Aghasadeghi, K & Zare, D 2008, 'Efficacy of alternate day dosing of atorvastatin', Open Medicine, vol. 3, no. 2, pp. 163-166.
View/Download from: Publisher's site
View description>>
AbstractAtorvastatin is a synthetic inhibitor of 3-hydroxy 3-methylglutaryl coenzyme A (HMG-CoA) reductase inhibitor. It has a longer half life and longer duration of action than that of all other available HMG-CoA inhibitors. We evaluated the efficacy of alternate-day dosing of atorvastatin in comparison with the standard one-daily dose on total cholesterol, low and High-density lipoprotein (LDL and HDL) and triglycerides. This study is a randomized, blinded, and controlled clinical trial. Sixty-six patients with LDL cholesterol of more than 100 mg/dl were enrolled. Baseline fasting lipid profile (total cholesterol, LDL, HDL and triglyceride), liver function tests and creatine kinase were drawn. Patients were randomized to three atorvastatin dose groups. Group I received 10 mg of atorvastatin every day, group II received 20 mg of atorvastatin every day, and group III received 20 mg every other day. After 6 weeks of treatment with atorvastatin, fasting lipid profiles, liver function tests and creatine kinase concentrations were re-taken. Compliance to treatment was assessed at each visit. Of the sixty-six patients enrolled, sixty completed the study. All three regimens significantly reduced total cholesterol and LDL compared to baseline. No statistically significant difference existed between the three groups in regards to total or a percentage decrease in total cholesterol and LDL cholesterol at 6 weeks compared to baseline. All regimens were well tolerated and none of the patients showed significant elevation of liver enzyme or creatine kinase during the course of the study. In conclusions the alternate-day dosing of atorvastatin is an efficacious and safe alternate to daily dosing and yet inexpensive.
Azadeh, A, Ghaderi, SF, Javaheri, Z & Saberi, M 2008, 'A Fuzzy Mathematical Programming Approach to DEA Models', American Journal of Applied Sciences, vol. 5, no. 10, pp. 1352-1357.
View/Download from: Publisher's site
View description>>
Evaluating the performance of activities or organizations by traditional Data Envelopment Analysis (DEA) as efficiency frontier analysis models requires crisp input/output data. However, in real-world problems inputs and outputs are often imprecise. This study develops DEA models using imprecise data represented by fuzzy sets. An important outcome of assessing relative efficiencies within a group of Decision Making Units (DMUs) in fuzzy data envelopment analysis is to determine efficient DMUs. We find efficiency measures with fuzzy inputs and outputs via proposed model. An example using fuzzy data is presented for illustrative purposes. We apply this method in the application to the power generation sector of Iran. © 2008 Science Publications.
Azadeh, A, Saberi, M, Ghaderi, SF, Gitiforouz, A & Ebrahimipour, V 2008, 'Improved estimation of electricity demand function by integration of fuzzy system and data mining approach', Energy Conversion and Management, vol. 49, no. 8, pp. 2165-2177.
View/Download from: Publisher's site
Bing, S, Yin-feng, X & Shui, Y 2008, 'Online selection model and competitive analysis of vehicle routing in grid transportation network', Journal of Traffic and Transportation Engineering, vol. 8, no. 6, pp. 110-115.
View description>>
In order to analyze the vehicle routing problem under sudden road blockage in grid transportation network, a vehicle routing model was proposed by using the methods of online problem and competitive strategy, direction greedy strategy and multi-alternative moving strategy were designed, and the competitive ratios of two strategies were computed. Analysis result indicates that the cost of direction greedy strategy is 3 times than the optimal cost under sudden road blockage state, multi-alternative moving strategy has a good performance with practical restriction for different cases, the cost of multi-alternative moving strategy is 2 times than the optimal cost in the worst case, the competitive ratios of two strategies are not more than the infimum of the competitive ratio for unexpected blockage problem in general networks. 3 figs, 17 refs.
Catchpoole, D, Guo, D, Jiang, H & Biesheuvel, C 2008, 'Predicting outcome in childhood acute lymphoblastic leukemia using gene expression profiling: Prognostication or protocol selection?', Blood, vol. 111, no. 4, pp. 2486-2487.
View/Download from: Publisher's site
Catley, C, McGregor, C, Percival, J, Curry, J, James, A & IEEE 2008, 'Multi-dimensional Knowledge Translation: Enabling Health Informatics Capacity Audits Using Patient Journey Models', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-8, pp. 1502-1505.
View/Download from: Publisher's site
Cetindamar, D & Hopkins, T 2008, 'Enhancing students’ responsibility towards society through civic involvement projects', Innovations in Education and Teaching International, vol. 45, no. 4, pp. 401-410.
View/Download from: Publisher's site
Cetindamar, D & Ulusoy, G 2008, 'Innovation performance and partnerships in manufacturing firms in Turkey', Journal of Manufacturing Technology Management, vol. 19, no. 3, pp. 332-345.
View/Download from: Publisher's site
View description>>
PurposeThis paper aims to shed light on the relationship between partnerships and innovation efforts of the firms. The goal is to understand whether Turkish firms collaborate for innovation or not and, if they do, what is the impact of partnerships on the innovation performance of firms?Design/methodology/approachIn this research, a survey methodology is employed. The questionnaire is implemented through structured interviews conducted with 135 Turkish companies from the textile, chemical, food and machinery industries.FindingsThe findings show that Turkish firms have high‐collaboration ties with other companies in particular but the existing partnerships have a weak impact on innovation performance.Research limitations/implicationsAs only one country is studied and data come from one year, the findings of this study are limited in terms of generalizing the results for a wide variety of developing countries.Practical implicationsNon‐materialized performance is to a degree due to low quality of relationships, but more importantly Turkish firms need to find ways to improve their partnerships and in‐house capabilities, particularly their absorptive capacities, if they want to improve their innovativeness through partnerships.Originality/valueThis paper is one of the early examples empirically investigating the relationship between technology collaborations and innovation performance of firms in a developing country c...
Chen, C-H, Lin, C-J & Lin, C-T 2008, 'An efficient quantum neuro-fuzzy classifier based on fuzzy entropy and compensatory operation', Soft Computing, vol. 12, no. 6, pp. 567-583.
View/Download from: Publisher's site
Chen, J, Duan, R, Ji, Z, Ying, M & Yu, J 2008, 'Existence of universal entangler', JOURNAL OF MATHEMATICAL PHYSICS, vol. 49, no. 1, pp. 1-7.
View/Download from: Publisher's site
View description>>
A gate is called an entangler if it transforms some (pure) product states to entangled states. A universal entangler is a gate which transforms all product states to entangled states. In practice, a universal entangler is a very powerful device for generating entanglements, and thus provides important physical resources for accomplishing many tasks in quantum computing and quantum information. This paper demonstrates that a universal entangler always exists except for a degenerated case. Nevertheless, the problem how to find a universal entangler remains open. © 2008 American Institute of Physics.
Cheng-Hung Chen, Cheng-Jian Lin & Chin-Teng Lin 2008, 'A Functional-Link-Based Neurofuzzy Network for Nonlinear System Control', IEEE Transactions on Fuzzy Systems, vol. 16, no. 5, pp. 1362-1378.
View/Download from: Publisher's site
Cheng-Jian Lin, Cheng-Hung Chen & Chin-Teng Lin 2008, 'Efficient Self-Evolving Evolutionary Learning for Neurofuzzy Inference Systems', IEEE Transactions on Fuzzy Systems, vol. 16, no. 6, pp. 1476-1490.
View/Download from: Publisher's site
Chin-Teng Lin, Li-Wei Ko, Jin-Chern Chiou, Jeng-Ren Duann, Ruey-Song Huang, Sheng-Fu Liang, Tzai-Wen Chiu & Tzyy-Ping Jung 2008, 'Noninvasive Neural Prostheses Using Mobile and Wireless EEG', Proceedings of the IEEE, vol. 96, no. 7, pp. 1167-1183.
View/Download from: Publisher's site
Chin-Teng Lin, Yuan-Chu Yu & Lan-Da Van 2008, 'Cost-Effective Triple-Mode Reconfigurable Pipeline FFT/IFFT/2-D DCT Processor', IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 16, no. 8, pp. 1058-1071.
View/Download from: Publisher's site
Chunlin Chen, Han-Xiong Li & Daoyi Dong 2008, 'Hybrid Control for Robot Navigation - A Hierarchical Q-Learning Algorithm', IEEE Robotics & Automation Magazine, vol. 15, no. 2, pp. 37-47.
View/Download from: Publisher's site
Chunlin, C, Daoyi, D, Zonghai, C & Haibo, W 2008, 'Grey systems for intelligent sensors and information processing', Journal of Systems Engineering and Electronics, vol. 19, no. 4, pp. 659-665.
View/Download from: Publisher's site
Daoyi Dong, Chunlin Chen, Tzyh-Jong Tarn, Pechen, A & Rabitz, H 2008, 'Incoherent Control of Quantum Systems With Wavefunction-Controllable Subspaces via Quantum Reinforcement Learning', IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 38, no. 4, pp. 957-962.
View/Download from: Publisher's site
Dellepiane, M, Pietroni, N, Tsingos, N, Asselot, M & Scopigno, R 2008, 'Reconstructing head models from photographs for individualized 3D-audio processing.', Comput. Graph. Forum, vol. 27, pp. 1719-1727.
View/Download from: Publisher's site
Devitt, SJ, Fowler, AG, Stephens, AM, Greentree, AD, Hollenberg, LCL, Munro, WJ & Nemoto, K 2008, 'Architectural design for a topological cluster state quantum computer', New. J. Phys., vol. 11, p. 083032.
View/Download from: Publisher's site
View description>>
The development of a large scale quantum computer is a highly sought aftergoal of fundamental research and consequently a highly non-trivial problem.Scalability in quantum information processing is not just a problem of qubitmanufacturing and control but it crucially depends on the ability to adaptadvanced techniques in quantum information theory, such as error correction, tothe experimental restrictions of assembling qubit arrays into the millions. Inthis paper we introduce a feasible architectural design for large scale quantumcomputation in optical systems. We combine the recent developments intopological cluster state computation with the photonic module, a simple chipbased device which can be used as a fundamental building block for a largescale computer. The integration of the topological cluster model with thiscomparatively simple operational element addresses many significant issues inscalable computing and leads to a promising modular architecture with completeintegration of active error correction exhibiting high fault-tolerantthresholds.
Devitt, SJ, Munro, WJ & Nemoto, K 2008, 'High Performance Quantum Computing', Progress in Informatics 8 (2011): 49-55, no. 8, pp. 49-55.
View/Download from: Publisher's site
View description>>
The architecture scalability afforded by recent proposals of a large scalephotonic based quantum computer, utilizing the theoretical developments oftopological cluster states and the photonic chip, allows us to move on to adiscussion of massively scaled Quantum Information Processing (QIP). In thisletter we introduce the model for a secure and unsecured topological clustermainframe. We consider the quantum analogue of High Performance Computing,where a dedicated server farm is utilized by many users to run algorithms andshare quantum data. The scaling structure of photonics based topologicalcluster computing leads to an attractive future for server based QIP, wherededicated mainframes can be constructed and/or expanded to serve anincreasingly hungry user base with the ideal resource for individual quantuminformation processing.
Dong, D, Chen, C, Li, H & Tarn, T-J 2008, 'Quantum reinforcement learning', IEEE Transactions on Systems Man and Cybernetics Part B: Cybernetics, vol. 38, p. 5.
View description>>
The key approaches for machine learning, especially learning in unknownprobabilistic environments are new representations and computation mechanisms.In this paper, a novel quantum reinforcement learning (QRL) method is proposedby combining quantum theory and reinforcement learning (RL). Inspired by thestate superposition principle and quantum parallelism, a framework of valueupdating algorithm is introduced. The state (action) in traditional RL isidentified as the eigen state (eigen action) in QRL. The state (action) set canbe represented with a quantum superposition state and the eigen state (eigenaction) can be obtained by randomly observing the simulated quantum stateaccording to the collapse postulate of quantum measurement. The probability ofthe eigen action is determined by the probability amplitude, which isparallelly updated according to rewards. Some related characteristics of QRLsuch as convergence, optimality and balancing between exploration andexploitation are also analyzed, which shows that this approach makes a goodtradeoff between exploration and exploitation using the probability amplitudeand can speed up learning through the quantum parallelism. To evaluate theperformance and practicability of QRL, several simulated experiments are givenand the results demonstrate the effectiveness and superiority of QRL algorithmfor some complex problems. The present work is also an effective exploration onthe application of quantum computation to artificial intelligence.
Dong, D, Chen, C, Zhang, C & Chen, Z 2008, 'Quantum robot: structure, algorithms and applications'.
View description>>
This paper has been withdrawn.
