, J, Garvin-Doxas, K, Hanks, B, Hitchner, L, Luxton-Reilly, A & Sanders, K 2006, 'Research perspectives on the objects-early debate', Working group reports on ITiCSE on Innovation and technology in computer science education - ITiCSE-WGR '06, vol. 38, no. 4, pp. 146-146.
View/Download from: Publisher's site
Lister, R, Simon, B, Thompson, E, Whalley, JL & Prasad, C 2006, 'Not seeing the forest for the trees', ACM SIGCSE Bulletin, vol. 38, no. 3, pp. 118-122.
View/Download from: Publisher's site
View description>>
This paper reports on the authors use of the SOLO taxonomy to describe differences in the way students and educators solve small code reading exercises. SOLO is a general educational taxonomy, and has not previously been applied to the study of how novice programmers manifest their understanding of code. Data was collected in the form of written and think-aloud responses from students (novices) and educators (experts), using exam questions. During analysis, the responses were mapped to the different levels of the SOLO taxonomy. From think-aloud responses, the authors found that educators tended to manifest a SOLO relational response on small reading problems, whereas students tended to manifest a multistructural response. These results are consistent with the literature on the psychology of programming, but the work in this paper extends on these findings by analyzing the design of exam questions.
Lu, J, Ruan, D, Wu, F & Zhang, G 2006, 'An α-Fuzzy Goal Approximate Algorithm for Solving Fuzzy Multiple Objective Linear Programming Problems', Soft Computing, vol. 11, no. 3, pp. 259-267.
View/Download from: Publisher's site
Lu, J, Shi, C & Zhang, G 2006, 'On bilevel multi-follower decision making: General framework and solutions', INFORMATION SCIENCES, vol. 176, no. 11, pp. 1607-1627.
View/Download from: Publisher's site
View description>>
Within the framework of any bilevel decision problem, a leader's decision is influenced by the reaction of his or her follower. When multiple followers who may have had a share in decision variables, objectives and constraints are involved in a bilevel decision problem, the leader's decision will be affected, not only by the reactions of these followers, but also by the relationships among these followers. This paper firstly identifies nine different kinds of relationships (S1 to S9) amongst followers by establishing a general framework for bilevel multi-follower decision problems. For each of the nine a corresponding bilevel multi-follower decision model is then developed. Also, this paper particularly proposes related theories focusing on an uncooperative decision problem (i.e., S1 model), as this model is the most basic one for bilevel multi-follower decision problems over the nine kinds of relationships. Moreover, this paper extends the Kuhn-Tucker approach for driving an optimal solution from the uncooperative decision model. Finally, a real case study of a road network problem illustrates the application of the uncooperative bilevel decision model and the proposed extended Kuhn-Tucker approach. © 2005 Elsevier Inc. All rights reserved.
Lu, J, Yang, X & Zhang, G 2006, 'Support vector machine based approach in situation assessment', DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, vol. 13, no. B52, pp. 41-45.
McGregor, C, Schiefer, J & Muehlen, MZ 2006, 'A shareable web service-based intelligent decision support system for on-demand business process management', International Journal of Business Process Integration and Management, vol. 1, no. 3, pp. 156-156.
View/Download from: Publisher's site
View description>>
The monitoring of business processes for performance measurement is challenged by the variety of inter and intra organisational units and information systems involved in the execution of these processes. In this paper we present a shareable, web service-based Intelligent Decision Support System (IDSS) for on-demand business process management, that we call the Solution Manager Service (SMS). The SMS allows organisations to outsource the collection, accumulation and transformation of information about their business processes from multiple distributed systems across multiple organisations in a centralised repository and share them among authorised parties, such as supply chain partners, clients or government agencies. Copyright © 2006 Inderscience Enterprises Ltd.
Moiseenko, TI, Voinov, AA, Megorsky, VV, Gashkina, NA, Kudriavtseva, LP, Vandish, OI, Sharov, AN, Sharova, Y & Koroleva, IN 2006, 'Ecosystem and human health assessment to define environmental management strategies: The case of long-term human impacts on an Arctic lake', Science of The Total Environment, vol. 369, no. 1-3, pp. 1-20.
View/Download from: Publisher's site
Niazi, M, Wilson, D & Zowghi, D 2006, 'Critical success factors for software process improvement implementation: an empirical study', Software Process: Improvement and Practice, vol. 11, no. 2, pp. 193-211.
View/Download from: Publisher's site
View description>>
AbstractIn this article, we present findings from our recent empirical study of the critical success factors (CSFs) for software process improvement (SPI) implementation with 34 SPI practitioners. The objective of this study is to provide SPI practitioners with sufficient knowledge about the nature of issues that play a positive role in the implementation of SPI programmes in order to assist them in effectively planning SPI implementation strategies.Through our empirical study we identified seven factors (higher management support, training, awareness, allocation of resources, staff involvement, experienced staff and defined SPI implementation methodology) that are generally considered critical for successfully implementing SPI. We also report on a literature survey of CSFs that impact SPI and identify six factors (senior management commitment, staff involvement, staff time and resources, training and mentoring, creating process action teams and reviews). We compared our empirical study results with the literature and confirmed the factors identified in the literature, and also identified two new CSFs (SPI awareness and defined SPI implementation methodology) that were not identified in the literature. Finally, we analyzed the CSFs identified by different groups of practitioners and found that they are aware of what is imperative for the successful implementation of SPI programmes. Copyright © 2006 John Wiley & Sons, Ltd.
Oi, DKL, Devitt, SJ & Hollenberg, LCL 2006, 'Scalable Error Correction in Distributed Ion Trap Computers', Phys. Rev. A., vol. 74, no. 5, p. 052313.
View/Download from: Publisher's site
View description>>
A major challenge for quantum computation in ion trap systems is scalableintegration of error correction and fault tolerance. We analyze a distributedarchitecture with rapid high fidelity local control within nodes and entangledlinks between nodes alleviating long-distance transport. We demonstratefault-tolerant operator measurements which are used for error correction andnon-local gates. This scheme is readily applied to linear ion traps whichcannot be scaled up beyond a few ions per individual trap but which have accessto a probabilistic entanglement mechanism. A proof-of-concept system ispresented which is within the reach of current experiment.
RIZZO, D, MOUSER, P, WHITNEY, D, MARK, C, MAGAREY, R & VOINOV, A 2006, 'The comparison of four dynamic systems-based software packages: Translation and sensitivity analysis', Environmental Modelling & Software, vol. 21, no. 10, pp. 1491-1502.
View/Download from: Publisher's site
Seeram, NP, Henning, SM, Zhang, Y, Suchard, M, Li, Z & Heber, D 2006, 'Pomegranate Juice Ellagitannin Metabolites Are Present in Human Plasma and Some Persist in Urine for Up to 48 Hours', The Journal of Nutrition, vol. 136, no. 10, pp. 2481-2485.
View/Download from: Publisher's site
Shi, C, Lu, J, Zhang, G & Zhou, H 2006, 'An extended branch and bound algorithm for linear bilevel programming', APPLIED MATHEMATICS AND COMPUTATION, vol. 180, no. 2, pp. 529-537.
View/Download from: Publisher's site
View description>>
For linear bilevel programming, the branch and bound algorithm is the most successful algorithm to deal with the complementary constraints arising from Kuhn-Tucker conditions. However, one principle challenge is that it could not well handle a linear bilevel programming problem when the constraint functions at the upper-level are of arbitrary linear form. This paper proposes an extended branch and bound algorithm to solve this problem. The results have demonstrated that the extended branch and bound algorithm can solve a wider class of linear bilevel problems can than current capabilities permit. © 2006 Elsevier Inc. All rights reserved.
Simon, Cutts, Q, Haden, P, Sutton, K, Box, I, Hamer, J, Lister, R, Tolhurst, D, Fincher, S, Robins, A, Baker, B, de Raadt, M, Hamilton, M, Petre, M & Tutty, J 2006, 'The ability to articulate strategy as a predictor of programming skill', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 181-188.
View description>>
A multi-national, multi-institutional study investigating introductory programming courses drew on student participants from eleven institutions, mainly in Australasia, during the academic year of 2004. A number of diagnostic tasks were used to explore cognitive, behavioural, and attitudinal factors such as spatial visualisation and reasoning, the ability to articulate strategies for commonplace search and design tasks, and attitudes to studying. This paper reports in detail on the task that required participants to articulate a commonplace search strategy. The results indicate that increasing measures of richness of articulation of a search strategy are associated with higher marks in the course. © 2006, Australian Computer Society, Inc.
Simon, Fincher, S, Robins, A, Baker, B, Cutts, Q, Haden, P, Hamilton, M, Petre, M, Tolhurst, D, Box, I, de Raadt, M, Hamer, J, Lister, R, Sutton, K & Tutty, J 2006, 'Predictors of success in a first programming course', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 189-196.
View description>>
This paper describes a multi-national, multi-institutional study that investigated introductory programming courses .. Student participants were drawn from eleven institutions, mainly in Australasia, during the academic year of 2004. A number of diagnostic tasks were used to explore cognitive, behavioural, and attitudinal factors such as spatial visualisation and reasoning, the ability to articulate strategies for commonplace search and design tasks, and attitudes to studying. The results indicate that a deep approach to learning was positively correlated with mark for the course, while a surface approach was negatively correlated; spatial visualisation skills are correlated with success; a progression of map drawing styles identified in the literature has a significant correlation with marks; and increasing measures of richness of articulation of a search strategy are also associated with higher marks. Finally, a qualitative analysis of short interviews identified the qualities that students themselves regarded as important to success in programming. © 2006, Australian Computer Society, Inc.
Sood, SC & Pattinson, HM 2006, 'Urban renewal in Asia-Pacific: A comparative analysis of brainports for Sydney and Kuala Lumpur', Journal of Business Research, vol. 59, no. 6, pp. 701-708.
View/Download from: Publisher's site
View description>>
This paper reviews the concept of brainports and application to a South-East Asian context. The brainport concept is relevant for analysing transformation of an existing physical and information infrastructure, but a key finding of the research project i
Stallings, RL, Nair, P, Maris, JM, Catchpoole, D, McDermott, M, O'Meara, A & Breatnach, F 2006, 'High-resolution analysis of chromosomal breakpoints and genomic instability identifies PTPRD as a candidate tumor suppressor gene in neuroblastoma', CANCER RESEARCH, vol. 66, no. 7, pp. 3673-3680.
View/Download from: Publisher's site
View description>>
Although neuroblastoma is characterized by numerous recurrent, large-scale chromosomal imbalances, the genes targeted by such imbalances have remained elusive. We have applied whole-genome oligonucleotide array comparative genomic hybridization (median probe spacing 6 kb) to 56 neuroblastoma tumors and cell lines to identify genes involved with disease pathogenesis. This set of tumors was selected for having either 11q loss or MYCN amplification, abnormalities that define the two most common genetic subtypes of metastatic neuroblastoma. Our analyses have permitted us to map large-scale chromosomal imbalances and high-level amplifications at exon-level resolution and to identify novel microdeletions and duplications. Chromosomal breakpoints (n = 467) generating imbalances >2 Mb were mapped to intervals ranging between 6 and 50 kb in size, providing substantial information on each abnormality. For example, breakpoints leading to large-scale hemizygous loss of chromosome 11q were highly clustered and preferentially associated with segmental duplications. High-level amplifications of MYCN were extremely complex, often resulting in a series of discontinuous regions of amplification. Imbalances (n = 540) <2 Mb long were also detected. Although the majority (78%) of these imbalances mapped to segmentally duplicated regions and primarily reflect constitutional copy number polymorphisms, many subtle imbalances were detected that are likely somatically acquired alterations and include genes involved with tumorigenesis, apoptosis, or neural cell differentiation. The most frequent microdeletion involved the PTPRD locus, indicating a possible tumor suppressor function for this gene. ©2006 American Association for Cancer Research.
Tolhurst, D, Baker, B, Hamer, J, Box, I, Cutts, Q, de Raadt, M, Fincher, S, Haden, P, Hamilton, M, Lister, R, Petre, M, Robins, A, Simon, Sutton, K & Tutty, J 2006, 'Do map drawing styles of novice programmers predict success in programming? A multi-national, multi-institutional study', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 213-222.
View description>>
In this paper, we present the results of one aspect of a multinational, multi-institutional study of computer programming students. Specifically, this paper reports on an exploration of relationships between novice programmers' map-drawing styles (landmark, route or survey) and success in a first programming course at tertiary level. Relationships were found between map-drawing style and success of students in introductory programming courses, but there were mediating factors that resulted in some mixed findings between the countries in which data was collected. The results of this study identify some rich areas for further exploration, and suggests how this line of research might progress. © 2006, Australian Computer Society, Inc.
Tran, QNN, Low, G & Beydoun, G 2006, 'A methodological framework for ontology centric oriented software engineering', COMPUTER SYSTEMS SCIENCE AND ENGINEERING, vol. 21, no. 2, pp. 117-132.
Wang, GM & Ying, MS 2006, 'Unambiguous discrimination among quantum operations', PHYSICAL REVIEW A, vol. 73, no. 4, pp. 1-5.