Dong, D, Zhang, C, Rabitz, H, Pechen, A & Tarn, T-J 2008, 'Incoherent control of locally controllable quantum systems', The Journal of Chemical Physics, vol. 129, no. 15.
View/Download from: Publisher's site
View description>>
An incoherent control scheme for state control of locally controllable quantum systems is proposed. This scheme includes three steps: (1) amplitude amplification of the initial state by a suitable unitary transformation, (2) projective measurement of the amplified state, and (3) final optimization by a unitary controlled transformation. The first step increases the amplitudes of some desired eigenstates and the corresponding probability of observing these eigenstates, the second step projects, with high probability, the amplified state into a desired eigenstate, and the last step steers this eigenstate into the target state. Within this scheme, two control algorithms are presented for two classes of quantum systems. As an example, the incoherent control scheme is applied to the control of a hydrogen atom by an external field. The results support the suggestion that projective measurements can serve as an effective control and local controllability information can be used to design control laws for quantum systems. Thus, this scheme establishes a subtle connection between control design and controllability analysis of quantum systems and provides an effective engineering approach in controlling quantum systems with partial controllability information.
Dovey, K 2008, 'Addressing Structural Inhibitors of Change in Public Health Sector Organizations: A South African Case', Journal of Change Management, vol. 8, no. 1, pp. 37-56.
View/Download from: Publisher's site
View description>>
This article draws attention to the structural inhibitors of effective service delivery within a South African public health organization and outlines a change initiative aimed at facilitating the decentralization of decision-making power in an attempt to transform the service offered by this organization.
Duan, R, Feng, Y & Ying, M 2008, 'Local distinguishability of multipartite unitary operations', PHYSICAL REVIEW LETTERS, vol. 100, no. 2, pp. 1-4.
View/Download from: Publisher's site
View description>>
We show that any two different unitary operations acting on an arbitrary multipartite quantum system can be perfectly distinguished by local operations and classical communication when a finite number of runs is allowed. Intuitively, this result indicates that the lost identity of a nonlocal unitary operation can be recovered locally. No entanglement between distant parties is required. © 2008 The American Physical Society.
Duer, W, Bremner, MJ & Briegel, HJ 2008, 'Quantum simulation of interacting high-dimensional systems: The influence of noise', PHYSICAL REVIEW A, vol. 78, no. 5, p. 052325.
View/Download from: Publisher's site
View description>>
We consider the simulation of interacting high-dimensional systems using pairwise interacting qubits. The main tool in this context is the generation of effective many-body interactions, and we examine a number of different protocols for obtaining them. These methods include the usage of higher-order processes commutator method , unitary conjugation or graph state encoding, as well as teleportation-based approaches. We illustrate and compare these methods in detail and analyze the time cost for simulation. In the second part of the paper, we investigate the influence of noise on the simulation process. We concentrate on errors in the interaction Hamiltonians and consider two generic noise models: i timing errors in pairwise interactions and ii noisy pairwise interactions described by Master equations of Lindblad form. We analyze and compare the effect of noise for the different simulation methods and propose a way to significantly reduce the influence of noise by making use of entanglement purification together with a teleportation-based protocol.
Frazier, SK, Lennie, TA & Moser, DK 2008, 'Preface', Nursing Clinics of North America, vol. 43, no. 1, pp. xi-xii.
View/Download from: Publisher's site
GAO, YA, ZHANG, G, LU, JIE, DILLON, T & ZENG, X 2008, 'A λ-CUT APPROXIMATE ALGORITHM FOR GOAL-BASED BILEVEL RISK MANAGEMENT SYSTEMS', International Journal of Information Technology & Decision Making, vol. 07, no. 04, pp. 589-610.
View/Download from: Publisher's site
View description>>
Bilevel programming techniques are developed for decentralized decision problems with decision makers located in two levels. Both upper and lower decision makers, termed as leader and follower, try to optimize their own objectives in solution procedure but are affected by those of the other levels. When a bilevel decision model is built with fuzzy coefficients and the leader and/or follower have goals for their objectives, we call it fuzzy goal bilevel (FGBL) decision problem. This paper first proposes a λ-cut set based FGBL model. A programmable λ-cut approximate algorithm is then presented in detail. Based on this algorithm, a FGBL software system is developed to reach solutions for FGBL decision problems. Finally, two examples are given to illustrate the application of the proposed algorithm.
Goyal, ML, Lu, J & Zhang, G 2008, 'Decision Making in Multi-Issue e-Market Auction Using Fuzzy Techniques and Negotiable Attitudes.', J. Theor. Appl. Electron. Commer. Res., vol. 3, no. 2, pp. 97-110.
View description>>
Online auctions are one of the most effective ways of negotiation of salable goods over the internet. Software agents are increasingly being used to represent humans in online auctions. These agents can systematically monitor a wide variety of auctions and can make rapid decisions about what bids to place In what auctions. To be successful in open multi-agent environments, agents must be capable of adapting different strategies and tactics to their prevailing circumstances. This paper presents a software test-bed for studying autonomous bidding strategies in simulated auctions for procuring goods. It shows that agents' bidding strategy explore the attitudes and behaviors that help agents to manage dynamic assessment of prices of goods given the different criteria and scenario conditions. Our agent also uses fuzzy techniques for the decision making: to make decisions about the outcome of auctions, and to alter the agent's bidding strategy in response to the different criteria and market conditions. © 2008 Universidad de Talca - Chile.
Guo, Y, Jin, J, Zheng, L, Zhu, J & Lu, H 2008, 'A Permanent Magnet Linear Synchronous Motor Drive for HTS Maglev Transportation Systems', Journal of Electronic Science and Technology of China - Zhongguo Dianzi Keji, vol. 6, no. 2, pp. 125-129.
View description>>
A permanent magnet linear synchronous motor (pMLSM) for a high temperature superconducting (HTS) maglev system has been studied, including the motor structure, control strategy, and analysis techniques. Finite elemeut analysis (FEA) of magnetic field is conducted to accurately calculate major motor parameters. Equivalent electrical circuit is used to predict the drive's steady-state characteristics, and a phase variable model is applied to predict the dynamic performance. Preliminary experiment with a prototype has been made to verify the theoretical analysis and the HTS-PM synchronons driving technology.
Guo, Y, Zhu, JG, Lin, ZW, Lu, H, Wang, X & Chen, J 2008, 'Influence of inductance variation on performance of a permanent magnet claw pole soft magnetic composite motor', Journal of Applied Physics, vol. 103, no. 7, pp. 07F118-07F118.
View/Download from: Publisher's site
View description>>
Winding inductance is an important parameter in determining the performance of electrical machines, particularly those with large inductance variation. This paper investigates the influence of winding inductance variation on the performance of a three-phase three-stack claw pole permanent magnet motor with soft magnetic composite (SMC) stator by using an improved phase variable model. The winding inductances of the machine are computed by using a modified incremental energy method, based on three-dimensional nonlinear time-stepping magnetic field finite element analyses. The inductance computation and performance simulation are verified by the experimental results of an SMC claw pole motor prototype.
HAN, A, HONG, Y, LAI, KK & WANG, S 2008, 'Interval Time Series Analysis with an Application to the Sterling-Dollar Exchange Rate', Journal of Systems Science and Complexity, vol. 21, no. 4, pp. 558-573.
View/Download from: Publisher's site
View description>>
Inconsistency of multi-perspective requirements specifications is a pervasive issue during the requirements process. However, managing inconsistency is not just a pure technical problem. It is always associated with a process of interactions and competitions among corresponding stakeholders. The main contribution of this paper is to present a negotiations approach to handling inconsistencies in multi-perspective software requirements. In particular, the priority of requirements relative to each perspective plays an important role in proceeding negotiation over resolving inconsistencies among different stakeholders. An algorithm of generating negotiation proposals and an approach to evaluating proposals are also presented in this paper, respectively. © 2008 Academy of Mathematics & Systems Science, Beijing, China.
Hornecker, E, Jacob, RJ, Hummels, C, Ullmer, B, Schmidt, A, van den Hoven, E & Mazalek, A 2008, 'TEI Goes On: Tangible and Embedded Interaction', IEEE Pervasive Computing, vol. 7, no. 2, pp. 91-96.
Huo, H, Han, DH, Hui, XY & Wang, GR 2008, 'PDT-based document fragmentation of XML streaming data', Dongbei Daxue Xuebao Journal of Northeastern University, vol. 29, no. 5, pp. 657-676.
View description>>
Unlike in conventional databases, queries on XML stream data are bounded by not only the memory capacity but also the real time processing. Based on the Hole-Filler model, a path frequency tree (PFT) is defined according to the statistic information on queries about XML to set out a sibling-based document fragmentation policy including corresponding algorithm. Then, an alternative membership-based document fragmentation policy and corresponding algorithm are proposed. Both algorithms can effectively enhance the utilization and cohesion of XML fragments. Testing results showed that the PFT-based document fragmentation algorithms perform well on query cost and other properties.
Jakeman, AJ, Rizzoli, AE & Voinov, AA 2008, 'Outstanding reviewers for environmental modelling and software in 2007', Environmental Modelling & Software, vol. 23, no. 12, pp. 1343-1343.
View/Download from: Publisher's site
Ji, Z, Wang, G, Duan, R, Feng, Y & Ying, M 2008, 'Parameter Estimation of Quantum Channels', IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 54, no. 11, pp. 5172-5185.
View/Download from: Publisher's site
View description>>
The efficiency of parameter estimation of quantum channels is studied in this paper. We introduce the concept of programmable parameters to the theory of estimation. It is found that programmable parameters obey the standard quantum limit strictly; hence, no speedup is possible in its estimation. We also construct a class of nonunitary quantum channels whose parameter can be estimated in a way that the standard quantum limit is broken. The study of estimation of general quantum channels also enables an investigation of the effect of noises on quantum estimation. © 2008 IEEE.
Johnston, A, Candy, L & Edmonds, E 2008, 'Designing and evaluating virtual musical instruments: facilitating conversational user interaction', Design Studies, vol. 29, no. 6, pp. 556-571.
View/Download from: Publisher's site
View description>>
This paper is concerned with the design of interactive virtual musical instruments. An interaction design strategy which uses on-screen objects that respond to user actions in physically realistic ways is described. This approach allows musicians to 'play' the virtual instruments using the sound of their familiar acoustic instruments. An investigation of user experience identified three modes of interaction that characterise the musicians' approach to the virtual instruments: instrumental, ornamental and conversational. When using the virtual instruments in instrumental mode, musicians prioritise detailed control; in ornamental mode, they surrender detailed control to the software and allow it to transform their sound; in conversational mode, the musicians allow the virtual instrument to 'talk back', helping to shape the musical direction of performance much as a human playing partner might. Finding a balance between controllability and complexity emerged as a key issue in facilitating 'conversational' interaction. © 2008 Elsevier Ltd. All rights reserved.
Kennedy, P, Francis, N, Rovnyak, D & Kastner, ME 2008, 'Redetermination ofcis-diaquadiglycolatozinc(II)', Acta Crystallographica Section E Structure Reports Online, vol. 64, no. 12, pp. m1635-m1635.
View/Download from: Publisher's site
Leong, T, Howard, S & Vetere, F 2008, 'FEATURETake a chance on me', Interactions, vol. 15, no. 3, pp. 16-19.
View/Download from: Publisher's site
Leong, T, Vetere, F & Howard, S 2008, 'Abdicating choice: the rewards of letting go', DIGITAL CREATIVITY, vol. 19, no. 4, pp. 233-243.
View/Download from: Publisher's site
View description>>
Increasingly, people are faced with having to deal with vast amount of digital content. But in some situations, having to choose from such large digital libraries can be unpleasant and even paralysing, especially when people have no strong preference for a particular choice. Digital music listening is an example of such a dilemma. Focusing on Shuffle listening on the iPod, whereby listeners abdicate choice to a system to present content to them randomly, we observe that this mode of abdicating choice not only alleviates the pains of choice but also leads to better user-experience in some circumstances. Randomness is highlighted as a versatile resource. Acting as a device that 'defamiliarises' the digital music tracks, it refreshes and engages listeners' attention as well as shapes their perceptions. In some cases, the use of randomness enriches their listening experience and even encourages encounters with serendipity.
Li, S & Ying, M 2008, 'Soft constraint abstraction based on semiring homomorphism', THEORETICAL COMPUTER SCIENCE, vol. 403, no. 2-3, pp. 192-201.
View/Download from: Publisher's site
View description>>
The semiring-based constraint satisfaction problems (semiring CSPs), proposed by Bistarelli, Montanari and Rossi [S. Bistarelli, U. Montanari, F. Rossi, Semiring-based constraints solving and optimization, Journal of the ACM 44 (2) (1997) 201-236], is a very general framework of soft constraints. In this paper we propose an abstraction scheme for soft constraints that uses semiring homomorphism. To find optimal solutions of the concrete problem, we first work in the abstract problem and find its optimal solutions, and then use them to solve the concrete problem. In particular, we show that a mapping preserves optimal solutions if and only if it is an order-reflecting semiring homomorphism. Moreover, for a semiring homomorphism α and a problem P over S, if t is optimal in α (P), then there is an optimal solution over(t, ̄) of P such that over(t, ̄) has the same value as t in α (P). © 2008 Elsevier B.V. All rights reserved.
Lin Gui, Bo Liu, Wenfeng Ma & Bowei Song 2008, 'A Novel Method of Frequency-Offset Estimation Using Time Domain PN Sequences in OFDM Systems', IEEE Transactions on Broadcasting, vol. 54, no. 1, pp. 140-145.
View/Download from: Publisher's site
Lin, CT & Siana, L 2008, 'An efficient human detection system using adaptive neural fuzzy networks', International Journal of Fuzzy Systems, vol. 10, no. 3, pp. 150-160.
View description>>
The proposed efficient human detection system is based on an adaptive neural fuzzy network (ANFN). In the preprocessing process, we apply a background subtraction algorithm with Gaussian mixture model (GMM) background model to extract moving objects, and adopt a shadow elimination process to eliminate some noise and irregular moving objects. The modified independent component analysis (mICA) based conditional entropy is presented to extract and select the efficient features (independent components). Furthermore, we use an adaptive neural fuzzy network as a human detection system to recognize human objects. The ANFN model uses a functional link neural network (FLNN) to create the consequent part of the fuzzy rules. The orthogonal polynomial is applied as a functional expansion of the FLNN. The learning process of ANFN consists of structure learning and parameter learning. The structure learning depends on the entropy measure to determine the number of fuzzy rules. The parameter learning, based on the back propagation method, is used to adjust the membership function and corresponding weights of the FLNN. Finally, the proposed human detection system is applied in various circumstances. The results of this study demonstrate the accuracy of the proposed method. © 2008 TFSA.
Lin, C-T, Chen, Y-C, Huang, T-Y, Chiu, T-T, Ko, L-W, Liang, S-F, Hsieh, H-Y, Hsu, S-H & Duann, J-R 2008, 'Development of Wireless Brain Computer Interface With Embedded Multitask Scheduling and its Application on Real-Time Driver's Drowsiness Detection and Warning', IEEE Transactions on Biomedical Engineering, vol. 55, no. 5, pp. 1582-1591.
View/Download from: Publisher's site
Lin, C-T, Lin, K-L, Ko, L-W, Liang, S-F, Kuo, B-C & Chung, I-F 2008, 'Nonparametric Single-Trial EEG Feature Extraction and Classification of Driver's Cognitive Responses', EURASIP Journal on Advances in Signal Processing, vol. 2008, no. 1.
View/Download from: Publisher's site
Lin, CT, Yang, CT & Su, MT 2008, 'A hybridization of immune algorithm with particle swarm optimization for neuro-fuzzy classifiers', International Journal of Fuzzy Systems, vol. 10, no. 3, pp. 139-149.
View description>>
In order to enhance the immune algorithm (IA) performance and find the optimal solution when dealing with difficult problems, we propose an efficient immune-based particle swarm optimization (IPSO) for neuro-fuzzy classifiers to solve the skin color detection problem. The proposed IPSO combines the immune algorithm (IA) and particle swarm optimization (PSO) to perform parameter learning. The IA uses the clonal selection principle, such that antibodies between others of high similar degree are affected, and these antibodies, after the process, will have higher quality, accelerating the search and increasing the global search capacity. The PSO algorithm has proved to be very effective for solving global optimization. It is not only a recently invented high-performance optimizer that is easy to understand and implement, but it also requires little computational bookkeeping and generally only a few lines of code. Hence, we employed the advantages of PSO to improve the mutation mechanism of the immune algorithm. Simulations have shown the performance and applicability of the proposed method. © 2008 TFSA.
Lister, R 2008, 'Computer Science Education', Computer Science Education, vol. 18, no. 2, pp. 65-66.
View/Download from: Publisher's site
Lister, R 2008, 'CS research', ACM SIGCSE Bulletin, vol. 40, no. 4, pp. 16-18.
View/Download from: Publisher's site
View description>>
If our human bodies are a reflection of what we eat, then the collective body of an academic community is a reflection of what its members cite. To better understand the Computing Education Research Community, I recently counted the conferences, journals and books cited in the 43 papers comprising the first three International Computing Education Research Workshops (i.e. ICERs 2007-2007). These 43 ICER papers contained 1130 citations, which is a remarkable average of 26 citations per publication. Almost one third (32%) of the citations were to conferences, while 38% of citations were to journals, and 21% to books and book chapters.
Lister, R 2008, 'The originality glut', ACM SIGCSE Bulletin, vol. 40, no. 2, pp. 14-15.
View/Download from: Publisher's site
View description>>
Originality is over-rated in computing education research. We have a world-wide glut of originality.
Lister, R & Box, I 2008, 'A citation analysis of the sigcse 2007 proceedings', ACM SIGCSE Bulletin, vol. 40, no. 1, pp. 476-480.
View/Download from: Publisher's site
View description>>
This paper identifies the most commonly cited conferences, journals and books among the 1398 citations made in the 122 publications of the SIGCSE 2007 proceedings. The SIGCSE 2007 authors cited a very large array of conferences, journals and books, but the majority are only cited within a single paper. There are only a very small set of journals and conferences cited frequently. Most books cited are concerned with technical information or are textbooks. Only 2% of books are concerned with computer science education and 23% with education in general. The picture that emerges from this citation analysis is that the SIGCSE community does not have a substantial core set of educational literature. Also, the epistemology of the SIGCSE community is primarily objectivist, with a focus on content, rather than a constructivist, student-centered focus on learning.
Liu, B, Gui, L, Zhang, W & Song, B 2008, 'On Channel Estimation Method Using Time Domain Sequences in OFDM Systems', IEEE Transactions on Broadcasting, vol. 54, no. 4, pp. 786-791.
View/Download from: Publisher's site
Liu, B, Gui, L, Zhang, W & Xiong, H 2008, 'Frequency Domain Feed-forward Filter Combined DFE Structure in Single Carrier Systems over Time-varying Channels', IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 54, no. 4, pp. 1569-1575.
View/Download from: Publisher's site
Liu, B, Hao, Z, Lu, J & Zhang, G 2008, 'Supervised feature extraction based on One-against-All scheme', Dynamics of Continuous, Discrete and Impulsive Systems Series B: Applications and Algorithms, vol. 15, no. 3, pp. 339-350.
View description>>
Support vector machines (SVMs) as being good tools for classification problems has been proposed by Vapnik. This paper proposes a supervised feature extraction method based on One-against-All scheme for the multi-class classification problems. In this approach, after embedding all the classes into one feature space and constructing hyperplanes based on One-against-All scheme, we extract the orientation distance features between the examples and every hyperplanes in the space, and then map the new features into another feature space, finally utilize other algorithms to classify them. In order to examine the performance of the proposed approach, One-against-All, One-against-One and the introduced approach are compared using three UCI data sets. From the results, we reported that after mapping the examples two times, the training accuracy and generalization performance is enhanced more or less. Copyright © 2008 Watam Press.
Lu, J, Liu, B, Zhang, G, Hao, Z & Xiao, Y 2008, 'A situation assessment approach using support vector machines as a learning tool', International Journal of Nuclear Knowledge Management, vol. 3, no. 1, pp. 82-82.
View/Download from: Publisher's site
View description>>
In order to assess a situation and support decision makers' awareness for the situation, this study first proposes a situation assessment model with mathematical description. It then develops a Support Vector Machine based assessment approach, which has the ability to learn the rules from the previous assessment results and generate necessary warnings for a situation. Finally, a set of experiments is conducted to illustrate and validate the proposed approach.
Lu, J, Yang, X & Zhang, G 2008, 'Support vector machine-based multi-source multi-attribute information integration for situation assessment', EXPERT SYSTEMS WITH APPLICATIONS, vol. 34, no. 2, pp. 1333-1340.
View/Download from: Publisher's site
View description>>
Understanding any given situation requires integrating many pieces of information. Such information has in most cases multiple attributes and is obtained from multiple data sources within multiple time slots. Situation assessors' experience and preference will naturally influence the result of information integration, and hence influence the awareness generated for a situation. This study focuses on how multi-source multi-attribute information about a situation is integrated and how the awareness information for the situation is derived. A learning-based information integration approach, which embeds the fuzzy least squares support vector machine (FLS-SVM) technique, is developed in this study. This approach can assess a situation through integrating and inference obtained information and analyzing related data sources. A series of experiments show that the proposed approach has an accuracy learning ability from assessors' experience in the information integration for generating awareness for a situation. © 2007 Elsevier Ltd. All rights reserved.
Lu, J, Zhang, G & Ruan, D 2008, 'Intelligent multi-criteria fuzzy group decision-making for situation assessments', SOFT COMPUTING, vol. 12, no. 3, pp. 289-299.
View/Download from: Publisher's site
View description>>
Organizational decisions and situation assessment are often made in groups, and decision and assessment processes involve various uncertain factors. To increase efficiently group decision-making, this study presents a new rational-political model as a systematic means of supporting group decision-making in an uncertain environment. The model takes advantage of both rational and political models and can handle inconsistent assessment, incomplete information and inaccurate opinions in deriving the best solution for the group decision under a sequential framework. The model particularly identifies three uncertain factors involved in a group decision-making process: decision makers' roles, preferences for alternatives, and judgments for assessment-criteria. Based on this model, an intelligent multi-criteria fuzzy group decision-making method is proposed to deal with the three uncertain factors described by linguistic terms. The proposed method uses general fuzzy numbers and aggregates these factors into a group satisfactory decision that is in a most acceptable degree of the group. Inference rules are particularly introduced into the method for checking the consistence of individual preferences. Finally, a real case-study on a business situation assessment is illustrated by the proposed method. © Springer-Verlag 2007.
Lu, J, Zhang, G & Wu, F 2008, 'TEAM SITUATION AWARENESS USING WEB-BASED FUZZY GROUP DECISION SUPPORT SYSTEMS', INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, vol. 1, no. 1, pp. 50-59.
View/Download from: Publisher's site
View description>>
Situation awareness (SA) is an important element to support responses and decision making to crisis problems. Decision making for a complex situation often needs a team to work cooperatively to get consensus awareness for the situation. Team SA is characterized including information sharing, opinion integration and consensus SA generation. In the meantime, various uncertainties are involved in team SA during information collection and awareness generation. Also, the collaboration between team members may be across distances and need web-based technology to facilitate. This paper presents a web-based fuzzy group decision support system (WFGDSS) and demonstrates how this system can provide a means of support for generating team SA in a distributed team work context with the ability of handling uncertain information.
Lu, J, Zhang, G & Wu, F 2008, 'Team Situation Awareness using Web-Based Fuzzy Group Decision Support Systems', International Journal of Computational Intelligence Systems, vol. 1, no. 1, pp. 50-59.
View/Download from: Publisher's site
View description>>
Situation awareness (SA) is an important element to support responses and decision making to crisis problems. Decision making for a complex situation often needs a team to work cooperatively to get consensus awareness for the situation. Team SA is characterized including information sharing, opinion integration and consensus SA generation. In the meantime, various uncertainties are involved in team SA during information collection and awareness generation. Also, the collaboration between team members may be across distances and need web-based technology to facilitate. This paper presents a web-based fuzzy group decision support system (WFGDSS) and demonstrates how this system can provide a means of support for generating team SA in a distributed team work context with the ability of handling uncertain information. © 2008 Taylor & Francis Group, LLC.
Margetts, CDE, Morris, M, Astuti, D, Gentle, DC, Cascon, A, McRonald, FE, Catchpoole, D, Robledo, M, Neumann, HPH, Latif, F & Maher, ER 2008, 'Evaluation of a functional epigenetic approach to identify promoter region methylation in phaeochromocytoma and neuroblastoma', Endocrine Related Cancer, vol. 15, no. 3, pp. 777-786.
View/Download from: Publisher's site
View description>>
The molecular genetics of inherited phaeochromocytoma have received considerable attention, but the somatic genetic and epigenetic events that characterise tumourigenesis in sporadic phaeochromocytomas are less well defined. Previously, we found considerable overlap between patterns of promoter region tumour suppressor gene (TSG) hypermethylation in two neural crest tumours, neuroblastoma and phaeochromocytoma. In order to identify candidate biomarkers; and epigenetically inactivated TSGs in phaeochromocytoma and neuroblastoma, we characterised changes in gene expression in three neuroblastoma cell lines after treatment with the demethylating agent 5-azacytidine. Promoter region methylation status was then determined for 28 genes that demonstrated increased expression after demethylation. Three genes HSP47, homeobox A9 (HOXA9) and opioid binding protein (OPCML) were methylated in > 10% of phaeochromocytomas (52, 17 and 12% respectively). Two of the genes, epithelial membrane protein 3 (EMP3) and HSP47, demonstrated significantly more frequent methylation in neuroblastoma than phaeochromocytoma. These findings extend epigenotype of phaeochromocytoma and identify candidate genes implicated in sporadic phaeochromocytoma tumourigenesis. © 2008 Society for Endocrinology.