View/Download from: Publisher's site
View description>>
We address the problem of unambiguous discrimination among a given set of quantum operations. The necessary and sufficient condition for them to be unambiguously distinguishable is derived in the cases of single use and multiple uses, respectively. For the latter case we explicitly construct the input states and corresponding measurements that accomplish the task. It is also found that the introduction of entanglement can improve the discrimination. © 2006 The American Physical Society.
Wei, Z & Ying, M 2006, 'A relation between fidelity and quantum adiabatic evolution', PHYSICS LETTERS A, vol. 356, no. 4-5, pp. 312-315.
View/Download from: Publisher's site
View description>>
Recently, some quantum algorithms have been implemented by quantum adiabatic evolutions. In this Letter, we discuss the accurate relation between the running time and the distance of the initial state and the final state of a kind of quantum adiabatic ev
Wei, Z, Ji, Z & Ying, M 2006, 'Majorization in quantum adiabatic algorithms', PHYSICAL REVIEW A, vol. 74, no. 4, pp. 1-7.
View/Download from: Publisher's site
View description>>
The majorization theory has been applied to analyze the mathematical structure of quantum algorithms. An empirical conclusion by numerical simulations obtained in the previous literature indicates that step-by-step majorization seems to appear universally in quantum adiabatic algorithms. In this paper, a rigorous analysis of the majorization arrow in a special class of quantum adiabatic algorithms is carried out. In particular, we prove that for any adiabatic algorithm of this class, step-by-step majorization of the ground state holds exactly. For the actual state, we show that step-by-step majorization holds approximately, and furthermore that the longer the running time of the algorithm, the better the approximation. © 2006 The American Physical Society.
Wei, ZH & Ying, MS 2006, 'A modified quantum adiabatic evolution for the Deutsch-Jozsa problem', PHYSICS LETTERS A, vol. 354, no. 4, pp. 271-273.
View/Download from: Publisher's site
View description>>
Deutsch-Jozsa algorithm has been implemented via a quantum adiabatic evolution by S. Das et al. [S. Das, R. Kobes, G. Kunstatter, Phys. Rev. A 65 (2002) 062310]. This adiabatic algorithm gives rise to a quadratic speed up over classical algorithms. We sh
Whalley, JL, Lister, R, Thompson, E, Clear, T, Robbins, P, Ajith Kumar, PK & Prasad, C 2006, 'An Australasian study of reading and comprehension skills in novice programmers, using the bloom and SOLO taxonomies', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 243-252.
View description>>
In this paper we report on a multi-institutional investigation into the reading and comprehension skills of novice programmers. This work extends previous studies (Lister 2004, McCracken 2001) by developing a question set within two key pedagogical frameworks: the Bloom and SOLO taxonomies. From this framework of analysis some interesting emergent patterns relating the cognitive level of the questions to student performance have been identified. © 2006, Australian Computer Society, Inc.
Wu, FJ, Lu, J & Zhang, GQ 2006, 'A new approximate algorithm for solving multiple objective linear programming problems with fuzzy parameters', APPLIED MATHEMATICS AND COMPUTATION, vol. 174, no. 1, pp. 524-544.
View/Download from: Publisher's site
View description>>
Many business decision problems involve multiple objectives and can thus be described by multiple objective linear programming (MOLP) models. When a MOLP problem is being formulated, the parameters of objective functions and constraints are normally assigned by experts. In most real situations, the possible values of these parameters are imprecisely or ambiguously known to the experts. Therefore, it would be more appropriate for these parameters to be represented as fuzzy numerical data that can be represented by fuzzy numbers. In this paper, a new approximate algorithm is developed for solving fuzzy multiple objective linear programming (FMOLP) problems involving fuzzy parameters in any form of membership functions in both objective functions and constraints. A detailed description and analysis of the algorithm are supplied. In addition, an example is given to illustrate the approximate algorithm. © 2005 Elsevier Inc. All rights reserved.
Ying, MS 2006, 'Linguistic quantifiers modeled by Sugeno integrals', ARTIFICIAL INTELLIGENCE, vol. 170, no. 6-7, pp. 581-606.
View/Download from: Publisher's site
View description>>
Since quantifiers have the ability of summarizing the properties of a class of objects without enumerating them, linguistic quantification is a very important topic in the field of high level knowledge representation and reasoning. This paper introduces
Zhang, C, Feng, YA & Ying, MS 2006, 'Unambiguous discrimination of mixed quantum states', PHYSICS LETTERS A, vol. 353, no. 4, pp. 300-306.
View/Download from: Publisher's site
View description>>
The problem of unambiguous discrimination between mixed quantum states is addressed by isolating the part of each mixed state which has no contribution to discrimination and by employing the strategy of set discrimination of pure states. A necessary and sufficient condition of unambiguous mixed state discrimination is presented. An upper bound of the efficiency is also derived. © 2006 Elsevier B.V. All rights reserved.
Zhang, C, Ying, M & Qiao, B 2006, 'Universal programmable devices for unambiguous discrimination', PHYSICAL REVIEW A, vol. 74, no. 4, pp. 1-9.
View/Download from: Publisher's site
View description>>
We discuss the problem of designing unambiguous programmable discriminators for any n unknown quantum states in an m -dimensional Hilbert space. The discriminator is a fixed measurement that has two kinds of input registers: the program registers and the data register. The quantum state in the data register is what users want to identify, which is confirmed to be among the n states in program registers. The task of the discriminator is to tell the users which state stored in the program registers is equivalent to that in the data register. First, we give a necessary and sufficient condition for judging an unambiguous programmable discriminator. Then, if m=n, we present an optimal unambiguous programmable discriminator for them, in the sense of maximizing the worst-case probability of success. Finally, we propose a universal unambiguous programmable discriminator for arbitrary n quantum states. © 2006 The American Physical Society.
Zhang, G & Lu, H 2006, 'Hybrid Real-Coded Genetic Algorithm with Quasi-Simplex Technique', INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, vol. 6, no. 10, pp. 246-255.
Al-Oqaily, A & Kennedy, PJ 1970, 'Using a kernel-based approach to visualize integrated Chronic Fatigue Syndrome datasets', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, ACS, Sydney Australia, pp. 53-61.
View description>>
We describe the use of a kernel-based approach using the Laplacian matrix to visualize an integrated Chronic Fatigue Syndrome dataset comprising symptom and fatigue questionnaire and patient classification data, complete blood evaluation data and patient gene expression profiles. We present visualizations of the individual and integrated datasets with the linear and Gaussian kernel functions. An efficient approach inspired by computational linguistics for constructing a linear kernel matrix for the gene expression data is described. Visualizations of the questionnaire data show a cluster of non-fatigued individuals distinct from those suffering from Chronic Fatigue Syndrome that supports the fact that diagnosis is generally made using this kind of data. Clusters unrelated to patient classes were found in the gene expression data. Structure from the gene expression dataset dominated visualizations of integrated datasets that included gene expression data. © 2006, Australian Computer Society, Inc.
Apeh, ET & Gabrys, B 1970, 'Clustering for Data Matching', KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 10th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Bournemouth, ENGLAND, pp. 1216-1225.
View/Download from: Publisher's site
Azadeh, A, Ghaderi, SF, Tarverdian, S & Saberi, M 1970, 'Integration of Artificial Neural Networks and Genetic Algorithm to Predict Electrical Energy consumption', IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IEEE, pp. 2552-2557.
View/Download from: Publisher's site
View description>>
This study presents an integrated genetic algorithm (GA) and artificial neural network (ANN) to estimate and predict electricity demand using stochastic procedures. The economic indicators used in this paper are price, value added, number of customers and consumption in the previous periods. This model can be used to estimate energy demand in the future by optimizing parameter values. The GA applied in this study has been tuned for all its parameters and the best coefficients with minimum error are identified, while all parameter values are tested concurrently. The estimation errors of genetic algorithm model are less than that of estimated by regression method. Neural network is used to forecast each independent variable and then electricity consumption is forecasted up to year 2008.It is shown that neural networks dominate time series approach form the point of yielding less Mean Absolute Percentage Error (MAPE) error.. In addition, another unique feature of this study is utilization of ANN instead of time series to obtain better predictions for energy consumption. Electricity consumption in Iranian agriculture sector from 1981 to 2005 is considered as the case of this study. © 2006 IEEE.
Azadeh, A, Ghaderi, SF, Tarverdian, S & Saberi, M 1970, 'Integration of artificial neural networks and genetic algorithm to predict electrical energy consumption', IECON 2006 - 32ND ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS, VOLS 1-11, 32nd Annual Conference of the IEEE-Industrial-Electronics-Society, IEEE, Paris, FRANCE, pp. 4834-+.
Azadeh, A, Moghadam, RT, Ghaderi, SF, Tarverdian, S & Saberi, M 1970, 'Integration of Artificial Neural Networks and Genetic Algorithm to Predict Electrical Energy Consumption in Energy Intensive Sector', 2006 1ST IEEE International Conference on E-Learning in Industrial Electronics, 2006 1ST IEEE International Conference on E-Learning in Industrial Electronics, IEEE, Hammamet, TUNISIA, pp. 58-63.
View/Download from: Publisher's site
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring Performance Electric Power Generations Using Artificial Neural Networks', 2006 IEEE International Conference on Industrial Technology, 2006 IEEE International Conference on Industrial Technology, IEEE, pp. 7-12.
View/Download from: Publisher's site
View description>>
efficiency frontier analysis has been an important approach of evaluating firms' performance in private and public sectors. There have been many efficiency frontier analysis methods reported in the literature. However, the assumptions made for each of these methods are restrictive. Each of these methodologies has its strength as well as major limitations. This study proposes a non-parametric efficiency frontier analysis method based on the adaptive neural network technique for measuring efficiency as a complementary tool for the common techniques of the efficiency studies in the previous studies. The proposed computational method is able to find a stochastic frontier based on a set of input-output observational data and do not require explicit assumptions about the function structure of the stochastic frontier. In this algorithm, for calculating the efficiency scores, a similar approach to econometric methods has been used. Moreover, the effect of the return to scale of decision making unit (DMU) on its efficiency is included and the unit used for the correction is selected by notice of its scale (under constant return to scale assumption). An example using real data is presented for illustrative purposes, in the application to the power generation sector of Iran, we find that the neural network provide more robust results and identifies more efficient units than the conventional methods since better performance patterns are explored. Moreover, principle component analysis (PCA) and numerical taxonomy (NT) are used to verify the findings of the purposed algorithm.
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring performance electric power generations using artificial neural networks', 2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, IEEE International Conference on Industrial Technology, IEEE, INDIA, Bombay, pp. 379-+.
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring performance electric power generations using artificial neural networks and fuzzy clustering', IECON 2006 - 32ND ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS, VOLS 1-11, 32nd Annual Conference of the IEEE-Industrial-Electronics-Society, IEEE, FRANCE, Paris, pp. 4595-+.
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring Performance Electric Power Generations Using Artificial Neural Networks and Fuzzy Clustering', IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IEEE, pp. 4761-4766.
View/Download from: Publisher's site
View description>>
Efficiency frontier analysis has been an important approach of evaluating firms' performance in private and public sectors. There have been many efficiency frontier analysis methods reported in the literature. However, the assumptions made for each of these methods are restrictive. Each of these methodologies has its strength as well as major limitations. This study proposes a non-parametric efficiency frontier analysis method based on the adaptive neural network technique for measuring efficiency as a complementary tool for the common techniques of the efficiency studies in the previous studies. The proposed computational methods are able to find a stochastic frontier based on a set of input-output observational data and do not require explicit assumptions about the function structure of the stochastic frontier. In purposed algorithm, for calculating the efficiency scores, a similar approach to econometric methods has been used and the effect of the scale of decision making unit (DMU) on its efficiency is included and the unit used for the correction is selected by notice of its scale. For increasing homogeneousness, the algorithm is proposed that use Fuzzy C-means method to cluster DMUs. An example using real data is presented for illustrative purposes. In the application to the power generation sector of Iran, we find that the neural network provide more robust results to rank decision making units than the conventional methods. © 2006 IEEE.
Azadeh, MA, Ghaderi, SF, Guitiforooz, A & Saberi, M 1970, 'Improved Estimation of Electricity Demand Function by Integration of Fuzzy System and Data Mining Approach', 2006 IEEE International Conference on Industrial Technology, 2006 IEEE International Conference on Industrial Technology, IEEE, pp. 2160-2165.
View/Download from: Publisher's site
View description>>
This paper presents an integrated fuzzy system and data mining approach for estimation of electricity demand function in Iran. To construct fuzzy systems, a rule base is needed. Because a rule base is not available, for the case of demand function, look up table which is one of the extracting rule methods is used to extract the rule base. But the extraction by look up table in this case (demand function) operates poorly. Therefore, decision tree method which is a data mining approach is utilized to extract the rule base. It can be seen that this method provides better solution. The case study is based on the total electricity consumption in Iran from 1992 to 2004. The prescribed approach may be an ideal substitute for fuzzy regression. At last, relative results of the mentioned methods are compared with ARIMA (Auto Regressive Integrated Moving Average) model, which is one of the most famous time series models.
Azadeh, MA, Ghaderi, SF, Guitiforooz, A & Saberi, M 1970, 'Improved estimation of electricity demand function by integration of fuzzy system and data mining approach', 2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, IEEE International Conference on Industrial Technology, IEEE, Bombay, INDIA, pp. 2742-+.