McGregor, C, Percival, J, Curry, J, Foster, D, Anstey, E, Churchill, D & IEEE 2008, 'A Structured Approach to Requirements Gathering Creation Using PaJMa Models', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-8, pp. 1506-1509.
View/Download from: Publisher's site
Merigó, JM & Gil Lafuente, AM 2008, 'THE GENERALIZED ADEQUACY COEFFICIENT AND ITS APPLICATION IN STRATEGIC DECISION MAKING', FUZZY ECONOMIC REVIEW, vol. 13, no. 02, pp. 17-36.
View/Download from: Publisher's site
View description>>
The adequacy coefficient is a very useful technique that provides a more complete formulation than the Hamming distance in decision making problems. In this paper, we suggest a generalization by using generalized and quasi-arithmetic means. As a result, we will get the generalized ordered weighted averaging adequacy coe fficient (GOWAAC) and the Quasi- OWAAC operator. These new aggregation operators generalize a wide range of particular cases such as the generalized adequacy coefficient (GAC), the weighted generalized adequacy coefficient (WGAC), the ordered weighted averaging adequacy coefficient (OWAAC), the ordered weighted quadratic averaging adequacy coefficient (OWQAAC), and others. We study different families and properties of these aggregation operators. We also analyze the unification point with distance measures and we find that in these situations, the GOWAAC and the Quasi-OWAAC become the Minkowski ordered weighted averaging distance (MOWAD) operator and the Quasi- OWAD operator, respectively. Finally, we also develop an application of the new approach in a strategic decision making problem about selection of strategies.
Mu, K, Jin, Z & Zowghi, D 2008, 'A Priority-Based Negotiations Approach for Handling Inconsistencies in Multi-Perspective Software Requirements', JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, vol. 21, no. 4, pp. 574-596.
View/Download from: Publisher's site
View description>>
Inconsistency of multi-perspective requirements specifications is a pervasive issue during the requirements process. However, managing inconsistency is not just a pure technical problem. It is always associated with a process of interactions and competit
Nataatmadja, I & Dyson, LE 2008, 'The Role of Podcasts in Students' Learning', International Journal of Interactive Mobile Technologies, vol. 2, no. 3, pp. 17-21.
View description>>
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can access a variety of educational material anywhere, anytime on iPods, MP3 players or even desktop computers. There remain many questions about the impact of podcasts on students learning. One issue is how podcasts can be used to support high quality, experiential learning rather than merely perpetuating the old transmission model of education. In this paper, we explore the reasons why students either use, or fail to use, podcasts provided for their education. We report on the motivation of students enrolled in a large first-year information systems subject. These varied considerably and show that podcasts are a useful adjunct for providing for the diverse range of learning styles of our students. However, we also conclude that further research is needed into the use of podcasts to promote deeper learning in our students and how podcasts can act as a support tool for other forms of m-learning.
Pal, NR, Chuang, C-Y, Ko, L-W, Chao, C-F, Jung, T-P, Liang, S-F & Lin, C-T 2008, 'EEG-Based Subject- and Session-independent Drowsiness Detection: An Unsupervised Approach', EURASIP Journal on Advances in Signal Processing, vol. 2008, no. 1.
View/Download from: Publisher's site
Qumer, A & Henderson-Sellers, B 2008, 'A framework to support the evaluation, adoption and improvement of agile methods in practice', JOURNAL OF SYSTEMS AND SOFTWARE, vol. 81, no. 11, pp. 1899-1919.
View/Download from: Publisher's site
View description>>
Agile methods are often seen as providing ways to avoid overheads typically perceived as being imposed by traditional software development environments. However, few organizations are psychologically or technically able to take on an agile approach rapidly and effectively. Here, we describe a number of approaches to assist in such a transition. The Agile Software Solution Framework (ASSF) provides an overall context for the exploration of agile methods, knowledge and governance and contains an Agile Toolkit for quantifying part of the agile process. These link to the business aspects of software development so that the business value and agile process are well aligned. Finally, we describe how these theories are applied in practice with two industry case studies using the Agile Adoption and Improvement Model (AAIM). © 2008 Elsevier Inc. All rights reserved.
Qumer, A & Henderson-Sellers, B 2008, 'An evaluation of the degree of agility in six agile methods and its applicability for method engineering', INFORMATION AND SOFTWARE TECHNOLOGY, vol. 50, no. 4, pp. 280-295.
View/Download from: Publisher's site
View description>>
While agile methods are in use in industry, little research has been undertaken into what is meant by agility and how a supposed agile method can be evaluated with regard to its veracity to belong to this category of software development methodological approaches. Here, an analytical framework, called 4-DAT, is developed and applied to six well-known agile methods and, for comparison, two traditional methods. The results indicate the degree of agility to be found in each method, from which a judgement can be made as to whether the appellation of 'agile' to that method is appropriate. This information is shown to be useful, for example, when constructing a methodology from method fragments (method engineering) and when comparing agile and traditional methods. © 2007 Elsevier B.V. All rights reserved.
Schirmer, SG, Oi, DKL & Devitt, SJ 2008, 'Physics-based mathematical models for quantum devices via experimental system identification', Journal of Physics: Conference Series, vol. 107, pp. 012011-012011.
View/Download from: Publisher's site
Sheard, J, Carbone, A, Lister, R, Simon, B, Thompson, E & Whalley, JL 2008, 'Going SOLO to assess novice programmers', ACM SIGCSE Bulletin, vol. 40, no. 3, pp. 209-213.
View/Download from: Publisher's site
View description>>
This paper explores the programming knowledge of novices using Biggs' SOLO taxonomy. It builds on previous work of Lister et al. (2006) and addresses some of the criticisms of that work. The research was conducted by studying the exam scripts for 120 introductory programming students, in which three specific questions were analyzed using the SOLO taxonomy. The study reports the following four findings: when the instruction to students used by Lister et al. - 'In plain English, explain what the following segment of Java code does' - is replaced with a less ambiguous instruction, many students still provide multistructural responses; students are relatively consistent in the SOLO level of their answers; student responses on SOLO reading tasks correlate positively with performance on writing tasks; postgraduates students manifest a higher level of thinking than undergraduates.
Sheng-Fu Liang, Shih-Mao Lu, Jyh-Yeong Chang & Chin-Teng Lin 2008, 'A Novel Two-Stage Impulse Noise Removal Technique Based on Neural Networks and Fuzzy Decision', IEEE Transactions on Fuzzy Systems, vol. 16, no. 4, pp. 863-873.
View/Download from: Publisher's site
Shui Yu, Wanlei Zhou & Doss, R 2008, 'Information theory based detection against network behavior mimicking DDoS attacks', IEEE Communications Letters, vol. 12, no. 4, pp. 318-321.
View/Download from: Publisher's site
Stephens, AM, Evans, ZWE, Devitt, SJ & Hollenberg, LCL 2008, 'Asymmetric quantum error correction via code conversion', Physical Review A, vol. 77, no. 6.
View/Download from: Publisher's site
Stephens, AM, Evans, ZWE, Devitt, SJ, Greentree, AD, Fowler, AG, Munro, WJ, O’Brien, JL, Nemoto, K & Hollenberg, LCL 2008, 'Deterministic optical quantum computer using photonic modules', Physical Review A, vol. 78, no. 3.
View/Download from: Publisher's site
Tsai, Y, Chung, I, Simpson, JC, Lee, M, Hsiung, C, Chiu, T, Kao, L, Chiu, T, Lin, C, Lin, W, Liang, S & Lin, C 2008, 'Automated recognition system to classify subcellular protein localizations in images of different cell lines acquired by different imaging systems', Microscopy Research and Technique, vol. 71, no. 4, pp. 305-314.
View/Download from: Publisher's site
View description>>
AbstractSystemic analysis of subcellular protein localization (location proteomics) provides clues for understanding gene functions and physiological condition of the cells. However, recognition of cell images of subcellular structures highly depends on experience and becomes the rate‐limiting step when classifying subcellular protein localization. Several research groups have extracted specific numerical features for the recognition of subcellular protein localization, but these recognition systems are restricted to images of single particular cell line acquired by one specific imaging system and not applied to recognize a range of cell image sources. In this study, we establish a single system for automated subcellular structure recognition to identify cell images from various sources. Two different sources of cell images, 317 Vero (http://gfp‐cdna.embl.de) and 875 CHO cell images of subcellular structures, were used to train and test the system. When the system was trained by a single source of images, the recognition rate is high and specific to the trained source. The system trained by the CHO cell images gave high average recognition accuracy for CHO cells of 96%, but this was reduced to 46% with Vero images. When we trained the system using a mixture of CHO and Vero cell images, an average accuracy of recognition reached 86.6% for both CHO and Vero cell images. The system can reject images with low confidence and identify the cell images correctly recognized to avoid manual reconfirmation. In summary, we have established a single system that can recognize subcellular protein localizations from two different sources for location‐proteomic studies. studies. Microsc. Res. Tech., 2008. © 2007 Wiley‐Liss, Inc.
Tsai, Y-S, Lin, C-T, Tseng, GC, Chung, I-F & Pal, NR 2008, 'Discovery of dominant and dormant genes from expression data using a novel generalization of SNR for multi-class problems', BMC Bioinformatics, vol. 9, no. 1.
View/Download from: Publisher's site
View description>>
AbstractBackgroundThe Signal-to-Noise-Ratio (SNR) is often used for identification of biomarkers for two-class problems and no formal and useful generalization of SNR is available for multiclass problems. We propose innovative generalizations of SNR for multiclass cancer discrimination through introduction of two indices, Gene Dominant Index and Gene Dormant Index (GDIs). These two indices lead to the concepts of dominant and dormant genes with biological significance. We use these indices to develop methodologies for discovery of dominant and dormant biomarkers with interesting biological significance. The dominancy and dormancy of the identified biomarkers and their excellent discriminating power are also demonstrated pictorially using the scatterplot of individual gene and 2-D Sammon's projection of the selected set of genes. Using information from the literature we have shown that the GDI based method can identify dominant and dormant genes that play significant roles in cancer biology. These biomarkers are also used to design diagnostic prediction systems.Results and discussionTo evaluate the effectiveness of the GDIs, we have used four multiclass cancer data sets (Small Round Blue Cell Tumors, Leukemia, Central Nervous System Tumors, and Lung Cancer). For each data set we demonstrate that the new indices can find biologically meaningful genes that can act as biomarkers. We then use six machine learning tools, Nearest Neighbor Classifier (NNC), Nearest Mean Classifier (NMC), Support Vector Machine (SVM) classifier with linear kernel, and SVM classifier with Gaussian kernel, where both SVMs are used in conjunction with one-vs-all (OVA) and one-vs-one (OVO) strategies. We found GDIs to be very effective in identifying biomarkers with strong class specific signatures. With all six tools and for all data sets we could achie...
van den Hoven, E & Eggen, B 2008, 'Informing augmented memory system design through autobiographical memory theory', PERSONAL AND UBIQUITOUS COMPUTING, vol. 12, no. 6, pp. 433-443.
View/Download from: Publisher's site
View description>>
Autobiographical memory (AM) is the "memory for the events in one's life" [1]. Often it is assumed that in order to remember all those events, you just need to record everything and when you replay these recordings you will remember those events. You can compare this with a library metaphor that has been used to explain AM according to the record-keeping approach. However, after many years of AM-research it was concluded that AM is stored in a different manner, namely according to the constructionist approach, which often is initiated by memory cues. This paper explains these AM theories, surveys literature on existing augmented memory systems and describes our own work in this area. All this input is combined into eight design recommendations for future augmented memory systems.
Voinov, A 2008, 'Understanding and communicating sustainability: global versus regional perspectives', Environment, Development and Sustainability, vol. 10, no. 4, pp. 487-501.