Bachfischer, A, Lawrence, EM, Culjak, G & Prior, JR 1970, 'Online Teaching of large Groups in Information Technology: a survey of strategies', Proceedings of IADIS Internatoinal Conference e-Society 2006, IADIS International Conference e-Society, IADIS Press, Dublin, Ireland, pp. 201-209.
Beauregard, M & Kennedy, PJ 1970, 'Robust Simulation of Lamprey Tracking', Parallel problem solving from nature - PPSN, Parallel Problem Solving from Nature, Springer Berlin Heidelberg, Rejkavik, Iceland, pp. 641-650.
View/Download from: Publisher's site
View description>>
Biologically realistic computer simulation of vertebrates is a challenging problem with exciting applications in computer graphics and robotics. Once the mechanics of locomotion are available it is interesting to mediate this locomotion with higher level behavior such as target tracking. One recent approach simulates a relatively simple vertebrate, the lamprey, using recurrent neural networks to model the central pattern generator of the spine and a physical model for the body. Target tracking behavior has also been implemented for such a model. However, previous approaches suffer from deficiencies where particular orientations of the body to the target cause the central pattern generator to shutdown. This paper describes an approach to making target tracking more robust.
Beauregard, M, Kennedy, PJ & Debenham, J 1970, 'Fast simulation of animal locomotion: lamprey swimming', IFIP Advances in Information and Communication Technology, World Computer Congress, Springer US, Santiago, Chile, pp. 247-256.
View/Download from: Publisher's site
View description>>
© 2006 by International Federation for Information Processing. All rights reserved. Biologically realistic computer simulation of vertebrate locomotion is an interesting and challenging problem with applications in computer graphics and robotics. One current approach simulates a relatively simple vertebrate, the lamprey, using recurrent neural networks for the spine and a physical model for the body. The model is realized as a system of differential equations. The drawback with this approach is the slow speed of simulation. This paper describes two approaches to speeding up simulation of lamprey locomotion without sacrificing too much biological realism: (i) use of superior numerical integration algorithms and (ii) simplifications to the neural architecture of the lamprey.
Bergin, J, Lister, R, Owens, BB & McNally, M 1970, 'The first programming course', Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, ITiCSE06: 11th Annual Conference on Innovation and Technology in Computer Science Education, ACM, pp. 301-302.
View/Download from: Publisher's site
View description>>
This panel will discuss ways to engage undergraduates in computing and then to keep them as majors. A special emphasis will be on attracting females to computing. The panelists will discuss the relative strengths and weaknesses of four environments especially designed for the teaching of the first programming course.
Beydoun, G, Gonzalez-Perez, C, Henderson-Sellers, B & Low, G 1970, 'Developing and evaluating a generic metamodel for MAS work products', SOFTWARE ENGINEERING FOR MULTI-AGENT SYSTEMS IV: RESEARCH ISSUES AND PRACTICAL APPLICATIONS, International Conference on Software Engineering, Springer-Verlag Berlin, Saint Louis, USA, pp. 126-142.
View description>>
MAS development requires an appropriate methodology. Rather than seek a single, ideal methodology, we investigate the applicability of method engineering, which focuses on project-specific methodology construction from existing method fragments and provides an appealing approach to organize, appropriately access and effectively harness the software engineering knowledge of MAS methodologies. In this context, we introduce a generic metamodel to serve as a representational infrastructure to unify the work product component of MAS methodologies. The resultant metamodel does not focus on any class of MAS, nor does it impose any restrictions on the format of the system requirements; rather, it is an abstraction of how the work product elements in any MAS are structured and behave both at design time and run-time. Furthermore, in this paper we validate this representational infrastructure by analysing two wellknown existing MAS metamodels. We sketch how they can be seen as subtypes of our generic metamodel, providing early evidence to support the use of our metamodel towards the construction of situated MAS methodologies. © Springer-Verlag Berlin Heidelberg 2006.
Beydoun, G, Tran, N, Low, G & Henderson-Sellers, B 1970, 'Foundations of ontology-based MAS methodologies', AGENT-ORIENTED INFORMATION SYSTEMS III, Agent-Oriented Information Systems Workshop, Springer, Netherlands and Austria, pp. 111-123.
View/Download from: Publisher's site
View description>>
Support for software extensibility, interoperability and reuse are critical concerns for long term commercial viability of any MAS and they underpin the eventual adoption of agent technology by industry. Existing AOSE methodologies lack adequate support for these concerns. We argue in this paper that a methodology that uses ontologies as a central modelling artifact, beyond the analysis phase, is better equipped to address those concerns. We observe that the influence of ontologies in Knowledge-based Systems (KBS) methodologies extended well beyond the initial analysis phase, leading to domain-independent KBS methodologies in the 90s. We reflect on those lessons and on the roles of ontologies in KBS development. We analyse and identify which of those roles can be transferred to an ontology-based MAS development methodology. We identify ontology-related inter-dependencies between the analysis and design phases. We produce a set of recommendations towards creating a domain-independent MAS methodology that incorporates ontologies beyond the analysis phase. We identify the essential features and sketch the characteristic tasks within both the analysis and design phases.
Cetindamar, D, Can, O & Pala, O 1970, 'Technology Management Activities and Tools: The Practice in Turkey', 2006 Technology Management for the Global Future - PICMET 2006 Conference, 2006 Technology Management for the Global Future - PICMET 2006 Conference, IEEE, pp. 92-98.
View/Download from: Publisher's site
View description>>
The diffusion of management techniques is as difficult as the diffusion of technologies. This paper aims to find out how technology management is perceived and utilized in Turkish firms. The research is based on a survey that consists of 89 company responses out of the biggest 500 firms in the Turkish industry. The investigation consists of 1) the degree of diffusion in terms of technology management activities such as technology planning as well as 2) the techniques and tools used in technology management such as simulation. The literature review indicates 11 technology management activities ranging from strategy to utilization and 36 technology management techniques / tools. The results show that Turkish managers try to utilize technologies rather than creating them and they use 11 techniques more often than others and many important tools such as technology life cycle are not diffused yet. The paper ends with a discussion of findings. (c) 2006 PICMET.
Chang, E, Hussain, FK & Dillon, T 1970, 'Reputation ontology for reputation systems', On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, pp. 1724-1733.
View/Download from: Publisher's site
View description>>
The growing development of web-based reputation systems in the 21 century will have a powerful social and economic impact on both business entities and individual customers, because it makes transparent quality assessment on products and services to achieve customer assurance in the distributed web-based Reputation Systems. The web-based reputation systems will be the foundation for web intelligence in the future. Trust and Reputation help capture business intelligence through establishing customer trust relationships, learning consumer behavior, capturing market reaction on products and services, disseminating customer feedback, buyers' opinions and end-user recommendations. It also reveals dishonest services, unfair trading, biased assessment, discriminatory actions, fraudulent behaviors, and un-true advertising. The continuing development of these technologies will help in the improvement of professional business behavior, sales, reputation of sellers, providers, products and services. Given the importance of reputation in this paper, we propose ontology for reputation. In the business world we can consider the reputation of a product or the reputation of a service or the reputation of an agent. In this paper we propose ontology for these entities that can help us unravel the components and conceptualize the components of reputation of each of the entities. © Springer-Verlag Berlin Heidelberg 2006. st
Chen, C, Dong, D & Chen, Z 1970, 'Grey Reinforcement Learning for Incomplete Information Processing', Springer Berlin Heidelberg, pp. 399-407.
View/Download from: Publisher's site
Chen, C, Dong, D, Dong, Y & Shi, Q 1970, 'A Quantum Reinforcement Learning Method for Repeated Game Theory', 2006 International Conference on Computational Intelligence and Security, 2006 International Conference on Computational Intelligence and Security, IEEE, pp. 68-72.
View/Download from: Publisher's site
Chen, Z, Dong, D & Zhang, C 1970, 'Quantum control based on quantum information', 2006 CHINESE CONTROL CONFERENCE, VOLS 1-5, 25th Chinese Control Conference, IEEE, PEOPLES R CHINA, Harbin, pp. 1258-+.
Chin-Teng Lin, Hung-Yi Hsieh, Li-Wei Ko, May Lin & Sheng-Fu Liang 1970, 'Development of portable wireless brain computer interface with embedded systems', 2006 IEEE Biomedical Circuits and Systems Conference, 2006 IEEE Biomedical Circuits and Systems Conference - Healthcare Technology (BioCas), IEEE, pp. 226-229.
View/Download from: Publisher's site
View description>>
In this paper, we propose an embedded multi-task scheduling system to make the wireless brain computer interface to real-time receive electroencephalogram signal more accurate. This method we propose also can increase the flexibility of the system. Base on the method, we can change the peripheral devices easily. And the tasks are taken as modules, so it also can increase the flexibility of system programs. The proposed system integrates electroencephalogram signal amplifier technique, wireless transmission technique, and embedded real-time system. The OMAP (Open Multimedia Architecture Platform) is used as a development platform and an embedded operating system is also used. © 2006 IEEE.
Chin-Teng Lin, Yuan-Chu Yu & Lan-Da Van 1970, 'A low-power 64-point FFT/IFFT design for IEEE 802.11a WLAN application', 2006 IEEE International Symposium on Circuits and Systems (ISCAS), 2006 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, pp. 4 pp.-4526.
View/Download from: Publisher's site
Christen, P, Kennedy, PJ, Li, J, Simoff, SJ & Williams, G 1970, 'Data Mining 2006: Proceedings of the Australasian Data Mining Conference (AusDM 2006)', Data Mining 2006: Proceedings of the Australasian Data Mining Conference (AusDM 2006), Australian Data Mining Conference, Australian Computer Society, Sydney.
Corchado, E, Baruque, B & Gabrys, B 1970, 'Maximum Likelihood Topology Preserving Ensembles', INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2006, PROCEEDINGS, 7th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2006), Springer Berlin Heidelberg, Univ Burgos, Burgos, SPAIN, pp. 1434-1442.
View/Download from: Publisher's site
Curry, J, McGregor, C, Tracy, S & IEEE 1970, 'A communication tool to improve the patient journey modeling process', 2006 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-15, 28th Annual International Conference of the IEEE-Engineering-in-Medicine-and-Biology-Society, IEEE, New York, NY, pp. 901-905.
Daoyi, D, Chunlin, C & Li Hanxiong 1970, 'Reinforcement Strategy Using Quantum Amplitude Amplification for Robot Learning', 2007 Chinese Control Conference, 2007 Chinese Control Conference, IEEE, pp. 571-575.
View/Download from: Publisher's site
Dong, D, Chen, C, Chen, Z & Zhang, C 1970, 'Control of Five-qubit System Based on Quantum Reinforcement Learning', 2006 International Conference on Computational Intelligence and Security, 2006 International Conference on Computational Intelligence and Security, IEEE, pp. 164-167.
View/Download from: Publisher's site
Dong, D, Chen, C, Chen, Z & Zhang, C 1970, 'Estimation-based information acquisition in quantum feedback control', DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, International Conference on Complex Systems and Applications, WATAM PRESS, PEOPLES R CHINA, Huhhot, pp. 1204-1208.
Doyle, BJ & Lister, RF 1970, 'Apreliminary phenomenographic study concerning student experiences of UNIX', Proceedings of the 19th annual conference of the national advisory comittee on computing qualifications, National Advisory Committee on Computing Qualifications, National advisory comittee on computing qualifications, Wellington, pp. 73-78.
Dyson, LE & Leggett, MG 1970, 'Towards a metadesign approach for building indigenous multimedia cultural archives', Proceedings of the 12th ANZSYS Conference, Sustaining Our Social and Natural Capital, Annual ANZSYS conference, ISCE Publishing, Katoomba, Australia, pp. 82-87.
Dyson, LE, Salazar, F, Hendriks, M, Underwood, J & Kay, RJ 1970, 'ICTS for intercultural dialogue: an overview of UNESCO's indigenous communication project', Cultural attitudes towards technology and communication, Cultural Attitudes towards Technology and Communications, Murdoch University, Tartu, Estonia, pp. 340-359.
Farookh Khadeer Hussain 1970, 'Comparative Analysis of Trust and Security', 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, IEEE, pp. 1019-1023.
View/Download from: Publisher's site
View description>>
In the literature, there is a lot of confusion regarding the relationship between the 'trust' and 'security'. Most of the times, these terms are regarded as being synonymous with each other. The existing literature does not draw a clear line how and when the terms of 'trust' and 'security' are synonymous and when they are not synonymous. In this paper we address this issue and discuss when the distinct terms of 'trust' and 'security' can be regarded as being synonymous with each other and when they could be regarded as not being synonymous with each other. © 2006 IEEE.
Farookh Khadeer Hussain 1970, 'Trust Issues in Service Oriented Environment', 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, IEEE, pp. 790-793.
View/Download from: Publisher's site
View description>>
Service Oriented Environment (SOE) is new paradigm for carrying out business activities on the internet. In this paper I give an introduction to the concept of service oriented environment and discuss the different activities carried out in the SOE and different entities involved in SOE. The issues related to trust in service oriented environment and proposed and explained. © 2006 IEEE.
Gabrys, B, Baruque, B & Corchado, E 1970, 'Outlier Resistant PCA Ensembles', KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 10th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Bournemouth, ENGLAND, pp. 432-440.
View/Download from: Publisher's site
Gill, AQ & Henderson-Sellers, B 1970, 'Measuring agility and adaptibility of agile methods: A 4 dimensional analytical tool', Proceedings of the IADIS international conference on applied computing 2006, The IADIS international conference on applied computing 2006, IADIS Press, San Sebastian Spain, pp. 503-507.
Goyal, M, Lu, J & Zhang, G 1970, 'A novel fuzzy attitude based bidding strategy for multi-attribute auction', 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, Workshops Proceedings, IEEE/WIC/ACM international Conference on Web Intelligence and Intelligent Agent Technology, Conference publicity services, Hong Kong, China, pp. 535-539.
View/Download from: Publisher's site
View description>>
Auctions have recently commanded a lot of attention in the field of multi-agent systems. To be successful in open multi-attribute auctions, agents must be capable of adapting different strategies and tactics to their prevailing circumstances. This paper presents a software test-bed for studying autonomous bidding strategies in simulated auctions for procuring goods. It shows that agents' bidding strategy explore the attitudes and behaviors that help agents to manage dynamic assessment of alternative prices of goods given the different scenario conditions. Our agent also uses fuzzy techniques for the decision making: to make decisions about the outcome of auctions, and to alter the agent's bidding strategy in response to the different criteria and market conditions
Guo, Y, Chen, J, Zhu, J, Lu, H, Lu, H & Jin, J 1970, 'An Improved Phase Variable Model for Dynamic Performance Analysis of a PM Claw Pole SMC Motor with Brushless DC Control', Proceedings of the Australasian Universities Power Engineering Conference, Australasian Universities Power Engineering Conference, Victoria University, Melbourne, Australia, pp. 1-6.
Guo, Y, Jin, J, Zhu, J & Lu, H 1970, 'Design and Performance Evaluation of a PM Linear Synchronous Motor for Maglev Transportation', Proceedings of the Australasian Universities Power Engineering, Australasian Universities Power Engineering Conference, Victoria, University, Melbourne, Australia, pp. 1-5.
Guo, YG, Zhu, JG, Lin, ZW, Zhong, JJ, Lu, HY & Wang, SH 1970, '3D Magnetic Reluctivity Tensor of Soft Magnetic Composite Material', 2006 12th Biennial IEEE Conference on Electromagnetic Field Computation, 2006 12th Biennial IEEE Conference on Electromagnetic Field Computation, IEEE, pp. 91-91.
View/Download from: Publisher's site
View description>>
Soft magnetic composite (SMC) materials are particularly suitable for construction of electrical machines with complex structure and 3D magnetic flux. For design and analysis of such 3D flux machines, 3D magnetic properties of the magnetic materials should be properly determined, modeled and applied for calculating the magnetic field distribution, parameters and performance. This paper presents the 3D magnetic property measurement and determination of 3D reluctivity tensor of SMC. The reluctivity tensor is a key factor for the numerical analysis of magnetic field in a 3D flux SMC motor. ©2006 IEEE.
Guoli Zhang, Hai Yan Lu, Gengyin Li & Hong Xie 1970, 'A New Hybrid Real-Coded Genetic Algorithm and Application in Dynamic Economic Dispatch', 2006 6th World Congress on Intelligent Control and Automation, 2006 6th World Congress on Intelligent Control and Automation, IEEE, Dalian, China, pp. 3627-3632.
View/Download from: Publisher's site
Han, D, Xiao, C, Zhou, R, Wang, G, Huo, H & Hui, X 1970, 'Load Shedding for Window Joins over Streams', Springer Berlin Heidelberg, pp. 472-483.
View/Download from: Publisher's site
Hao, Z, Wen, W, Yang, X, Lu, J & Zhang, G 1970, 'A fast data preprocessing procedure for support vector regression', INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2006, PROCEEDINGS, International Conference on Intelligent Data Engineering and Automated Learning, Springer-Verlag, BURJOS, Spain, pp. 48-56.
View/Download from: Publisher's site
View description>>
A fast data preprocessing procedure (FDPP) for support vector regression (SVR) is proposed in this paper. In the presented method, the dataset is firstly divided into several subsets and then K-means clustering is implemented in each subset. The clusters are classified by their group size. The centroids with small group size are eliminated and the rest centroids are used for SVR training. The relationships between the group sizes and the noisy clusters are discussed and simulations are also given. Results show that FDPP cleans most of the noises, preserves the useful statistical information and reduces the training samples. Most importantly, FDPP runs very fast and maintains the good regression performance of SVR.
Hollenberg, LCL, Greentree, AD, Wellard, CJ, Fowler, AG, Devitt, SJ & Cole, JH 1970, 'Qubit Transport and Fault-tolerant Architectures in Silicon', 2006 International Conference on Nanoscience and Nanotechnology, 2006 International Conference on Nanoscience and Nanotechnology, IEEE, pp. 348-350.
View/Download from: Publisher's site
View description>>
We review a new adiabatic scheme - coherent spin transport by adiabatic passage (CSTAP) - for physical qubit transport particularly suited to atomic and solid-state systems. Several applications immediately follow, including a 2D Si:P donor electron spin architecture for quantum computing, and protocols for generating entangled states across non-local qubits. © 2006 IEEE.
Hollenberg, LCL, Greentree, AD, Wellard, CJ, Fowler, AG, Devitt, SJ & Cole, JH 1970, 'Qubit Transport and Fault-tolerant Architectures in Silicon', 2006 INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY, VOLS 1 AND 2, International Conference on Nanoscience and Nanotechnology, IEEE, AUSTRALIA, Brisbane, pp. 655-+.
Hsieh, H-Y, Liang, S-F, Ko, L-W, Lin, M & Lin, C-T 1970, 'Development of a Real-Time Wireless Embedded Brain Signal Acquisition/Processing System and its Application on Driver's Drowsiness Estimation', 2006 IEEE International Conference on Systems, Man and Cybernetics, 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, pp. 4374-4379.
View/Download from: Publisher's site
View description>>
In this paper, a portable real-time wireless embedded brain signal acquisition/processing system is developed. The proposed system integrates electroencephalogram signal amplifier technique, wireless transmission technique, and embedded real-time system. The development strategy of this system contains three parts: First, the Bluetooth protocol is used as a transmission interface and integrated with the bio-signal amplifier to transmit the measured physiological signals wirelessly. Second, the OMAP (Open Multimedia Architecture Platform) is used as a development platform and an embedded operating system for OMAP is also designed. Finally, DSP Gateway is developed as a mechanism to deal with the brain-signal analyzing tasks shared by ARM and DSP. A driver's cognitive-state estimation program has been developed and implemented on the proposed dual core processor-based real time wireless embedded system for demonstration. © 2006 IEEE.
Huang, C-H & Lin, C-T 1970, 'Image Enhancement Algorithm for Hexagonal Cellular Neural Networks', APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems, IEEE, Singapore, SINGAPORE, pp. 386-389.
View/Download from: Publisher's site
Huang, C-H, Koeppl, H & Lin, C-T 1970, 'A Bio-inspired Computer Fovea Model based on Hexagonal-type Cellular Neural Networks', The 2006 IEEE International Joint Conference on Neural Network Proceedings, The 2006 IEEE International Joint Conference on Neural Network Proceedings, IEEE, Vancouver, CANADA, pp. 5189-5195.
View/Download from: Publisher's site
Hui, X, Wang, G, Huo, H, Xiao, C & Zhou, R 1970, 'Region-Based Coding for Queries over Streamed XML Fragments', Springer Berlin Heidelberg, pp. 487-498.
View/Download from: Publisher's site
Huo, H, Wang, G, Hui, X, Xiao, C & Zhou, R 1970, 'Document Fragmentation for XML Streams Based on Query Statistics', Springer Berlin Heidelberg, pp. 350-356.
View/Download from: Publisher's site
Huo, H, Wang, G, Hui, X, Zhou, R, Ning, B & Xiao, C 1970, 'Efficient Query Processing for Streamed XML Fragments', Springer Berlin Heidelberg, pp. 468-482.
View/Download from: Publisher's site
Huo, H, Zhou, R, Wang, G, Hui, X, Xiao, C & Yu, Y 1970, 'Efficient Evaluation of Multiple Queries on Streamed XML Fragments', Springer Berlin Heidelberg, pp. 61-72.
View/Download from: Publisher's site
Hussain, F, Chang, E & Dillon, T 1970, 'Ontological Manifestation of Trust for Service Oriented Environment', 2006 IEEE International Conference on Industrial Informatics, 2006 IEEE International Conference on Industrial Informatics, IEEE, Singapore, pp. 593-598.
View/Download from: Publisher's site
View description>>
Trust and reputation are vital components for trusted e-business. In the literature however there has been no effort in proposing ontology for trust. The trusted agent in service oriented environment may trust a software agent or human agent or a service or a product. Based on this distinction, trust ontology could be proposed for different domains .The trust ontology for the individual domains is proposed and discussed.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Aspects Influencing Trustworthiness In Service Oriented Environments', 22nd International Conference on Data Engineering Workshops (ICDEW'06), 22nd International Conference on Data Engineering Workshops (ICDEW'06), IEEE, pp. 99-99.
View/Download from: Publisher's site
View description>>
© 2006 IEEE. Transactions have moved away from faceto- face encounters to more being on the Internet. The infrastructure for the business and information exchange activities could be client-server, peer-To-peer (P2P), or mobile networks. In this paper we refer to 'peer' as an entity involved in a transaction. Trust between two interacting peers involved in an electronic transaction is a major issue that needs to be addressed in order to make the internet a safe medium for carrying out transactions. In this paper, we propose the aspects that can influence the trustworthiness assigned to the trusted peer. Furthermore we catalogue these factors into three classes and discuss the relationship between these factors.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Comparative Analysis of Trust and Security', 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, IEEE, pp. 1019-1023.
View/Download from: Publisher's site
Hussain, FK, Chang, E & Dillon, TS 1970, 'Defining Reputation in Service Oriented Environment', Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), IEEE, pp. 177-177.
View/Download from: Publisher's site
View description>>
Reputation has a profound impact on the Trusting Agent and Trusted Agent in business interactions. Moral, ethical and legal guidelines are implemented as a result of the promotion of fair trading practices, honesty from all parties, consumer protection legislation, service quality assessment, and assurance for customers, e-businesses and service-oriented environments. In this paper we propose a definition of reputation that is more suited to service oriented environments. Additionally we explain in detail, all the terms in the definition. © 2006 IEEE.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Defining Trustworthiness in Service Oriented Environment', 2006 2nd International Conference on Information & Communication Technologies, 2006 2nd International Conference on Information & Communication Technologies, IEEE, pp. 3616-3621.
View/Download from: Publisher's site
View description>>
© 2006 IEEE. In the existing literature we note that there has been no effort in proposing a definition of trustworthiness. In this paper, we propose a definition of trustworthiness with focus on service oriented environments. In addition, we propose and discuss in detail the various factors which can affect the trustworthiness assigned by the trusting agent to the trusted agent.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Quantification of the effectiveness of the Markov model for trustworthiness prediction', Computational Intelligence, Theory and Application, International Conference on Dortmund Fuzzy Days, Springer-verlag Berlin, Dortmund, GERMANY, pp. 191-200.
View/Download from: Publisher's site
View description>>
In this paper we propose a method for determining the effectiveness of the Markov Model for predicting the future trustworthiness value of a given agent by utilizing simulation methods. This paper presents in detail the simulation method that we employed
Hussain, FK, Chang, E & Dillon, TS 1970, 'Trust Issues in Service Oriented Environment', 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, IEEE, pp. 790-793.
View/Download from: Publisher's site
Hussain, FK, Chang, E & Dillon, TS 1970, 'Trustworthiness Measurement methodology for e-business', Advances in Web Intelligence and Data Mining, International Atlantic Web Intelligence Conference, Springer-verlag Berlin, Beer Sheva, ISRAEL, pp. 21-30.
View description>>
The purpose of the Trustworthiness Measure is to (a) to determine the quality of the Trusted Agents and (b) once the trusting agent has determined and recorded the trustworthiness of the trusted agent or the quality of the trusted agent, the trusting age
Hussain, FK, Chang, E, Dillon, TS & IEEE 1970, 'Reputation relationship and its inner relationships for service oriented environments', 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 641-646.
View/Download from: Publisher's site
View description>>
Trust and Reputation are vital components for trusted e-business. In this paper, we propose a definition of trust relationship. Additionally we discuss in depth about the concept of trust relationship. A definition for reputation relationship is proposed
Hussain, FK, Chang, E, Dillon, TS & IEEE 1970, 'Trust ontology for service-oriented environment', 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 320-325.
View/Download from: Publisher's site
View description>>
Trust and Reputation are vital components for trusted e-business. In the literature however there has been no effort in proposing ontology for trust. The trusted agent in service oriented environment may trust a software agent or human agent or a service
Hussain, FK, Chang, E, Dillon, TS & IEEE 1970, 'Trust relationships and reputation relationships for service oriented environments', 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 508-510.