View/Download from: Publisher's site
View description>>
While there is no single definition of sustainability, most would agree that it implies that a system is to be maintained at a certain level, held within certain limits. Sustainability denies run-away growth, but it also precludes any substantial set backs or cuts. This sustainability path is hard to reconcile with the renewal cycle that can be observed in most living systems developing according to their natural intrinsic mechanisms. Besides, since different human dominated systems are in significantly different states and stages of development, sustaining those states assumes maintaining social disparities in perpetuity. This creates a challenge in communicating the ideas of sustainability in different regions. Systems are parts of hierarchies where systems of higher levels are made of subsystems from lower levels. Renewal in components is an important factor of adaptation and evolution. But then sustainability of a system borrows from sustainability of a supra-system and rests upon lack of sustainability in subsystems. Therefore by sustaining certain systems beyond their renewal cycle, we decrease the sustainability of larger, higher level systems. The only way to resolve this contradiction is to agree that the biosphere as a whole with humans as one of its components is the only system which sustainability we are to seek. © 2007 Springer Science+Business Media B.V.
Voinov, A & Gaddis, EJB 2008, 'Lessons for successful participatory watershed modeling: A perspective from modeling practitioners', Ecological Modelling, vol. 216, no. 2, pp. 197-207.
View/Download from: Publisher's site
Wang, G & Ying, M 2008, 'Deterministic distributed dense coding with stabilizer states', PHYSICAL REVIEW A, vol. 77, no. 3, pp. 1-10.
View/Download from: Publisher's site
View description>>
We consider the possibility of using stabilizer states to perform deterministic dense coding among multiple senders and a single receiver. In the model we studied, the utilized stabilizer state is partitioned into several subsystems and then each subsystem is held by a distinct party. We present a sufficient condition for a stabilizer state to be useful for deterministic distributed dense coding with respect to a given partition plan. The corresponding protocol is also constructed. Furthermore, we propose a method to partially solve a more general problem of finding the set of achievable alphabet sizes for an arbitrary stabilizer state with respect to an arbitrary partition plan. Finally, our work provides a perspective from the stabilizer formalism to view the standard dense coding protocol and also unifies several previous results in a single framework. © 2008 The American Physical Society.
Wang, G & Ying, M 2008, 'Perfect many-to-one teleportation with stabilizer states', PHYSICAL REVIEW A, vol. 77, no. 3, pp. 1-12.
View/Download from: Publisher's site
View description>>
We study the possibility of performing perfect teleportation of unknown quantum states from multiple senders to a single receiver with a previously shared stabilizer state. In the model we considered, the utilized stabilizer state is partitioned into several subsystems and then each subsystem is distributed to a distinct party. We present two sufficient conditions for a stabilizer state to achieve a given nonzero teleportation capacity with respect to a given partition plan. The corresponding teleportation protocols are also explicitly given. Interestingly, we find that even mixed stabilizer states are also useful for perfect many-to-one teleportation. Finally, our work provides a perspective from stabilizer formalism to view the standard teleportation protocol and also suggests a technique for analyzing teleportation capability of multipartite entangled states. © 2008 The American Physical Society.
Wang, G, Huo, H, Han, D & Hui, X 2008, 'Query Processing and Optimization Techniques over Streamed Fragmented XML', World Wide Web, vol. 11, no. 3, pp. 339-359.
View/Download from: Publisher's site
Woodside, AG, Sood, S & Miller, KE 2008, 'When consumers and brands talk: Storytelling theory and research in psychology and marketing', PSYCHOLOGY & MARKETING, vol. 25, no. 2, pp. 97-145.
View/Download from: Publisher's site
View description>>
Storytelling is pervasive through life. Much information is stored, indexed, and retrieved in the form of stories. Although lectures tend to put people to sleep, stories move them to action. People relate to each other in terms of stories - and products and brands often play both central and peripheral roles in their stories. To aid storytelling research in consumer psychology, this article develops a narrative theory that describes how consumers use brands as props or anthropomorphic actors in stories they report about themselves and others. Such drama enactments enable these storytellers to experience powerful myths that reflect psychological archetypes. The article includes findings from case study research that probes propositions of the theory. Implications for consumer psychology and marketing practice follow the discussion of the findings. © 2008 Wiley Periodicals, Inc.
Youguang Guo, Jian Guo Zhu, Jinjiang Zhong, Haiyan Lu & Jian Xun Jin 2008, 'Measurement and Modeling of Rotational Core Losses of Soft Magnetic Materials Used in Electrical Machines: A Review', IEEE Transactions on Magnetics, vol. 44, no. 2, pp. 279-291.
View/Download from: Publisher's site
View description>>
In many situations, for example, in the cores of a rotating electrical machine and the T-joints of multiphase transformers, the magnetic flux varies with time in terms of both magnitude and direction, i.e., the local flux density vector rotates with varying magnitude and varying speed. Therefore, it is important that the magnetic properties of the core materials under various rotational magnetizations be properly investigated, modeled, and applied in the design and analysis of electromagnetic devices with rotational flux. Drawing from the huge amount of papers published by various researchers in the past century, this paper presents an extensive survey on the measurement and modeling of rotational core losses of soft magnetic materials used in electrical machines, particularly from the view of practical engineering application. The paper aims to provide a broad picture of the historical development of measuring techniques, measuring apparatus, and practical models of rotational core losses. © 2008 IEEE.
Yusop, N, Zowghi, D & Lowe, D 2008, 'The impacts of non-functional requirements in web system projects', International Journal of Value Chain Management, vol. 2, no. 1, pp. 18-18.
View/Download from: Publisher's site
View description>>
In web system development, the Non-Functional Requirements (NFRs) are typically considered only briefly during the requirements elicitation stage and not rigorously articulated by either web developers or the client. This paper reports on an investigation into this issue involving interviews with web developers who were engaged in commercial web development projects. The results from this qualitative research highlight that web developers commonly do not pay sufficient attention to NFRs. This arises due to uncertainty, lack of time, lack of knowledge in the importance of NFRs and partly because NFRs are not readily available and documented from previous similar projects. Web developers also do not elicit NFR at the same time and at the same level of details as Functional Requirements (FRs). This study highlights that exploring the domain at an early stage of development will help developers to better understand NFR. A lack of rigour in articulating NFRs may significantly impact on the development effectiveness and the quality of the resulting web system. An evaluation of NFRs may also lead to discovering new FRs.
Zhang, G, Lu, J & Gao, Y 2008, 'An algorithm for fuzzy multi-objective multi-follower partial cooperative bilevel programming', JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, vol. 19, no. 4-5, pp. 303-319.
View description>>
In a bilevel decision problem, both the leader and the follower may have multiple objectives to optimize under certain constraints. In the meantime, these objective functions and constraints may contain some uncertain parameters. In addition, there may h
Zhang, G, Lu, J & Gao, Y 2008, 'FUZZY BILEVEL PROGRAMMING: MULTI-OBJECTIVE AND MULTI-FOLLOWER WITH SHARED VARIABLES', INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, vol. 16, pp. 105-133.
View/Download from: Publisher's site
View description>>
Bilevel programming deals with hierarchical optimization problems in which the leader at the upper level attempts to optimize his or her objectives, but subject to a set of constraints and the follower's reactions. Typical bilevel programming considers one leader one follower situation and supposes each of them has only one objective. In real world situations, multiple followers may be involved and they may be with different relationships such as sharing decision variables or not, sharing objectives or not. Therefore, the leader's decision will be affected not only by those followers' reactions but also by their relationships. In addition, any of the leader and/or these followers may have multiple conflict objectives that should be optimized simultaneously. Furthermore, the parameters of a bilevel programming model may be described by uncertain values. This paper addresses all these three issues as a whole by particularly focusing on the situation of sharing decision variables among followers. It first proposes a set of fuzzy multi-objective multi-follower bilevel programming (FMMBP) models to describe the complex issue. It then presents an approximation branch-and-bound algorithm to solve the FMMBP problems. Finally, two examples illustrate the proposed models and algorithm.
Zhang, G, Shi, C & Lu, J 2008, 'AN EXTENDED KTH-BEST APPROACH FOR REFERENTIAL-UNCOOPERATIVE BILEVEL MULTI-FOLLOWER DECISION MAKING', INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, vol. 1, no. 3, pp. 205-214.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques have been mainly developed for solving decentralized management problems with decision makers in a hierarchical organization. When multiple followers are involved in a bilevel decision problem, called a bilevel multi-follower (BLMF) decision problem, the leaderâs decision will be affected, not only by the reactions of these followers, but also by the relationships among these followers. The referential-uncooperative situation is one of the popular cases of BLMF decision problems where these multiple followers donât share decision variables with each other but may take othersâ decisions as references to their decisions. This paper presents a model for the referential-uncooperative BLMF decision problem. As the kth-best approach is one of the most successful approaches in dealing with normal bilevel decision problems, this paper then proposes an extended kth-best approach to solve the referential-uncooperative BLMF problem. Finally an example of logistics planning illustrates the application of the proposed extended kth-best approach.
Zhang, G, Shi, C & Lu, J 2008, 'An ExtendedKth-Best Approach For Referential-Uncooperative Bilevel Multi-Follower Decision Making', International Journal of Computational Intelligence Systems, vol. 1, no. 3, pp. 205-214.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques have been mainly developed for solving decentralized management problems with decision makers in a hierarchical organization. When multiple followers are involved in a bilevel decision problem, called a bilevel multi-follower (BLMF) decision problem, the leader's decision will be affected, not only by the reactions of these followers, but also by the relationships among these followers. The referential-uncooperative situation is one of the popular cases of BLMF decision problems where these multiple followers don't share decision variables with each other but may take others' decisions as references to their decisions. This paper presents a model for the referential-uncooperative BLMF decision problem. As the kth-best approach is one of the most successful approaches in dealing with normal bilevel decision problems, this paper then proposes an extended kth-best approach to solve the referential-uncooperative BLMF problem. Finally an example of logistics planning illustrates the application of the proposed extended kth-best approach. © 2008 Taylor & Francis Group, LLC.
Zharova, N, Sfriso, A, Pavoni, B & Voinov, A 2008, 'Analysis of annual fluctuations of C. nodosa in the Venice lagoon: Modeling approach', Ecological Modelling, vol. 216, no. 2, pp. 134-144.
View/Download from: Publisher's site
Al-Oqaily, A, Kennedy, PJ, Catchpoole, D & Simoff, S 1970, 'Comparison of visualization methods of genome-wide SNP profiles in childhood acute lymphoblastic leukaemia', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, Australian Computer Society, Adelaide, Australia, pp. 111-121.
View description>>
Data mining and knowledge discovery have been applied to datasets in various industries including biomedical data. Modelling, data mining and visualization in biomedical data address the problem of extracting knowledge from large and complex biomedical data. The current challenge of dealing with such data is to develop statistical-based and data mining methods that search and browse the underlying patterns within the data. In this paper, we employ several data reduction methods for visualizing genome- wide Single Nucleotide Polymorphism (SNP) datasets based on state-of-art data reduction techniques. Visualization approach has been selected based on the trustworthiness of the resultant visualizations. To deal with large amounts of genetic variation data, we have chosen to apply different data reduction methods to deal with the problem induced by high dimensionality. Based on the trustworthiness metric we found that neighbour Retrieval Visualizer (NeRV) outperformed other methods. This method optimizes the retrieval quality of Stochastic neighbour Embedding. The quality measure of the visualization (i.e. NeRV) showed excellent results, even though the dataset was reduced from 13917 to 2 dimensions. The visualization results will assist clinicians and biomedical researchers in understanding the systems biology of patients and how to compare different groups of clusters in visualizations. © 2008, Australian Computer Society, Inc.
Arathoon, SC, Fazall, A, Hussain, OK, Hussain, FK, Chang, E & IEEE 1970, 'Ontological Manifestation of Product Risk in Service Oriented Environment', 2008 6TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS, International Symposium on Intelligent Systems and Informatics, IEEE, Subotica, SERBIA, pp. 302-307.
View description>>
Risk is omnipresent in all the interactions that we carry out. Quantifying and making risk-based assessments and decisions is very important especially in the case of business interactions. However in the existing literature there is no ontological manif
Aseeri, A, Wongthongtham, P, Wu, C & Hussain, FK 1970, 'Towards social network based ontology Evolution Wiki for an ontology evolution', Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, iiWAS08: 10th International Conference on Information Integration and Web-based Applications & Services, ACM, pp. 500-502.
View/Download from: Publisher's site
View description>>
There is a lack of well-maintained ontologies thus ontology evolution now becomes an important filed of ontology research. The evolution may reflect new categories of systems being evaluated on broader and different understandings of certain concepts and relations. Alternatively ontologies evolve because the conceptualization improves. For ontology evolution, we focus in this paper a social network based approach in which the user community has direct control over the evolution of the ontologies. Ontologies can be enriched, learnt, and obtained from social network users using various empirical techniques. In this paper, we ground the social network based approach on the philosophy of wikis so called ontology Evolution Wiki. © 2008 ACM.
Azadeh, A, Saberi, M, Javanmardi, L & Azaron, A 1970, 'Developing expert system on decision making unit efficiency', 2008 IEEE International Symposium on Industrial Electronics, 2008 IEEE International Symposium on Industrial Electronics (ISIE 2008), IEEE, pp. 809-816.