View/Download from: Publisher's site
View description>>
Trust and Reputation are vital components for trusted e-business. In this paper, we propose a definition of trust relationship. Additionally we discuss in depth about the concept of trust relationship. A definition for reputation relationship is proposed
Hussain, FK, Sidhu, AS, Dillon, TS & Chang, E 1970, 'Engineering trustworthy ontologies: Case study of protein ontology', 19TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS, IEEE Symposium on Computer-Based Medical Systems, IEEE Computer Soc, Salt Lake City, UT, pp. 617-620.
View/Download from: Publisher's site
View description>>
Biomedical Ontologies are huge. It is not possible for any one person to manage and engineer a complete ontology. They would need the help of Research Assistants and other people to develop and maintain the ontology. In the process of developing and main
Hussain, O, Chang, E, Hussain, F & Dillon, T 1970, 'Quantifying Risk in Financial Terms in an e-Transaction', 2006 IEEE International Conference on Industrial Informatics, 2006 IEEE International Conference on Industrial Informatics, IEEE, Singapore, pp. 587-592.
View/Download from: Publisher's site
View description>>
An outcome of risk is the possible loss that could incur in an interaction. In a peer-to-peer financial interaction, the possible loss that could incur is usually the financial loss in the resources of the trusting agent that are involved in the interaction. Hence, a consideration for the trusting agent to analyze the risk in interacting with any probable trusted agent in order to decide whether to interact with it or not, is to determine the potential loss in its resources that may occur. In this paper, we will propose a methodology by which the trusting agent can determine beforehand the possible loss that could be incurred to it as a result of interacting with a probable trusted agent.
Hussain, OK, Chang, E, Hussain, FK & Dillon, TS 1970, 'A fuzzy approach to risk based decision making', ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 2, PROCEEDINGS, On the Move to Meaningful Internet Systems Workshops, Springer-Verlag Berlin Heidelberg, Montpellier, France, pp. 1765-1775.
View/Download from: Publisher's site
View description>>
Decision making is a tough process. It involves dealing with a lot of uncertainty and projecting what the final outcome might be. Depending on the projection of the uncertain outcome, a decision has to be taken. In a peer-to-peer financial interaction, the trusting agent in order to analyze the Risk has to consider the possible likelihood of failure of the interaction and the possible consequences of failure to its resources involved in the interaction before concluding whether to interact with the probable trusted agent or not. Further it might also have to choose and decide on an agent to interact with from a set of probable trusted agents. In this paper we propose a Fuzzy Risk based decision making system that would assist the trusting agent to ease its decision making process.
Hussain, OK, Chang, E, Hussain, FK & Dillon, TS 1970, 'A methodology for determining the creditability of recommending agents', KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer-verlag Berlin, Bournemouth, ENGLAND, pp. 1119-1127.
View description>>
The trusting agent in order to analyze the Risk that could be present in its future interaction with a trusted agent might solicit for its recommendations from other agents. Based on the recommendations achieved the trusting agent can decide whether to i
Hussain, OK, Chang, E, Hussain, FK & Dillon, TS 1970, 'A methodology for risk based decision making in a service oriented environment', IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol 1, Proceedings, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE Computer Soc, Tai Chung, TAIWAN, pp. 506-513.
View description>>
Decision making is a complex process. It involves in dealing with a lot of uncertainty and projecting in mind what the final outcome might be at the end. Based on the Projection of the final outcome a decision is taken. Decision making in a peer-to-peer
Hussain, OK, Chang, E, Hussain, FK, Dillon, TS & IEEE 1970, 'Towards ascertaining risk in digital business ecosystem interactions', 2006 Innovations in Information Technology, Innovations in Information Technology Conference, IEEE, Dubai, U ARAB EMIRATES, pp. 227-231.
View description>>
In digital business ecosystem architecture, it is rational for the trusting agent to analyse the possible risk in interacting with a probable trusted agent beforehand. Doing so would assist the trusting agent in its decision process. The possible risk in
Hussain, OK, Chang, E, Hussain, FK, Dillon, TS & Soh, B 1970, 'Context and Time Based Riskiness Assessment for Decision Making', Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), IEEE, pp. 104-104.
View/Download from: Publisher's site
View description>>
In an e-commerce interaction carried out in a Peer-to-Peer environment it is rational for the trusting peer to analyze the Risk that could be involved in dealing with a trusted peer as there is a lack of central management in these type of interactions. Risk analysis can be done by assimilating recommendations from other peers if there is no previous interaction history between the trusting peer and the trusted peer. But the assimilated recommendations might be according to the criteria of the recommending peer with the trusted peer, and it is not necessary for the trusting peer to have the same criteria in its interaction with the trusted peer as that of the recommending peer even thought it is interacting in the same context. Further it might interact in a different time as that of the recommending peer. The Risk that was present in a particular context and at a particular time might not be the same at a different time. Hence in this paper we discuss the process of the trusting peer assimilating the recommendations from the recommending peers according to the context, criteria and time of its interaction in order to determine the Riskiness value of the trusted peer, which would help it considerably in decision making. © 2006 IEEE.
Hussain, OK, Chang, E, Hussain, FK, Dillon, TS, Soh, B & IEEE 1970, 'Predicting the dynamic nature of risk', 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 500-507.
View/Download from: Publisher's site
View description>>
The trusting peer in order to determine the likelihood of the loss in its resources might analyze the Risk before engaging in an interaction with any trusted peer. This likelihood of the loss in the resources is termed as Risk in the interaction. Risk an
Hussain, OK, Chang, E, Hussain, FK, Dillon, TS, Soh, B & Society, IEEEC 1970, 'Context and time dependent risk based decision making', 20th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings, International Conference on Advanced Information Networking and Applications, IEEE, Vienna, AUSTRIA, pp. 585-590.
View description>>
As there is a lack of central management in an e-commerce interaction carried out based on peer-to-peer architecture, it is obvious for the trusting peer to analyze the Risk beforehand that could be involved in dealing with a trusted peer in these types
Jin-Chern Chiou, Li-Wei Ko, Chin-Teng Lin, Chao-Ting Hong, Tzyy-Ping Jung, Sheng-Fu Liang & Jong-Liang Jeng 1970, 'Using novel MEMS EEG sensors in detecting drowsiness application', 2006 IEEE Biomedical Circuits and Systems Conference, 2006 IEEE Biomedical Circuits and Systems Conference - Healthcare Technology (BioCas), IEEE, pp. 33-36.
View/Download from: Publisher's site
View description>>
Electroencephalographic (EEG) analysis has been widely adopted for the monitoring of cognitive state changes and sleep stages because abundant information in EEG recording reflects changes in drowsiness, arousal, sleep, and attention, etc. In this study, Micro-Electro-Mechanical Systems (MEMS) based silicon spiked electrode array, namely dry electrodes, are fabricated and characterized to bring EEG monitoring to the operational workplaces without requiring conductive paste or scalp preparation. An isotropic/anisotropic reactive ion etching with inductive coupled plasma (RIE-ICP) micromachining fabrication process was developed to manufacture the needle-like micro probes to pierce the stratum corneum of skin and obtain superior electrically conducting characteristics. This article reports a series of prosperity testing and evaluations of continuous EEG recordings. Our results suggest that the dry electrodes have advantages in electrode-skin interface impedance, signal intensity and size over the conventional (wet) electrodes. In addition, we also developed an EEG-based drowsiness estimation system that consists of the dry-electrode array, power spectrum estimation, Principal Component Analysis (PCA)-based EEG signal analysis, and multivariate linear regression to estimate driver's drowsiness level in a virtual-reality-based dynamic driving simulator to demonstrate the potential applications of the MEMS electrodes in operational environments. ©2006 IEEE.
Johnston, AJ, Marks, B & Edmonds, EA 1970, 'Charmed circle - an interactive toy for musicians', ACM International Conference on Digital Interactive Media in Entertainment and Arts, ACM International Conference on Digital Interactive Media in Entertainment and Arts, Research Publishing Services, Bangkok, Thailand, pp. 1-7.
Johnston, AJ, Marks, B, Candy, L & Edmonds, EA 1970, 'Partial reflections: interactive environments for musical exploration', ENGAGE: Interaction, Art and Audience Experience, ENGAGE: Interaction, Art and Audience Experience, Creativity and Cognition Studios Press, Sydney, Australia, pp. 100-109.
View description>>
This paper describes an ongoing project to develop interactive environments for musicians that encourage musical exploration. A process of developing software such as this, where requirements are highly dynamic and unclear is outlined and two musical compositions and associated interactive environments entitled 'Partial Reflections' are described.
Kocaballi, AB & Kocyigit, A 1970, 'Granular Best Match Algorithm for Context-Aware Computing Systems', 2006 ACS/IEEE International Conference on Pervasive Services, 2006 ACS/IEEE International Conference on Pervasive Services, IEEE, Lyon, FRANCE, pp. 143-149.
View/Download from: Publisher's site
Kurian, JC, Barnaghi, PM & Hartley, MI 1970, 'User Mediated Hypermedia Presentation Generation on the Semantic Web Framework', ADVANCES IN ARTIFICIAL REALITY AND TELE-EXISTENCE, PROCEEDINGS, 16th International Conference on Artificial Reality and Telexistence, Springer Berlin Heidelberg, PEOPLES R CHINA, Hangzhou, pp. 901-907.
View/Download from: Publisher's site
Latu, S & Dyson, LE 1970, 'ICT-The perception of the Togan minority in New Zealand', Cultural attitudes towards technology and communication 2006, Cultural Attitudes towards Technology and Communications, Murdoch University, Tartu, Estonia, pp. 360-371.
Lautenbach, S, Voinov, A & Seppelt, R 1970, 'Localization effects of land use change on hydrological models', Proceedings of the Iemss 3rd Biennial Meeting Summit on Environmental Modelling and Software.
View description>>
Semi-distributed hydrological models generally have the advantages of short calculation times, comparative low calibration needs and high model efficiency, but lack the ability to consider localization effects of land use change. A regionalisation of these models allows a sensitivity analysis of the localization effects. HBV-D, a conceptual hydrological model is used in this study. The regionalization for the German watershed Parthe (∼317 km 2) is coded in the framework of SME (spatial modeling environment) which allows a fast grid based regionalization of the model. Additional complexity at the finer scale is handled by downscaling of calibration parameters fromthe semi-distributedmodel by using auxiliary information (soil, relief). This allows a better representation of the heterogeneity in the watersheds without the need of grappling with hundreds of calibration parameters. A Monte-Carlo analysis is used to simulate the effects of the different spatial pattern of land use changes on discharge. This allows a better forecasting of land use change effects and can be used to generate uncertainty estimates for existing semi-distributed models. We focus here on the following major questions: 1. how can we downscale the calibration parameters from the semi-distributed model to the distributed model, 2. how do downscaling approaches differ, 3. how does land use composition and configuration influence discharge and 4. how do these results depend on catchment characteristics?
Leong, TW 1970, 'Designing for experiences: Randomness as a resource', Proceedings of the Conference on Designing Interactive Systems Processes Practices Methods and Techniques DIS, ACM Press, University Park, pp. 346-347.
View description>>
Studies which I carried out recently of users of digital music players revealed that the element of randomness plays a role in influencing the user experience (UX). Apart from being generally positive, some users even report rich experiences such as serendipity. I propose a longitudinal study to further explicate the phenomena. In doing so, I aim to produce a theoretical framework which will provide a richer characterization of the randomness-influenced UX. This will add to our understanding of UX and may serve to inform designers of interactive systems on how randomness can be used as an innovative design resource for supporting rich and novel UX.
Leong, TW, Vetere, F & Howard, S 1970, 'Randomness as a resource for design', Proceedings of the 6th conference on Designing Interactive systems, DIS06: Designing Interactive Systems 2006, ACM, University Park, pp. 132-139.
View/Download from: Publisher's site
Li, Z, Chen, H & Yu, S 1970, 'Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems', Proceedings Design Automation and Test in Europe Date.
View description>>
Using additional store-checkpoinsts (SCPs) and compare-checkpoints (CCPs), we present an adaptive checkpointing for double modular redundancy (DMR) in this paper. The proposed approach can dynamically adjust the checkpoint intervals. We also design methods to calculate the optimal numbers of checkpoints, which can minimize the average execution time of tasks. Further, the adaptive checkpointing is combined with the DVS (dynamic voltage scaling) scheme to achieve energy reduction. Simulation results show that, compared with the previous methods, the proposed approach significantly increases the likelihood of timely task completion and reduces energy consumption in the presence of faults.
Lin, CT & Chin, CL 1970, 'Using fuzzy inference and cubic curve to detect and compensate backlight image', International Journal of Fuzzy Systems, pp. 2-13.
View description>>
This paper proposes a new algorithm method for detection and compensation of backlight images. The proposed technique attacks the weaknesses of conventional backlight image processing methods, such as over-saturation and diminished contrast. This proposed algorithm consists of two operational phases, the detection phase and the compensation phase. In the detection phase, we use the spatial position characteristic and the histogram of backlight images to obtain two image indices which can determine the backlight degree of an image. The fuzzy inference method is then used to integrate these two indices into a final backlight index which determines the final backlight degree of an image more precisely. The compensation phase is used to solve the over-saturation problem which usually exists in conventional image compensation methods. In this phase, we propose the adaptive cubic curve method to compensate and enhance the brightness of backlight images. The luminance of a backlight image is adjusted according to the cubic curve equation which adapts dynamically according to the backlight degree indicated by the backlight index estimated in the detection phase. The performance of the proposed technique was tested against 300 backlight images covering a variety of backlight conditions and degrees. A comparison of the results of previous experiments clearly shows the superiority of our proposed technique in solving over-saturation and backlight detection problems. © 2006 TFSA.