View/Download from: Publisher's site
View description>>
Efficiency is a key concept for financial institutions. As personnel specifications have greatest impact on efficiency, they can help us designing work environments for maximizing efficiency. Providing information on multiple input and output factors are a complicated and time consuming procedure. Developing expert system in this situation is hard. This paper proposed a procedure that solved mentioned problem. At first, the integrated approach determining important attributes and then expert system is developed. The integrated approach uses Data Envelopment Analysis (DEA) and Data Mining tools. DEA is used for DMUs efficiency evaluation. Artificial Neural Network (ANN) and Cross Validation Test Technique (CVTT) are used for precision testing and forecasting and finally DEA is again utilized for identification of attributes importance. ANN is used for determining important attributes and developing expert system. As well, K-means algorithm is used in developing expert system. A Procedure is proposed to developing expert system with mentioned tools and completed rule base. The constructed expert system helps managers to forecast DMUs efficiencies by selected attributes and grouping inferred efficiency. Also, they can assess new situation before happening and compare with present situation. The proposed integrated approach is applied to an actual banking system and its superiorities and advantages are discussed. © 2008 IEEE.
Azadeh, A, Saberi, M, Javanmardi, L & Azaron, A 1970, 'Developing Expert System on Decision Making Unit Efficiency', 2008 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-5, IEEE International Symposium on Industrial Electronics, IEEE, Cambridge, ENGLAND, pp. 232-+.
Azadeh, A, Seraj, O & Saberi, M 1970, 'A Total Fuzzy Regression Algorithm for Energy Consumption Estimation', 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 6th IEEE International Conference on Industrial Informatics, IEEE, Daejeon, SOUTH KOREA, pp. 1466-+.
Azadeh, A, Seraj, O & Saberi, M 1970, 'A total fuzzy regression algorithm for energy consumption estimation', 2008 6th IEEE International Conference on Industrial Informatics, 2008 6th IEEE International Conference on Industrial Informatics (INDIN), IEEE, pp. 1562-1568.
View/Download from: Publisher's site
View description>>
This study presents an integrated fuzzy regression and time series algorithm to estimate and predict electricity demand for seasonal and monthly changes in electricity consumption especially in developing countries such as China and Iran. Furthermore, it is diy Least-Squares Regression, Fuzzy Mathematical model kand styding theri advantages, thebest model is selectedl for estimation. In addition, another unique feature of this study is utillizaiton of Autocorrelation Function (ACF) to define input variable versus trail and error method. Monthyly electricity consumption of Iran form 1992 to 2004 is condidered ad the case of this study. ©2008 IEEE.
Babar, A, Zowghi, D, Cox, K, Tosic, V & ACM 1970, 'Three Integration Approaches for Map and B-SCP Requirements Engineering Techniques', APPLIED COMPUTING 2008, VOLS 1-3, ACM Symposium on Applied Computing, ACM, Fortaleza, Brazil, pp. 650-655.
Babar, AR, Zowghi, D, Cox, K, Tosic, V, Bleistein, S & Verner, J 1970, 'Problem frames and business strategy modelling', Proceedings of the 3rd international workshop on Applications and advances of problem frames, ICSE '08: International Conference on Software Engineering, ACM, Liepzig, Germany, pp. 48-51.
View/Download from: Publisher's site
View description>>
Requirements engineering describes how an IT implementation will support business functions. Most IT systems are operational in nature and typical requirements engineering techniques and methods are usually adequate in capturing and documenting the requirements for such systems. Jackson’s problem frames is a technique that is suitable for straightforward IT systems descriptions. However, when an organization deploys an IT system that must deliver upon its competitive business strategy, then an appropriate technique or method needs to be used to capture that business strategy in order to connect it to business-critical IT requirements. Here we provide an overview of the use and adaptation of problem frames to connect requirements to business strategy. We found that a simplification of the problem frames notation was necessary and that to be really effective, we had to integrate problem fames with goal modelling and Map, a method that helps describe the evolution of IT over time.
Bachfischer, A, Lawrence, EM, Litchfield, AJ, Dyson, LE & Raban, R 1970, 'Student Perspectives about Using Mobile Devices in Their Studies', IADIS International Conference on Mobile Learning, International Association for Development of the Information Society International Conference, IADIS, Algarve, Portugal, pp. 43-50.
Bagia, R & Sharma, D 1970, 'Environmental Policies v. Energy Security in Australia', Proceedings of 2nd IAEE Asian Conference, The 2nd International Association of Energy Economics Asian Conference, Curtin University of Technology Business School, Perth, Western Australia.
View description>>
Abstract: 'Environment' has lately emerged as a policy issue of immense significance in Australia. Two of the most recently released reports on the topic, namely, Garnaut Review and the Australian Government's Green Paper, have established the foundations for a deeper debate on this topic. An early review of these reports, and other literature on this topic, suggests that much of the discussion on the likely impacts of climate change and strategies to mitigate climate-change-inducing greenhouse gases essentially revolves around economic arguments, for example, cost of mitigation, price and other micro- and macro-economic impacts. A lesser emphasis appears, in this debate, to have been placed on another equally strategic dimension associated with this issue, namely, the impacts of various environmental policy initiatives on âenergy securityâ. This paper provides a discussion on this dimension.
Baker, E, Kan, MM, Teo, ST, Onyx, J, Grant, T & Zowghi, D 1970, 'Managing sustainable non-profit network organizations', Proceedings of the Annual Conference of the Administrative Sciences Association of Canada, Annual Conference of the Administrative Sciences Association of Canada, Administrative Sciences Association of Canada, University of Ottawa, Canada, pp. 118-128.
View description>>
We draw upon a case study conducted within a non-profit network organization to propose five dualities which are central to understanding effective management of non-profit networks. We then examine strategies that address these dualities, based on new approaches to leadership, performance measurement, governance, coaching and creative management of dualities.
Berglund, A & Lister, RF 1970, 'Debating the OO debate: where is the problem?', Conferences in Research and Practice in Information Technology, Vol 68: Koli Calling Proceedings of the Seventh Baltic Sea Conference on Computing Education Research, Baltic Sea Conference on Computing Education Research, Australian Computer Society, Koli National Park, Finland, pp. 171-174.
View description>>
Abstract: In this paper we discuss problems related to the teaching of object-oriented programming (OOP). We argue that more research on how the computer science teacher understands OOP would be beneficial. Our argument takes its point of departure in three sets of studies: (1) an ongoing study on how computer science teachers understand core concepts of OOP, (2) a study of how the teaching of OOP is discussed within the CS community, and (3) a set of studies that discuss the different ways in which CS teachers experience their teaching. This paper reports on an ongoing study of the different ways in which computing science teachers understand object- oriented programming, and what they mean when use the term objects first.. The phenomenographic research approach has been applied to the analysis of a discussion that occurred in the SIGCSE-members mailing list. Two understandings of objects first have been identified: (1) as an extension of imperative programming, and (2) as conceptually different from imperative programming. These two understandings are illustrated via the differing ways in which computing science teachers use the term polymorphism.
Berglund, A, Box, I, Eckerdal, A, Lister, R & Pears, A 1970, 'Learning educational research methods through collaborative research: The PhICER initiative', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Wollongong, Australia, pp. 35-42.
View description>>
To accommodate an increasing interest in phenomenography among the computing education research community, the authors of this paper have organised two workshops, or intensive courses, in phenomenography, intended for researchers in computing education at a university level. Although the workshop programs contained lectures and smaller exercises, the emphasis was on preparing one joint publication from each of the workshops. The publication from the first workshop discussed the experience of being a teacher in computing, while the second focused on teachers' experiences of the problems their students encounter when learning computing. The workshops and their impact on the community are discussed in this paper. © 2008, Australian Computer Society, Inc.
Bogg, P, Beydoun, G & Low, G 1970, 'When to Use a Multi-Agent System?', INTELLIGENT AGENTS AND MULTI-AGENT SYSTEMS, PROCEEDINGS, 11th Pacific Rim International Conference on Multi-Agents, SPRINGER-VERLAG BERLIN, Hanoi, VIETNAM, pp. 98-108.
Bongers, B & Mery Keitel, AS 1970, 'Interactivated Reading Table', Proceedings of the Conference of the Computer-Human Interaction Special Interest Group (CHISIG) of Australia on Computer-Human Interaction, Australian Computer Human Interaction Conference, CHISIG, Cairns, Australia, pp. 1-2.
View description>>
A mixed media reading table has been developed and presented to the public on various occasions. The aim is to create an integrated experience for the users, bringing together traditional media (such as books) with new media (such as video). The table uses RFID technology to link the physical objects to the media content. The project is submitted as a demo for the conference.
Brady, FR, Dyson, LE & Asela, T 1970, 'Indigenous Adoption of Mobile Phones and Oral Culture', Proceedings of the Sixth International Conference on Cultural Attitudes towards Technology and Communication, Cultural Attitudes towards Technology and Communications, Scoool of Information Technology, Murdoch University, Nimes, France, pp. 384-398.
View description>>
Indigenous people around the world are becoming more and more interested in ICT. The aural and graphical characteristics of mobile technology and multimedia, in particular, speak to strengths in Indigenous oral and graphical culture. Yet, despite many successful ICT implementations across the globe, there still remain many questions about Indigenous ICT access and adoption. In order to throw light on some of these issues, this paper examines the adoption and use of mobile phones by Indigenous people and how this fits with Indigenous culture. Specifically, we present a preliminary study of mobile phone adoption on a remote island in the Torres Strait with a special focus on Indigenous orality. The study indicates a number of very interesting issues, including an unexpected use of text messaging on mobile phones, as well as phone calls and text messages in the local language Kala Kawa Ya. We tentatively conclude that not only must ICT fit with cultural strengths such as orality but that it must also match key areas of high motivation, such as communication with family.
Bucknell, A, Lowe, D & Zowgh, D 1970, 'A method for analysing web systems model alignment', Ausweb 2008 14th Australasian World Wide Web Conference, Australian World Wide Web Conference, Southern Cross University, Ballina, Australia, pp. 17-26.
View description>>
The introduction or modification of IT systems will often lead to the need for consequential changes to the associated business processes. This is particularly true for Web systems, where the system can be much more deeply intertwined with the business processes. The failure to identify these potential impacts early on can lead to major delays or cost increases in the development process, and subsequent redevelopment as the IT system and business processes are appropriately modified to bring them into alignment. We believe that early modelling of the existing business processes, and their relationship to the IT systems, as well as the potential changes to these processes will allow the identification of misalignments in the model which are a reflection of likely misalignments which would exist in the actual processes if the changes were to be implemented. This then will allow rectification of the misalignment much earlier than is currently the case. It is worth noting that his does not necessarily require new modelling notations, but rather the use of existing notations in new ways combined with appropriate analysis tools. This research aims to demonstrate that this identification of misalignments can be achieved using existing modelling notations by applying algorithmic analysis to the information about the business process captured in the model. This can be achieved by integrating this analysis with modelling tools, and hence supporting the identification of likely flaws in a proposed changed business process before that process is actually implemented. This paper presents a proof of concept that demonstrates an approach to analysing the properties of model elements using a constraint-based rule system in conjunction with an existing widely-used modelling tool. © 2008. Andrew Bucknell, David Lowe, Didar Zowghi.
Cabrera, D, Ferguson, S & Schubert, E 1970, 'PsySound3: An integrated environment for the analysis of sound recordings', Annual Conference of the Australian Acoustical Society AAS 08, pp. 286-292.
View description>>
This paper presents possibilities offered by a computer program for analysing features of sound recordings, PsySound3. A wide variety of spectral and sound level analysis methods are implemented, together with models of loudness, roughness, pitch and binaural spatial analysis. In addition to providing access to these analysis methods, this analysis environment provides a context for easy comparison between analysis methods, which is very useful both for teaching and for the testing and development of models for research applications. The paper shows some of the potential for this by way of example. The software is structured so as to be easily extensible (using the Matlab programming environment), and many extensions are envisaged. Written by the authors and colleagues, PsySound3 is freely available via www.psysound.org.
Cabrera, D, Ferguson, S, Rizwi, F & Schubert, E 1970, 'PsySound3: a program for the analysis of sound recordings', The Journal of the Acoustical Society of America, Acoustical Society of America (ASA), pp. 3247-3247.
View/Download from: Publisher's site
View description>>
This paper demonstrates the sound analysis software PsySound3, which was written by the authors. The software currently includes a range of DSP-based analysis techniques (e.g., spectrum, cepstrum, autocorrelation, Hilbert transform, sound level meter emulator), as well as implementations of psychoacoustical algorithms often associated with sound quality (e.g., loudness, sharpness, loudness fluctuation, roughness, pitch, binaural attributes). In some cases, PsySound3 makes available multiple models of the one auditory attribute - for example it implements dynamic and static loudness models using Erb- and Bark-based auditory filters. The program is extensible, and so has the potential to allow researchers to share their analysis models using a common interface. PsySound3 is written in Matlab, and is also available as a stand-alone program. The software is freely available from www.psysound.org.
Catley, C, Stratti, H & McGregor, C 1970, 'Multi-dimensional temporal abstraction and data mining of medical time series data: Trends and challenges', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 4322-4325.
View/Download from: Publisher's site
Cetindamar, D & Pala, O 1970, 'The relationship between CTO and performance', PICMET '08 - 2008 Portland International Conference on Management of Engineering & Technology, Technology, IEEE, Univ Pretoria, Cape Town, SOUTH AFRICA, pp. 42-49.
View/Download from: Publisher's site
Chang, E & Hussain, FK 1970, 'Editors Page', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. viii-ix.
View/Download from: Publisher's site
Chen, C, Yang, P, Zhou, X & Dong, D 1970, 'A Quantum-inspired Q-learning Algorithm for Indoor Robot Navigation', 2008 IEEE International Conference on Networking, Sensing and Control, 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC), IEEE, pp. 1599-1603.
View/Download from: Publisher's site
Chen, C-H, Liu, Y-C, Lin, C-J & Lin, C-T 1970, 'A hybrid of cooperative particle swarm optimization and cultural algorithm for neural fuzzy networks', 2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence), 2008 IEEE 16th International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, Hong Kong, PEOPLES R CHINA, pp. 238-245.
View/Download from: Publisher's site
Chih-Wen Hsueh, Jen-Feng Chung, Lan-Da Van & Chin-Teng Lin 1970, 'Anticipatory access pipeline design for phased cache', 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2008 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, Seattle, WA, pp. 2342-2345.
View/Download from: Publisher's site
Chin-Teng Lin, Hong-Zhang Lin, Tzai-Wen Chiu, Chih-Feng Chao, Yu-Chieh Chen, Sheng-Fu Liang & Li-Wei Ko 1970, 'Distraction-related EEG dynamics in virtual reality driving simulation', 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2008 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, Seattle, WA, pp. 1088-1091.
View/Download from: Publisher's site
Chin-Teng Lin, Pal, NR, Chien-Yao Chuang, Tzyy-Ping Jung, Li-Wei Ko & Sheng-Fu Liang 1970, 'An EEG-based subject- and session-independent drowsiness detection', 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), 2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong), IEEE, Hong Kong, PEOPLES R CHINA, pp. 3448-3454.
View/Download from: Publisher's site
Chun-Chieh Huang, Shao-Hang Hung, Jen-Feng Chung, Lan-Da Van & Chin-Teng Lin 1970, 'Front-end amplifier of low-noise and tunable BW/gain for portable biomedical signal acquisition', 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2008 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, Seattle, WA, pp. 2717-2720.
View/Download from: Publisher's site
Clear, T, Edwards, J, Lister, R, Simon, B, Thompson, E & Whalley, J 1970, 'The teaching of novice computer programmers: Bringing the scholarly-research approach to Australia', Conferences in Research and Practice in Information Technology Series, Australasian Conference on Computer Science Education, Australian Computer Society, Wollongong, pp. 63-68.
View description>>
BRACElet is a multi-institutional multi-national research study of how novice programmers comprehend and write computer programs. This paper reviews the first action research cycle of the BRACElet project and, in the process, charts a path for the upcoming second cycle. The project remains close to educational practice, with much of the data being either data collected directly from exams sat by novices, or data from think-out-loud protocols where the task undertaken by a novice or an expert is modelled on an exam question. The first action research cycle analysed data in terms of the SOLO taxonomy. From think-aloud responses, the authors found that educators tended to manifest a SOLO relational response on small reading problems, whereas students tended to manifest a multistructural response. Furthermore, those students who manifested a relational response tended to do better overall in the exam than students who manifested a multistructural response. The second action research cycle will explore the relationship between the ability to read code and the ability to write code. Apart from reporting on the BRACElet project itself, this paper serves as an invitation for institutions and individuals to join the second action research cycle of the BRACElet project.
Cox, W, Cardwell, H & Voinov, A 1970, 'SVP as a Short Term Planning Tool: Preliminary Results of a Pilot Study', World Environmental and Water Resources Congress 2008, World Environmental and Water Resources Congress 2008, American Society of Civil Engineers, pp. 1-10.
View/Download from: Publisher's site
View description>>
Shared vision planning encompasses the basic principles of traditional planning but differs from the conventional approach in its fundamental reliance on stakeholder collaboration in a process of mutual learning and discovery as facilitated by a collaboratively developed model of the system. This collaborative approach seeks to define issues and problems, identify values and interests, and explore alternative strategies for resolving conflict and solving problems. This paper reports on the preliminary results of a pilot study initiated by the U.S. Army Corps of Engineers' Institute for Water Resources to investigate the feasibility of SVP as a planning tool in a short-term, small-scale context in support of regulatory programs and local water planning. Experience with the pilot study conducted in the James River Basin of Virginia to date suggests significant challenges to application of SVP in a short-term, small-scale planning environment. Engaging a full range of stakeholders has been hindered by restrictions imposed by the short time frame, and scale limitations created stakeholder doubt about the validity and usefulness of the process. The fact that the pilot study was presented as a limited exercise caused it to be viewed as a threat to prospects for future, larger-scale planning studies in the Basin. This experience illustrates the importance of pre-existing conditions to the success of SVP and demonstrates the special challenges that impact use of SVP in situations involving limited time and scope. © 2008 ASCE.
Davis, AM, Nurmuliani, N, Park, S & Zowghi, D 1970, 'Requirements Change: What's the Alternative?', 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008 32nd Annual IEEE International Computer Software and Applications Conference, IEEE, Turku, Finland, pp. 635-638.
View/Download from: Publisher's site
View description>>
Numerous studies have shown that a software projectpsilas cost, schedule and defect density escalate as the rate of requirements change increases. Yet none of these studies have explored the effects of not making requirements changes in response to changes in user needs. This paper explains why a project incurs just as much, if not more, risk when requirements changes are suppressed.
Debenham, JK, Simoff, SJ, Leaney, JR & Mirchandani, V 1970, 'Smart communications network management through a synthesis of distributed intelligence and information', ARTIFICIAL INTELLIGENCE IN THEORY AND PRACTICE II, World Computer Congress, Springer Verlag, Milano, Italy, pp. 415-419.
View/Download from: Publisher's site
View description>>
Demands on communications networks to support bundled, interdependent communications services (data, voice, video) are increasing in complexity. Smart network management techniques are required to meet this demand. Such management techniques are envisioned to be based on two main technologies: (i) embedded intelligence; and (ii) up-to-the-millisecond delivery of performance information. This paper explores the idea of delivery of intelligent network management as a synthesis of distributed intelligence and information, obtained through information mining of network performance.
Dong, D & Lam, J 1970, 'Rapid incoherent control of a simple quantum system via two-step optimization', 2008 27th Chinese Control Conference, 2008 Chinese Control Conference (CCC), IEEE, pp. 511-515.
View/Download from: Publisher's site
Dong, H, Hussain, FK & Chang, E 1970, 'A Semantic Crawler Based on an Extended CBR Algorithm', ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008 WORKSHOPS, On the Move Confederated International Conference and Workshops, Springer-verlag Berlin, Monterrey, MEXICO, pp. 1076-1085.
View description>>
A semantic (web) crawler refers to a series of web crawlers designed for harvesting semantic web content. This paper presents the frame-work of a semantic crawler that call abstract metadata from online webpages and Cluster the metadata by associating th
Dong, H, Hussain, FK & Chang, E 1970, 'A survey in semantic web technologies-inspired focused crawlers', 2008 Third International Conference on Digital Information Management, 2008 Third International Conference on Digital Information Management (ICDIM), IEEE, pp. 934-936.
View/Download from: Publisher's site
View description>>
Crawlers are software which can traverse the internet and retrieve webpages by hyperlinks. In the face of the inundant spam websites, traditional web crawlers cannot function well to solve this problem. Semantic focused crawlers utilize semantic web technologies to analyze the semantics of hyperlinks and web documents. This paper briefly reviews the recent studies on one category of semantic focused crawlers - ontology-based focused crawlers, which are a series of crawlers that utilize ontologies to link the fetched web documents with the ontological concepts (topics). The purpose of this is to organize and categorize web documents, or filtering irrelevant webpages with regards to the topics. A brief comparison are made among these crawlers, from six perspectives - domain, working environment, special functions, technologies utilized, evaluation metrics and evaluation results. The conclusion with respect to this comparison is made in the final section. © 2008 IEEE.
Dong, H, Hussain, FK & Chang, E 1970, 'A Transport Service Ontology-based Focused Crawler', 2008 Fourth International Conference on Semantics, Knowledge and Grid, 2008 Fourth International Conference on Semantics, Knowledge and Grid (SKG), IEEE, pp. 49-56.
View/Download from: Publisher's site
View description>>
Ontology is a technology for conceptualizing specific domain knowledge, which can provide machine-readable definitions to the severed domain. Therefore, ontology can be utilized to enhance the performance of focused crawlers, by precisely defining the crawling boundary. In this paper, we will exhibit a conceptual framework of an ontology-based focused crawler serving in the domain of transport services. Here, a transport service ontology is designed for filtering non-relevant metadata, by means of logically linking the metadata with ontological concepts. In addition, we will provide the evaluation process in order to assess the power of ontology in the focused crawler. Conclusion and further works based on our current evaluation results will be made in the final section. © 2008 IEEE.
Dong, H, Hussain, FK & Chang, E 1970, 'Quality of service (QoS) based service retrieval engine', Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, MoMM08: 6th International Conference on Mobile Computing and Multimedia, ACM, pp. 405-408.
View/Download from: Publisher's site
View description>>
It is observed that there are few service evaluation and ranking methodologies currently available in the SOE. In this paper, we propose an innovative service evaluation and ranking strategy, based on the measurement of trustworthiness and reputation of services (or service providers'). CCCI Metrics originally proposed and developed by Chang et al [1] is used to measure the trustworthiness and reputation of e-services. Here we extend the application of CCCI Metrics to the field of service retrieval. A java-based search engine prototype is designed, with the purpose of implementing the trustworthiness and reputation-based service search, evaluation and ranking. Conclusions and future works are drawn in the final section. © 2008 ACM.
Dong, H, Hussain, FK & Chang, E 1970, 'State of the Art in Negotiation Ontologies for Enhancing Business Intelligence', 2008 4th International Conference on Next Generation Web Services Practices, 2008 4th International Conference on Next Generation Web Services Practices (NWESP), IEEE, pp. 107-112.
View/Download from: Publisher's site
View description>>
Negotiation is defined as two or more agents making agreement on the common interests, which provides an efficient approach for companies to gain business intelligence from suppliers and customers. Current negotiation research focuses on automatically stimulating negotiation behaviors among agents. Ontology, as a modeling technology in semantic web, is regarded as an effective tool to improve the negotiation ability of agents, considering that ontology can provide richer semantic expressions for agents in negotiation process. In this paper, we make a brief review on the current negotiation ontology researches. In addition, by means of a unique ontology notation system, we unify the notations used in these ontologies, to maximally promote knowledge sharing outcome in this field. By comparing and contrasting the ontologies from five perspectives, we draw a brief conclusion to the present status of negotiation ontology researches, and make our suggestions to the further research in this field. © 2008 IEEE.
Dong, H, Hussain, FK, Chang, E & IEEE 1970, 'A Survey in Semantic Web Technologies-Inspired Focused Crawlers', 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, International Conference on Digital Information Management, IEEE, London, ENGLAND, pp. 961-963.
View description>>
Crawlers are software which can traverse the internet and retrieve webpages by hyperlinks. In the face of the inundant spam websites, traditional web crawlers cannot function well to solve this problem. Semantic focused crawlers utilize semantic web tech
Dong, H, Hussain, FK, Chang, E & IEEE 1970, 'A Work-in-Progress Platform for Solving Knowledge Sharing Issues in Organizations', 2008 6TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS, International Symposium on Intelligent Systems and Informatics, IEEE, Subotica, SERBIA, pp. 374-378.
View description>>
In this paper, we propose a knowledge sharing platform based on the technology of ontology and agent, in order to solve the issues in the knowledge sharing activities within organizations. Based on the analysis of literature, the issues within current or
Dong, H, Hussain, FK, Chang, E & IEEE 1970, 'State of the Art in Metadata Abstraction Crawlers', 2008 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-5, IEEE International Conference on Industrial Technology, IEEE, Chengdu, PEOPLES R CHINA, pp. 1404-1409.