Lin, CT, Chen, SA, Cheng, YC & Chung, JF 1970, 'CNN-based local motion estimation chip for image stabilization processing', Proceedings - IEEE International Symposium on Circuits and Systems, IEEE International Symposium on Circuits and Systems, IEEE, Kos, GREECE, pp. 2645-2648.
View description>>
This paper is to investigate a novel design for local motion vectors (LMVs) of image sequences, which are often used in a digital image stabilization (IS) system. The IS technique removes unwanted shaking phenomenon in image sequences captured by hand-held camcorders. It includes two main parts such as motion estimation and compensation. Most of computation power occurs in the part of motion estimation. In order to reduce this complexity, an idea, which integrates an adaptive-threshold method and cellular neural networks (CNN) architecture, is designed to improve this problem. The design only implements the most important local motion estimation with the array size of 19×25 pixels. Experimental results with HSPICE simulation and CNNUM are shown that the proposed architecture fast searches the location of possible LVMs and has the capability of real-time operations. The complete design has integrated into the total area of 8.1mm 2 by using TSMC 0.35μm mixed-signal process. © 2006 IEEE.
Lin, C-T, Chen, S-A, Cheng, Y-C & Hong, C-T 1970, 'CNN-Based Local Motion Estimation for Image Stabilization Processing and its Implementation', 2006 IEEE International Conference on Systems, Man and Cybernetics, 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, pp. 1816-1819.
View/Download from: Publisher's site
View description>>
The objective of this paper is to investigate a novel design for local motion vectors (LMVs) of image sequences, which are often used in a digital image stabilization (IS) system. The IS technique removes unwanted shaking phenomenon in image sequences captured by hand-held camcorders. It includes two main parts such as motion estimation and compensation. Most of computation power occurs in the part of motion estimation. In order to reduce this complexity, an idea, which integrates an adaptive-threshold method and cellular neural networks (CNN) architecture, is designed to improve this problem. The design only implements the most important local motion estimation with the array size of 19×25 pixels. Experimental results with HSPICE simulation and CNNLM are shown that the proposed architecture fast searches the location of possible LVMs and has the capability of real-time operations. ©2006 IEEE.
Lin, C-T, Huang, Y-C, Mei, T-W, Pu, H-C & Hong, C-T 1970, 'Multi-objects Tracking System Using Adaptive Background Reconstruction Technique and Its Application to Traffic Parameters Extraction', 2006 IEEE International Conference on Systems, Man and Cybernetics, 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, pp. 2057-2062.
View/Download from: Publisher's site
View description>>
In this paper, we present a real-time multi-objects tracking system which can detect various types of moving objects in image sequences of traffic video obtained from a stationary video camera. Using the adaptive background reconstruction technique can effectively handle with environmental changes and obtain good results of objects extraction. Besides, we introduce a robust region- and feature-based tracking algorithm with plentiful features to track correct objects continuously. After tracking objects successfully, we can analyze the tracked objects' properties and recognize their behavior for extracting some useful traffic parameters. According to the structure of our proposed algorithms, we implemented a tracking system including the functions of objects classification and accident prediction. Experiments were conducted on real-life traffic video of some intersection and testing datasets of other surveillance research. The results proved the algorithms we proposed achieved robust segmentation of moving objects and successful tracking with objects occlusion or splitting events. The implemented system also extracted useful traffic parameters. © 2006 IEEE.
Lin, C-T, Liang, S-F, Chao, W-H, Ko, L-W, Chao, C-F, Chen, Y-C & Huang, T-Y 1970, 'Driving Style Classification by Analyzing EEG Responses to Unexpected Obstacle Dodging Tasks', 2006 IEEE International Conference on Systems, Man and Cybernetics, 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, pp. 4916-4919.
View/Download from: Publisher's site
View description>>
Driving safely has received increasing attention of the publics due to the growing number of traffic accidents that the driver's driving style is highly correlated to many accidents. The purpose of this study is to investigate the relationship between driver's driving style and driver's ERP response. In our research, a virtual reality (VR) driving environment is developed to provide stimuli to subjects. Independent component analysis (ICA) is used to decompose the electroencephalogram (EEG) data. The power spectrum analysis of ICA components and correlation analysis are employed to investigate the EEG activities related to driving style. Experimental results demonstrate that we may classify the drivers into aggressive or gentle styles based on the observed ERP difference corresponding to the proposed unexpected obstacle dodging tasks. © 2006 IEEE.
Lin, CT, Liang, SF, Chen, YC, Hsu, YC & Ko, LW 1970, 'Driver's drowsiness estimation by combining EEG signal analysis and ICA-based fuzzy neural networks', Proceedings - IEEE International Symposium on Circuits and Systems, IEEE International Symposium on Circuits and Systems, IEEE, Kos, GREECE, pp. 2125-2128.
View description>>
The public security has become an important issue in recent years, especially, the safe manipulation and control of vehicles in preventing the growing number of traffic accident fatalities. Accidents caused by drivers' drowsiness have a high fatality rate due to the decline of drivers' abilities in perception, recognition, and vehicle control abilities while sleepy. Preventing such an accident requires a technique for detecting, estimating, and predicting the level of alertness of a driver and a mechanism to maintain the driver's maximum performance of driving. The ICAFNN is a fuzzy neural network (FNN) capable of parameter self-adapting and structure selfconstructing to acquire a small number of fuzzy rules for interpreting the embedded knowledge of a system from the given training data set. Our experiments show that the ICAFNN can achieve significant improvements in the accuracy of drowsiness estimation compared with our previous works. © 2006 IEEE.
Lin, CT, Yu, AC & Van, LD 1970, 'A low-power 64-point FFT/IFFT design for IEEE 802.11a WLAN application', Proceedings - IEEE International Symposium on Circuits and Systems, IEEE International Symposium on Circuits and Systems, IEEE, Kos, GREECE, pp. 4523-4526.
View description>>
In this paper, we propose a cost-effective and low-power 64-point fast Fourier transform (FFT)/inverse FFT (IFFT) architecture and chip adopting the retrenched 8-point FFT/IFFT (R8-FFT) unit and an efficient data-swapping method based output buffer unit The whole chip systematic performance concerning about the area, power, latency and pending cycles for the application of IEEE 802.11a WLAN standard has been analyzed. The proposed R8-FFT unit utilizing the symmetry property of the matrix decomposition achieves half computation-complexity and less power consumption compared with the recently proposed FFT/IFFT designs. On the other hand, applying the proposed data-swapping method, a low-cost and low-power output buffer can be obtained. So as to further increase system performance, we propose one scheme: the multiplication-afler-write (MAW) method. Applying MA W method with R8-FFT unit, the resulting FFT/IFFT design not only leads to the balancing pending cycle, but also abbreviating computation latency to 8 clock cycles. Consequently, adopting the above proposed two units and one scheme, the whole chip consumes 22.36mW under 1.2V@20 MHz in TSMC 0.13 1P8M CMOS process. © 2006 IEEE.
Lister, R, Simon, B, Thompson, E, Whalley, JL & Prasad, C 1970, 'Not seeing the forest for the trees', Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, ITiCSE06: 11th Annual Conference on Innovation and Technology in Computer Science Education, ACM, pp. 118-122.
View/Download from: Publisher's site
View description>>
This paper reports on the authors use of the SOLO taxonomy to describe differences in the way students and educators solve small code reading exercises. SOLO is a general educational taxonomy, and has not previously been applied to the study of how novice programmers manifest their understanding of code. Data was collected in the form of written and think-aloud responses from students (novices) and educators (experts), using exam questions. During analysis, the responses were mapped to the different levels of the SOLO taxonomy. From think-aloud responses, the authors found that educators tended to manifest a SOLO relational response on small reading problems, whereas students tended to manifest a multistructural response. These results are consistent with the literature on the psychology of programming, but the work in this paper extends on these findings by analyzing the design of exam questions.
Lister, RF 1970, 'Computer Science Teachers as Amateurs, Students and Reseachers', Koli Calling 2005- Proceeding of the Fifth Koli Calling Conference on Computer Science Education, Baltic Sea Conference on Computing Education Research, Turku Centre for Computer Science, Koli NAtional Park Eastern Finland, pp. 3-12.
Lister, RF 1970, 'Driving learning via criterion-referenced assessment using Bloom's taxonomy', UniServe Science 2006, Uniserve Science Symposium, UniServe Science, Sydney, Australia, pp. 80-88.
Livolsi, D, O'Neill, T, Leaney, J, Denford, M & Dunsire, K 1970, 'Guided architecture-based design optimisation of CBSs', 13TH ANNUAL IEEE INTERNATIONAL SYMPOSIUM AND WORKSHOP ON ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, IEEE International Conference and Workshop on the Engineering of Computer Based Systems, IEEE Computer Soc, Potsdam, GERMANY, pp. 247-256.
View description>>
Computer-Based Systems (CBS) are becoming increasingly pervasive throughout society, continually increasing in complexity and cost as they are called upon to fulfil more and more complicated tasks. Unfortunately, multi-million dollar projects often fail
Lu, H, Zhu, J & Guo, Y 1970, 'Calculation of Differential Inductances for Nonlinear Dynamic Analysis of A Tubular Linear PM Actuator', INTERMAG 2006 - IEEE International Magnetics Conference, INTERMAG 2006 - IEEE International Magnetics Conference, IEEE, pp. 766-766.
View/Download from: Publisher's site
Lu, J & Zhang, G 1970, 'Information integration based team situation assessment in an uncertain environment', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific Publ Co Pte Ltd, Genova, ITALY, pp. 441-448.
View/Download from: Publisher's site
View description>>
Understanding a situation requires integrating many pieces of information which can be obtained by a group of data collectors from multiple data sources. Uncertainty is involved in situation assessment. How to integrate multi-source multi-member uncertai
Lu, SM, Liang, SF & Lin, CT 1970, 'A HVS-directed neural-network-based approach for salt-pepper impulse noise removal', Journal of Information Science and Engineering, INST INFORMATION SCIENCE, pp. 925-939.
View description>>
In this paper, a novel two-stage noise removal algorithm to deal with salt-pepper impulse noise is proposed. In the first stage, the decision-based recursive adaptive noise-exclusive median filter is applied to remove the noise cleanly and to keep the uncorrupted information as well as possible. In the second stage, the fuzzy decision rules inspired by human visual system (HVS) are proposed to classify image pixels into human perception sensitive class and non-sensitive class. A neural network is proposed to compensate the sensitive regions for image quality enhancement. According to the experimental results, the proposed method is superior to conventional methods in perceptual image quality as well as the clarity and the smoothness in edge regions of the resultant images.
Lu, Z, Lu, J, Bai, C & Zhang, G 1970, 'Customer online shopping behaviours analysis using Bayesian networks', AI 2006: Advances in Artificial Intelligence, Proceedings, Australasian Joint Conference on Artificial Intelligence, Springer, Hobart, Australia, pp. 1293-1297.
View/Download from: Publisher's site
View description>>
This study applies Bayesian network technique to analyse the relationships among customer online shopping behaviours and customer requirements. This study first proposes an initial behaviour-requirement relationship model as domain knowledge. Through conducting a survey customer data is collected as evidences for inference of the relationships among the factors described in the model. After creating a graphical structure, this study calculates conditional probability distribution among these factors, and then conducts inference by using the Junction-tree algorithm. A set of useful findings has been obtained for customer online shopping behaviours and their requirements with motivations. These findings have potential to help businesses adopting more suitable online system development.
Luu, J & Kennedy, PJ 1970, 'Investigating the size and value effect in determining performance of Australian listed companies: A neural network approach', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, ACS, Sydney, Australia, pp. 155-161.
View description>>
This paper explores the size and value effect in influencing performance of individual companies using backpropagation neural networks. According to existing theory, companies with small market capitalization and high book to market ratios have a tendency to perform better in the future. Data from over 300 Australian Stock Exchange listed companies between 2000-2004 is examined and a neural network is trained to predict company performance based on market capitalization, book to market ratio, beta and standard deviation. Evidence for the value effect was found over longer time periods but there was less for the size effect. Poor company performance was also observed to be correlated with high risk. © 2006, Australian Computer Society, Inc.
Maxwell, C, O'Neill, T & Leaney, J 1970, 'A framework for understanding heuristics in architectural optimisation', 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06), 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06), IEEE, Potsdam, Germany, pp. 8 pp.-72.
View/Download from: Publisher's site
McIntosh, BS, Voinov, A, Smith, C & Giupponi, C 1970, 'Bridging the gaps between design and use: Developing appropriate tools for environmental management and policy', Proceedings of the Iemss 3rd Biennial Meeting Summit on Environmental Modelling and Software.
View description>>
Integrated assessment models, decision support systems (DSS) and Geographic Information Systems (GIS) are examples of a growing number of computer-based tools designed to provide scientific decision and information support to people within environmental management and policy organizations. It is recognized that end-user organizations are often not as receptive to using such tools as desired but that little research has been done to uncover and understand the reasons why. As part of the process to understand what tools are used and why, and conversely what tools are not used and why, this paper presents some views on the issues involved. No claim is made regarding the completeness of the issues covered, rather the purpose of the paper is to instigate discussion about how to improve tool design practices in such a way as to benefit environmental management and policy. Conflict between the aims of tool designers to develop usable and useful tools which also contain some degree of technological innovation is highlighted as a potential cause of problems. A call for clarity of purpose in tool design is made to make it clearer both to the designer and the client organization what the main aim of the design process is as a means of uncovering mismatches in expectation. Further, a call is made for designers to move from a technology-push to a demand-pull perspective as a necessary step towards designing more appropriate tools. A range of social dimensions of relevance to tool design are also discussed including the need to involve clients and stakeholders early in the design process, whether a model should present a simple and engaging story and to what extent good science can be implemented through the use of computer models, and the need to build trust between tool designers and tool users as a necessary part of making tools useful.
Milne, D, Medelyan, O & Witten, I 1970, 'Mining Domain-Specific Thesauri from Wikipedia: A Case Study', 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), IEEE, Hong Kong, PEOPLES R CHINA, pp. 442-448.
View/Download from: Publisher's site
Nataatmadja, I & Dyson, LE 1970, 'ICT and its impact on managing global virtual teams', INTERNET & INFORMATION SYSTEMS IN THE DIGITAL AGE: CHALLENGES AND SOLUTIONS, International Business Information Management, IBIMA, Brescila, Italy, pp. 498-504.
Niazi, M, Wilson, D & Zowghi, D 1970, 'Implementing software process improvement initiatives: An empirical study', PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, Product Focused Software Process Improvement, Springer-Verlag Berlin, Netherlands, pp. 222-233.
View/Download from: Publisher's site
View description>>
In this paper we present findings from our empirical study of software process improvement (SPI) implementation. We aim to provide SPI practitioners with insight into designing appropriate SPI implementation initiatives in order to achieve better results
Pileggi, SF, Palau, CE, Esteve, M & Esteve, M 1970, 'Grid Sensor/Actuator Network Architecture', 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), IEEE, pp. 3-3.
View/Download from: Publisher's site
View description>>
Low cost and low power sensor concept is logically extended by sensor network idea. Large-scale intelligent systems, sensor networks based, can be developed integrating sensor networks and high level distributed computational paradigms as Grid Computing. © 2006 IEEE.
Prior, J, Robertson, T & Leaney, J 1970, 'Technology designers as technology users', Proceedings of the 20th conference of the computer-human interaction special interest group (CHISIG) of Australia on Computer-human interaction: design: activities, artefacts and environments - OZCHI '06, the 20th conference of the computer-human interaction special interest group (CHISIG) of Australia, ACM Press, Sydney, Australia, pp. 353-353.
View/Download from: Publisher's site
View description>>
This paper is about the developer as technical user interacting with computer technology as part of the infrastructure that makes possible their 'real work' of developing a large and complex software product. A longitudinal ethnographic study of work practice in a software development company that uses an Agile development approach found that the developers spend a large part of their working time designing, creating, modifying and interacting with infrastructure to enable and support their software development work. This empirical work-in-progress shows that an understanding of situated technology design may have implications for the future development of HCI methods, tools and approaches
Prior, JR, Robertson, TJ & Leaney, JR 1970, 'Programming Infrastructure and Code Production: An Ethnographic Study', Team Ethno-Online Journal, Issue 2 June 2006, Ethnographies of Code: Computer Programs as Lived Work of Computer Programming, TeamEthno-Online, Lancashire, UK, pp. 112-120.
Qumer, A & Henderson-Sellers, B 1970, 'A Framework to Support Non-fragile Agile Agent-Oriented Software Development', NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, International Conference on Software Methods and Tools, IOS Press, Quebec, Canada, pp. 84-100.
View description>>
Agile software development methods support mainly object-oriented, feature-oriented and component-oriented software development and do not address agent-oriented and aspect-oriented software development. The concepts of agents and objects are in many ways dissimilar; and an object-oriented approach is not immediately suitable for the development of a multiagent system. In our current research, we extend agile software development methods originating primarily in object-oriented technology to support agent-orientation in the context of the development of multiagent systems. This research paper introduces a new agile agent-oriented framework to create or tailor situation-specific non-fragile agile agent-oriented software development processes (using a method engineering approach) to support multi-agent software development.
Qumer, A & Henderson-Sellers, B 1970, 'Comparative evaluation of XP and scrum using the 4d analytical tool (4-DAT)', Proceedings of the European and Mediterranean Conference on Information Systems Emcis 2006.
View description>>
The emergence of agile software development methods provides a contribution to contemporary software engineering practices. Agile methods have several benefits over traditional plan-based methods, in particular their ability to handle projects where requirements are not fixed. In the last few years, a number of agile software development methods have been developed but a detailed evaluation (which is essential) of these methods is not available. This paper presents a detailed comparative analysis of two well known agile methods (XP and Scrum), using the previously published 4- Dimensional Analytical Tool (4-DAT), based on four characterization perspectives: those of scope, agility, agile values and software process. A report generated with the help of 4-DAT will assist organizations in making decisions about the selection or adoption of an agile method.
Qumer, A, Henderson-Sellers, B & INSTICC 1970, 'Crystallization of agility - Back to basics', ICSOFT 2006: Proceedings of the First International Conference on Software and Data Technologies, Vol 2, International Conference on Software and Data Technologies, INSTICC, Setubal, Portugal, pp. 121-126.
View description>>
There are a number of agile and traditional methodologies for software development. Agilists provide agile principles and agile values to characterize the agile methods but there is no clear and inclusive definition of agile methods; subsequently it is not feasible to draw a clear distinction between traditional and agile software development methods in practice. The purpose of this paper is to explain the concept of agility in detail; and then to suggest a definition of agile methods that would help in the ranking or differentiation of agile methods from other available methods.
Roy, K, Sharma, N, Pal, T & Pal, U 1970, 'Online Bangla Handwriting Recognition System', Advances in Pattern Recognition, Proceedings of the Sixth International Conference, WORLD SCIENTIFIC.
View/Download from: Publisher's site
Sharma, N, Pal, U & Kimura, F 1970, 'Recognition of Handwritten Kannada Numerals', 9th International Conference on Information Technology (ICIT'06), 9th International Conference on Information Technology (ICIT'06), IEEE, pp. 133-136.
View/Download from: Publisher's site
View description>>
This paper deals with a quadratic classifier based scheme for the recognition of off-line handwritten numerals of Kannada, an important Indian script. The features used in the classifier are obtained from the directional chain code information of the contour points of the characters. The bounding box of a character is segmented into blocks and the chain code histogram is computed in each of the blocks. Here we have used 64 dimensional and 100 dimensional features for a comparative study on the recognition accuracy of our proposed system. This chain code features are fed to the quadratic classifier for recognition. We tested our scheme on 2300 data samples and obtained 97.87% and 98.45% recognition accuracy using 64 dimensional and 100 dimensional features respectively, from the proposed scheme using five-fold cross-validation technique. © 2006 IEEE.
Sheridan-Smith, N, O'Neill, T, Leaney, J & Hunter, M 1970, 'A Policy-based Service Definition Language for Service Management', 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, IEEE, Vancouver, Canada, pp. 282-293.
View/Download from: Publisher's site
View description>>
In a competitive environment, Service Providers wish to deliver services in a lean and agile manner, despite the rising complexity and heterogeneity within the network. The desire to support personalised customer experiences and differentiated services requires that management systems are increasingly flexible, adaptable and dynamic. Policy-based Management (PBM) systems can be helpful in reducing complexity and enhancing flexibility, but they have not typically been involved in end-to-end management of the services, leading to only the partial management of different network functions. By using a policy-based service definition language, a Service Provider is able to specify the structure of services and the manner in which they are to be dynamically managed for each customer over time in response to different network events. Combined with a generic PBM system that supports different management models, policies can be used to describe all of the functional aspects of a service. As a result, Service Providers have the potential to deliver new and modified services quickly and easily, since the definitions can be altered as their needs evolve in the medium- or long-term. © 2006 IEEE.
Sidhu, AS, Dillon, TS, Hussain, FK, Chang, E & SOC, IC 1970, 'Accomplishments and challenges of protein ontology', 30th Annual International Computer Software and Applications Conference, Vol 1, Regular Papers/Panels, Proceedings, pp. 71-76.
View/Download from: Publisher's site
View description>>
Recent progress in proteomics, computational biology, and ontology development has presented an opportunity to investigate protein data sources from a unique perspective that is, examining protein data sources through structure and hierarchy of Protein Ontology (PO). Various data mining algorithms and mathematical models provide methods for analyzing protein data sources; however, there are two issues that need to be addressed: (1) the need for standards for defining protein data description and exchange and (2) eliminating errors which arise with the data integration methodologies for complex queries. Protein Ontology is designed to meet these needs by providing a structured protein data specification for Protein Data Representation. Protein Ontology is a standard for representing protein data in a way that helps in defining data integration and data mining models for Protein Structure and Function. We report here our development of PO; a semantic heterogeneity framework based on relationships between PO concepts; and analysis of resultant PO Data of Human Proteins. We also talk in this paper briefly about our ongoing work of designing a trustworthy framework around PO. © 2006 IEEE.
Simon, B, Lister, R & Fincher, S 1970, 'Multi-Institutional Computer Science Education Research: A Review of Recent Studies of Novice Understanding', Proceedings. Frontiers in Education. 36th Annual Conference, Proceedings. Frontiers in Education. 36th Annual Conference, IEEE, pp. 12-17.
View/Download from: Publisher's site
View description>>
There has been a recent proliferation of multi-national, multi-institutional computer science education research exploring issues surrounding novice computer science student understanding. The large numbers of students studied in these efforts and their breadth in terms of student background (both technically and culturally) has led to significant interest in the work. In this paper, we summarize each study, identifying the populations studied, the types of data collected, the analyses performed and review the primary results. We also report on current ongoing work related to and derived from these efforts. © 2006 IEEE.
Sixsmith, A, Dyson, LE & Nataatmadja, I 1970, 'Improving class participation in it tutorials and small lectures', ACIS 2006 Proceedings - 17th Australasian Conference on Information Systems, Australasian Conference on Information Systems, Australasia Association of Informaton Systems, Adelaide, Australia, pp. 1-10.
View description>>
The aim of this paper is to present some initial findings from an investigation into strategies for improving class participation in tutorials and small lectures in the Information Technology (IT) context. The research used a qualitative approach and data collection was undertaken using student focus groups and semistructured interviews with academics in an Australian IT Faculty. The findings highlight various reasons why students do or don't participate. Also strategies which academics can utilise to encourage student participation in IT tutorials and small lectures were discovered. © 2006 Alan Sixsmith, Laurel Evelyn Dyson & Indrawati Nataatmadja.
Solomon, A, Santamaria, D & Lister, R 1970, 'Automated Testing of Unix Command-line and Scripting Skills', 2006 7th International Conference on Information Technology Based Higher Education and Training, 2006 7th International Conference on Information Technology Based Higher Education and Training, IEEE, Sydney, Australia, pp. 120-125.
View/Download from: Publisher's site
Sood, S, Woodside, AG & Miller, K 1970, 'Analysing iconic consumer brand weblogs', AAAI Spring Symposium - Technical Report, pp. 206-210.
View description>>
The stories consumers report and tell in which they use brands as props or anthropomorphic actors increasingly form a key part of personal and community Weblogs. These stories are drama enactments enabling the storytellers to experience powerful myths. The brand stories consumers tell on purchasing-consumption requires a protagonist consumer to experience an 'inciting incident' (McKee 2003) that focuses her attention and results in action in response to this incident. Since stories help to make sense of the world around us it is not surprising that consumer storytelling about brands extends beyond highly risky consumption acts to the more mundane and improvisational presentations of self (to self and others) in everyday life. With an understanding of the structure of the brand stories consumers report and tell on Weblogs this study compares the application of semantic analysis software (Smith 2000) automating the text analysis with a manual interpretation involving the human mind using Heider's balance theory to examine the stories consumers report about two well known clothing brands in naturally occurring contexts on Weblogs. Taking this approach, one can gain insights in determining if market researchers can automatically process Weblogs to obtain brand story abstractions. Copyright © 2002, American Association for Artificial Intelligence (www.aaai.org). All rights reserved.
Sood, SC & Pattinson, HM 1970, 'The open source marketing experiment: Using wikis to revolutionize marketing practice on the web.', Opening the network - New perspectives in industrial marketing and purchasing: 22nd Industrial Marketing and Purchasing Group Conference, 22nd Industrial Marketing and Purchasing Group Conference, The IMP Group, Milan, Italy, p. CD no page.
Thompson, E, Whalley, J, Lister, RF & Simon, B 1970, 'Code classification as a learning and asssessment exercise for novice programmers', Proceeding of the 19th annual conference of the ational advisory committee on computing qualifications, National Advisory Committee on Computing Qualifications, National advisory comittee on computing qualifications, Wellington, New Zealand, pp. 291-298.
Voinov, A, Hood, RR & Daues, JD 1970, 'Building a community modeling and information sharing culture', Proceedings of the Iemss 3rd Biennial Meeting Summit on Environmental Modelling and Software.
View description>>
By copying information from sources and distributing it to new destinations we do not lose information at the sources. Nevertheless, exchange of information is still restricted by patent law, as well as by institutional, cultural and traditional hurdles that create protective barriers hindering the free flow of this valuable commodity. We believe that one of the greatest challenges we face in creating a new research paradigm will be building the community modeling and information sharing culture. How do we get engineers and scientists to put aside their traditional modes of doing business? How do we provide the incentives that will be required to make these changes happen? How do we get our colleagues to see that the benefits of sharing resources far outweigh the costs? We argue that timely sharing of data and information is not only in the best interest of the research community, but that it is also in the best interest of the scientist who is doing the sharing.
Wang, C, Lu, J, Zhang, G & SOC, IC 1970, 'Integration of ontology data through learning instance matching', 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), IEEE/WIC/ACM international Conference on Web Intelligence and Intelligent Agent Technology, IEEE Computer Society, HK, China, pp. 536-539.
View/Download from: Publisher's site
View description>>
Information integration with the aid of ontology can roughly be divided into two levels: schema level and data level. Most research has been focused on the schema level, i.e., mapping/matching concepts and properties in different ontologies with each other. However, the data level integration is equally important, especially in the decentralized semantic Web environment. Noticing that ontology data (in the form of instances of concepts) from different sources often have different perspectives and may overlap with each other, we develop a matching method that utilizes the features of ontology and employs the machine learning approach to integrate those instances. By exploring ontology features, this method performs better than other general methods, which is revealed in our experiments. Through the process that implements the matching method, ontology data can be integrated together to offer more sophisticated services
Wu, S-J, Wu, C-T, chiou, Y-Y, Lin, C-T & Chung, Y-N 1970, 'Balancing Control of Sliding Inverted-Wedge System: classical-method-based compensation', 2006 IEEE International Conference on Systems, Man and Cybernetics, 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, pp. 1349-1354.
View/Download from: Publisher's site
View description>>
Root-locus-based PID controller and LQR-based controller always fail as system nonlinearity increases. We here propose the optimization-compensated block/diagram to reinforce the stabilization ability of these two classical control methods for nonlinear system, and besides, to achieve other performance requirements such as constrained overshoot and fast response. The controller design of a nonlinear sliding weights balancing mechanism is based on optimization-compensated root locus and LQR method. First, according to root-locus of the linearized dynamic system, we propose extra poles and zeros addition to roughly draw the locus shifting to left to achieve stabilization requirement. The poles and zeros are realized by P/PD/PID controllers. For LQR approach, we choose performance parameters to meet stabilization and minimum energy requirement. The controller is realized as feedback controller. Further, to compensate the model-error from nonlinearity and to meet other performance such as overshoot and setting time, some P/PID parameters for root-locus method and the feedback gain for LQR method are optimized via optimal parameter searching in NCD/Matlab toolbox. The simulation results demonstrate the stability and the constrained performances of the entire closed-loop system can be ensured by the proposed compensated control block diagrams. © 2006 IEEE.
Xu, G, Zhang, Y & Begg, R 1970, 'Mining Gait Pattern for Clinical Locomotion Diagnosis Based on Clustering Techniques', Advanced Data Mining And Applications, Proceedings, 2nd International Conference on Advanced Data Mining and Applications, Springer Berlin Heidelberg, Xian, PEOPLES R CHINA, pp. 296-307.
View/Download from: Publisher's site
View description>>
Scientific gait (walking) analysis provides valuable information about an individual's locomotion function, in turn, to assist clinical diagnosis and prevention, such as assessing treatment for patients with impaired postural control and detecting risk o
Xu, G, Zhang, Y & Zhou, X 1970, 'Discovering task-oriented usage pattern for web recommendation', Conferences in Research and Practice in Information Technology Series, 17th Australasian Database Conference, Australian Computer Society, Hobart, Tasmania, Australia, pp. 167-174.
View description>>
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usage data. With the discovered usage pattern information, it is possible to recommend Web user more preferred content or customized presentation according to the derived task preference. In this paper, we propose a Web recommendation framework based on discovering task-oriented usage pattern with Probabilistic Latent Semantic Analysis (PLSA) model. The user intended tasks are characterized by the latent factors through probabilistic inference, to represent the user navigational interests. Moreover, the active user's intuitive task-oriented preference is quantized by the probabilities, by which pages visited in current user session are associated with various tasks as well. Combining the identified task preference of current user with the discovered usage-based Web page categories, we can present user more potentially interested or preferred Web content. The preliminary experiments performed on real world data sets demonstrate the usability and effectiveness of the proposed approach. © 2006, Australian Computer Society, Inc.
Yan, Y, Zhu, J, Guo, Y & Lu, H 1970, 'Modeling and Simulation of Direct Torque Controlled PMSM Drive System Incorporating Structural and Saturation Saliencies', Conference Record of the 2006 IEEE Industry Applications Conference Forty-First IAS Annual Meeting, Conference Record of the 2006 IEEE Industry Applications Conference Forty-First IAS Annual Meeting, IEEE, IEEExplorer, pp. 76-83.
View/Download from: Publisher's site
View description>>
The direct torque controlled (DTC) permanent magnet synchronous motor (PMSM) drive has become competitive compared with other types of drive systems because of its simple and sensorless control algorithm. The application of the system, however, is handicapped by the difficulty of starting under full load due to the unknown initial rotor position. This paper presents a nonlinear model of PMSMs which incorporates both the structural and saturation saliencies to enable the numerical simulation of initial rotor position detection algorithms. In this model, the phase inductances are expressed by Fourier series as functions of the stator current and rotor position. The inductances of a surface mounted PMSM is measured with different rotor positions and DC offset currents, which emulate the effect of the three phase stator currents. By using the proposed model, the DTC PMSM is simulated and the results are compared with those obtained by the PMSM model in the Simulink library. With the model, an initial rotor position estimation scheme using voltage pulses is investigated by numerical simulation. The scheme is also experimentally tested and the results are compared with the inductance variation to verify the validity of the method. The effectiveness of the scheme to estimate the initial rotor position for the testing SPMSM is analyzed and verified by numerical simulation before physical implementation
Yu, S, Li, Z & Liu, B 1970, 'Online Algorithm for Application Layer Anycast', Frontiers in Artificial Intelligence and Applications, pp. 340-345.
View description>>
Application layer anycast possesses the property of flexibility, however, all the proposed application layer anycast routing algorithms are based on probing so far. One disadvantage of probing algorithms is that there are too many probing packets, which degrade the network performance, wast network bandwidth. In this paper, we propose an online algorithm, balance algorithm, for application layer anycast. Compared with the probing algorithms, the proposed algorithm has no probing cost at all. We model the two kinds of algorithms, and analyse the performance of the two algorithms. The results show that the online balance algorithm is better than the probing algorithms in terms of performance. A simulation is conducting as future work.
Yusop, N, Lowe, DB & Zowghi, D 1970, 'A survey of issue resolution on the incremental refinement of the system scope in web system development', Proceedings of the 6th international conference on Web engineering - ICWE '06, the 6th international conference, ACM Press, Palo Alto, CA, USA, pp. 313-313.
View/Download from: Publisher's site
View description>>
Increasingly, IT systems and Web systems in particular, fall into the class of applications where the scope of the application to be developed cannot be clearly articulated a priori. This is for a range of reasons, but is at least in part due to the complex inter-dependencies which exist between different aspects of the problem domain. While Whereas the core system requirements might be clear, the domain inter-dependencies lead to ancillary requirements which are only identified as the emerging system and its relationship to the domain are understood. A key mechanism in supporting the development of this understanding is the exploration of application pilots or prototypes, and the subsequent identification of solution or problem domain issues. The resolution of these issues will often play a crucial role in supporting the development of domain understanding and hence project scope. In this paper we explore this phenomenon by analysing issue handling across a range of case studies. We describe a model of the issue resolution process and highlight those issues which are most likely to assist in clarification of project scope.
Yusop, N, Zowghi, D & Lowe, D 1970, 'The impacts of non-functional requirements in web system projects', Proceedings of the European and Mediterranean Conference on Information Systems, EMCIS 2006, European, Mediterranean and Middle Eastern Conference on Information Systems, Brunel University, Alicante, Spain, pp. 1-8.
View description>>
In Web system development, the non-functional requirements (NFRs) are typically considered only briefly during the requirements elicitation stage and not rigorously articulated by either Web developers or the client. This paper reports on an investigation into this issue involving interviews with Web developers who were engaged in commercial Web development projects. The results from this qualitative research highlight that Web developers commonly do not pay sufficient attention to NFRs. This arises due to uncertainty, lack of time, lack of knowledge in the importance of NFRs and partly because NFRs are not readily available and documented from previous similar projects. Web developers also do not elicit NFR at the same time and at the same level of details as functional requirements (FRs). This study highlights that a lack of rigor in articulating NFRs may significantly impact on the development effectiveness and the quality of the resulting Web system.
Zao, JK, Hu, J-S, Chiou, J-C, Huang, Y-L, Li, S-C, Kuo, Z-Y, Chuang, M-C, Hsu, S-H, Tseng, Y-C, Liu, JWS & Lin, C-T 1970, 'Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan', 2006 IEEE International Conference on Systems, Man and Cybernetics, 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, pp. 4297-4303.
View/Download from: Publisher's site
View description>>
A team of researchers including computer scientists, electrical and control engineers, architects, industrial designers, human factor engineers, and cognitive scientists in the National Chiao Tung University (NCTU), Taiwan, along with their overseas collaborators launched the project Kannon, a multidisciplinary effort to develop Adaptive Assistive Technologies that can be deployed incrementally into existing private/public spaces and collaborate opportunistically to offer monitoring, assisting, communicating and rejuvenating services to healthy elders. The team combined the state-of-art information, communication and robotic know-how with the activity oriented method for product design and the modular functional approach in modern architecture in order to devise a holistic support for successful aging. This paper presents the philosophy, approach and first fruits of this project. © 2006 IEEE.
Zhang, G, Lu, J & Dillon, T 1970, 'An approximation branch-and-bound algorithm for fuzzy bilevel decision making problems', Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT, Autumn meeting point of Polish information processing society, PTI, Wisla, Poland, pp. 223-231.
View description>>
Organizational decision making often involves two decision levels. When the leader at the upper level attempts to optimize his/her objective, the follower at the lower level tries to find an optimized strategy according to each of possible decisions made by the leader. Furthermore, such bilevel decision making may involve uncertain parameters which appear either in the objective functions or constraints of the leader or the follower. Following our previous work on fuzzy bilevel decision making, this study proposes a solution concept and related theorems for general- fuzzy-number based fuzzy parameter bilevel programming problems. It then develops an approximation Branch-and-bound algorithm to solve the proposed problem. © 2006 PIPS.
Zhang, G, Lu, J & Dillon, T 1970, 'An extended Branch-and-Bound algorithm for fuzzy linear bilevel programming', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World scientific, Genova, Italy, pp. 291-298.
View/Download from: Publisher's site
View description>>
This paper presents an extended Branch-and-Bound algorithm for solving fuzzy linear bilevel programming problems. In a fuzzy bilevel programming model, the leader attempts to optimize his/her fuzzy objective with a consideration of overall satisfaction,
Zhang, G, Zhang, G, Lu, J & Lu, H 1970, 'Environmental/economic dispatch using genetic algorithm and fuzzy number ranking method', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Genova, Italy, pp. 59-66.
View/Download from: Publisher's site
View description>>
NA
Zhang, J, Lu, J, Zhang, G & Yan, X 1970, 'An integrated analysis method for bank customer classification', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Genova, Italy, pp. 247-252.
View/Download from: Publisher's site
View description>>
NA
Zhao, N, Song, YH & Lu, H 1970, 'Risk assessment of strategies using total time on test transform', 2006 IEEE Power Engineering Society General Meeting, 2006 IEEE Power Engineering Society General Meeting, IEEE, Montreal, Quebec, Canada, pp. 8 pp.-8 pp..
View/Download from: Publisher's site
Zheng, L, Jin, J, Guo, Y, Lu, H & Zhu, J 1970, 'Technology and Development of High Temperature Superconducting Linear Motors Conference', Proceedings of the Australasian Universities Power Engineering Conference, Australasian Universities Power Engineering Conference, Victoria, University, Melbourne, Australia, pp. 1-6.
Zheng, Z, Zhang, G, He, Q, Lu, J & Shi, Z 1970, 'Rule sets based bilevel decision model', Conferences in Research and Practice in Information Technology Series, Australasian Computer Science Conference, ACM Digital Library, Hobart, Australia, pp. 113-120.
View description>>
Bilevel decision addresses the problem in which two levels of decision makers, each tries to optimize their individual objectives under constraints, act and react in an uncooperative, sequential manner. Such a bilevel optimization structure appears naturally in many aspects of planning, management and policy making. However, bilevel decision making may involve many uncertain factors in a real world problem. Therefore it is hard to determine the objective functions and constraints of the leader and the follower when build a bilevel decision model. To deal with this issue, this study explores the use of rule sets to format a bilevel decision problem by establishing a rule sets based model. After develop a method to construct a rule sets based bilevel model of a real-world problem, an example to illustrate the construction process is presented. Copyright © 2006, Australian Computer Society, Inc.