View description>>
Nowadays, the research of crawlers moves closer to the semantic web, along with the appearance of increasing XML/RDF/OWL files and the rapid development of ontology mark-up languages. As an emerging concept, metadata abstraction crawlers are a series of
Dong, H, Hussain, FK, Chang, E & IEEE 1970, 'Transport Service Ontology and Its Application in the Field of Semantic Search', IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, IEEE International Conference on Service Operations and Logistics and Informatics, IEEE, Beijing, PEOPLES R CHINA, pp. 820-824.
View/Download from: Publisher's site
View description>>
Transport is a crucial component in logistics, which joints each activity in the logistics chain. The performance of logistics heavily relies on the efficiency of transport services. However, until now there has not been a clear definition about transpor
Dong, J, Wang, J, Sun, D & Lu, H 1970, 'The Research of Software Product Line Engineering Process and Its Integrated Development Environment Model', 2008 International Symposium on Computer Science and Computational Technology, 2008 International Symposium on Computer Science and Computational Technology, IEEE, Shanghai, China, pp. 66-71.
View/Download from: Publisher's site
View description>>
In order to realize the industrialization production of software, people have carried out research on and analysis the software product line architecture of the growing maturity, component technology and development methods for product line. In this paper, a novel software engineering process model is proposed based on the modern industrial production systems and automated production method: that is ldquoN-life-cycle modelrdquo. Based on this new model, not only integrated software engineering environment model and framework have been proposed, which are based on the product line development process model, but also study systematically on theirs implementation. "N-life-cycle model" and "integrated software engineering environment model based on the product line" which are set up in the article are brand-new open models possessing modern manufacturing production characteristic. The models can impel the research development quickly of product line engineering and product line software engineering environment towards the industrialisation and automatization of the software industry.
Dong, J, Zeng, F, Wang, J & Lu, H 1970, 'Price Forecasting of Supply Chain Product Based on Dynamic Fractal Dimension', 2008 International Conference on Information Management, Innovation Management and Industrial Engineering, 2008 International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), IEEE, Taipei, Taiwan, pp. 153-156.
View/Download from: Publisher's site
View description>>
Supply chain management (SCM) is an emerging field that has commanded attention and support from the industrial community. Demand forecast taking inventory into consideration is an important issue in SCM. This paper presents a novel computerized system for implementing the forecasting activities required in SCM. It can help the supply chain enterprises find hidden forms, trends and relationships in the date of supply chain by the dynamic fractal dimension of fractal theory, find that dynamic fractal dimension not only can overcome the delay of the existing technical analysis on the price forecasts, and but also can instruct the supply chain product prices in advance.
Doss, R, Li, G, Yu, S, Mak, V & Chowdhury, M 1970, 'The Crossroads Approach to Information Discovery in Wireless Sensor Networks', DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 9th International Conference on Distributed Computing and Networking, Springer Berlin Heidelberg, Kolkata, INDIA, pp. 310-321.
View/Download from: Publisher's site
Dyson, LE & Nataatmadja, I 1970, 'Students Motivations in Podcast Use', Interactive Mobile and Computer aided Learning (IMCL), Interactive Mobile and Computer aided Learning, IMCL, Amman, Jordan, pp. 1-5.
Dyson, LE, Lawrence, E, Litchfield, A & Zmijewska, A 1970, 'M-Fieldwork for Information Systems Students', Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008 41st Annual Hawaii International Conference on System Sciences, IEEE, Waikoloa, USA, pp. 46-46.
View/Download from: Publisher's site
View description>>
Fieldwork has long been identified as providing students undertaking professional studies with a means of implementing theory into a real world context. In recent years some educators, particularly in the health sciences, have introduced mobile devices to support students' fieldwork learning. In many ways there is a natural link between fieldwork and mobile technology. In this paper we report on a trial to introduce mobile support into the study of information systems in the field. The experience showed that mobile devices can assist students collect data in richer, multimedia formats and make subsequent classroom presentations of their field study much more interesting. However, it also revealed certain usage and deployment issues with the mobile devices themselves which have implications for device selection and educational design.
Dyson, LE, Leigh, EE, Litchfield, AJ, Raban, R & Tyler, JV 1970, 'Improving the Participation of International and local Students Using mLearning', UTS Learning and Teaching Forum, UTS, UTS.
Dyson, LE, Raban, R, Litchfield, AJ & Lawrence, EM 1970, 'Embedding M-Learning into Mainstream Educational Practice: Overcoming the Cost Barrier', Interactive Mobile and Computer Aided Learning (IMCL2008), Interactive Mobile and Computer Aided Learning, IMCL, Amman, Jordan, pp. 1-9.
Dyson, LE, Sixsmith, A & Than, TK 1970, 'Australian Newspaper Blogs', INNOVATION AND KNOWLEDGE MANAGEMENT IN BUSINESS GLOBALIZATION: THEORY & PRACTICE, VOLS 1 AND 2, International Business Information Management, International Business Information Management Association, Kuala Lumpur, Malaysia, pp. 194-200.
View description>>
Blogs have become one of the most prominent fonns of social media on the Web. This paper reports on the first part ofa comprehensive study of how a mainstream Australian media organisation is integrating blogs into their business. The research used a qualitative approach and data collection was undertaken using semi-structured interviews with newspaper staff. The findings presented provide an insight into the opportunities to be gained and the challenges to be faced by Australian media organisations as they incorporate blogs in their online offerings.
Eklund, JM, McGregor, C & Smith, KP 1970, 'A method for physiological data transmission and archiving to support the service of critical care using DICOM and HL7', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 1486-1489.
View/Download from: Publisher's site
Filatova, T, Van Der Veen, A & Voinov, A 1970, 'An agent-based model for exploring land market mechanisms for coastal zone management', Proc Iemss 4th Biennial Meeting Int Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making Iemss 2008, pp. 792-799.
View description>>
This paper presents an agent-based model of a land market (ALMA-C) to simulate the emergence of land prices and urban land patterns from bottom-up. Our model mimics individual decisions to buy and to sell land depending on economic, sociological and political factors as well as on the characteristics of the spatial environment. To this we add ecological and environmental considerations and focus on the question of how individual land use decisions can be affected to reduce the pressure on the coastal zone ecosystem functions. A series of model experiments helps visualize and explore how economic incentives at a land market can influence the spatial distribution of activities and land prices in a coastal zone. We demonstrate that economic incentives do affect urban form and pattern, land prices and welfare measures. However, they may not always be sufficient to reduce the pressure on coastal zone ecosystems.
Gao, Y, Zhang, G & Lu, J 1970, 'A Particle Swarm Optimization Based Algorithm for Fuzzy Bilevel Decision Making with Objective-Shared Followers', SIMULATED EVOLUTION AND LEARNING, PROCEEDINGS, Asia-Pacific Conference on Simulated Evolution and Learning, Springer, Melbourne, Australia, pp. 190-199.
View/Download from: Publisher's site
View description>>
A bilevel decision problem may have multiple followers as the lower decision units and have fuzzy demands simultaneously. This paper focuses on problems of fuzzy linear bilevel decision making with multiple followers who share a common objective but have different constraints (FBOSF). Based on the ranking relationship among fuzzy sets defined by cut set and satisfactory degree, a FBOSF model is presented and a particle swarm optimization based algorithm is developed.
Gao, Y, Zhang, G, Lu, J & Goyal, M 1970, 'A decision support system for fuzzy bilevel decision making', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific Publishing Co., Inc., Madrid, Spain, pp. 763-768.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques are developed for decentralized decision problems, which may be defined by fuzzy coefficients. Based on a fuzzy linear bilevel (FLBL) model and two FLBL algorithms, this research develops a FLBL decision support system (FLBLDS
Ghous, H, Kennedy, PJ, Catchpoole, DR & Simoff, SJ 1970, 'Kernel-based visualisation of genes with the gene ontology', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, Australian Computer Society, Adelaide, pp. 133-140.
View description>>
With the development of microarray-based high- throughput technologies for examining genetic and biological information en masse, biologists are now faced with making sense of large lists of genes identi-ffed from their biological experiments. There is a vital need for \system biology' approaches which can allow biologists to see new or unanticipated potential relationships which will lead to new hypotheses and eventual new knowledge. Finding and understanding relationships in this data is a problem well suited to visualisation. We augment genes with their associated terms from the Gene Ontology and visualise them using kernel Principal Component Analysis with both specialised linear and Gaussian kernels. Our results show that this method can correctly visualise genes by their functional relationships and we describe the difference between using the linear and Gaussian kernels on the problem. © 2008, Australian Computer Society, Inc.
Greentree, AD, Jong, LM, Van Donkelaar, JA, Devitt, SJ, Cole, JH, Stephens, AM, Jamieson, DN & Hollenberg, LCL 1970, 'Spatial adiabatic passage as a quantum wire', 2008 International Conference on Nanoscience and Nanotechnology, 2008 International Conference on Nanoscience and Nanotechnology (ICONN), IEEE, Melbourne, AUSTRALIA, pp. 156-159.
View/Download from: Publisher's site
Guo, Y, Dou, Y, Zhu, J, Lu, H & Jin, J 1970, 'Numerical magnetic field analysis and parameter computation of a PM synchronous generator', Proceedings of the 11th International Conference on Electrical Machines and Systems, ICEMS 2008, 11th International Conference on Electrical Machines and Systems, WORLD PUBLISHING CORPORATION, Huazhong Univ Sci & Technol, Wuhan, PEOPLES R CHINA, pp. 2866-2869.
View description>>
This paper presents the parameter computation and performance prediction of a permanent magnet (PM) synchronous generator based on numerical magnetic field analyses. The finite element method is employed to accurately determine the magnetic field distribution and key parameters of the machine, such as the winding flux, back electromotive force, winding inductance and core loss. An equivalent electrical circuit is applied to predict the generator performance such as the external characteristic.
Guo, Y, Dou, Y, Zhu, J, Lu, H & Jin, J 1970, 'Numerical Magnetic Field Analysis and Performance Computation of a Permanent Magnet Synchronous Generator', Proceedings of the 11th International Conference on Electrical Machines and Systems (ICEMS), World Publishing Corporation, Wuhan, China, pp. 2866-2869.
Guo, Y, Wang, X, Zhu, JG & Lu, H 1970, 'Development of a Wound Rotor Brushless Doubly Fed Machine Based on Slot MMF Harmonics', 2008 IEEE Industry Applications Society Annual Meeting, 2008 IEEE Industry Applications Society Annual Meeting (IAS), IEEE, Edmonton, Canada, pp. 1-5.
View/Download from: Publisher's site
View description>>
In the rotor winding magnetomotive force (MMF) of an ac machine, there exist so-called slot harmonics which appear in pairs and the lower order harmonic of each pair rotates in the opposite direction against the fundamental component. In addition, the slot harmonics have the same winding factor as the fundamental component. Based on these properties, this paper develops a brushless doubly fed machine (BDFM) with wound rotor. The machine consists of two stator windings with p1 and p2 pole-pairs, respectively. The rotor has a normal symmetrical multi-phase winding, in which rotating MMFs with p1 and p2 pole-pairs are induced by their stator counterparts. When the number of rotor slots equals the sum p1 and p2, the two MMFs rotate in opposite directions with respect to the rotor, satisfying the requirement of a BDFM. The major advantage of such a machine is that for both p1 and p2 pole-pair MMFs the winding factor is as high as that of the fundamental component, leading to high utilization of rotor winding and electrical efficiency.
Guo, Y, Zhu, J, Chen, J, Su, SW, Lu, H & Jin, J 1970, 'Performance Analysis of a Claw Pole PM Motor', Proceedings of Australasian Universities Power Engineering Conference 2008, Australasian Universities Power Engineering Conference, University of New South Wales, Sydney, Australia, pp. 1-5.
View description>>
This paper presents the performance analysis of a three-phase three-stack permanent magnet (PM) claw pole motor by using an improved phase variable model, which has been developed for accurate and efficient performance simulation of PM brushless dc motors. The improved model can take into account the effect of magnetic saturation and rotor position dependence of key parameters including back electromagnetic force, winding inductance, cogging torque and core loss, which are obtained from time-stepping nonlinear magnetic field finite element analysis (FEA). The presented model has been implemented in Simulink environment and employed to simulate the dynamic and steady-state performance of the three-phase three-stack PM claw pole motor with soft magnetic composite stator. Parameter computation and performance simulation are validated by experiments on the motor prototype.
Hai Dong, Hussain, FK & Chang, E 1970, 'A survey in semantic search technologies', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Phitsanulok, Thailand, pp. 403-408.
View/Download from: Publisher's site
View description>>
In this paper, we make a survey over the primary literature regarding semantic search technologies. By classifying the literature into six main categories, we review their characteristics respectively. In addition, the issues within the reviewed semantic search methods and engines are analysed and concluded based on four perspectives.
Hai Dong, Hussain, FK & Chang, E 1970, 'A survey in traditional information retrieval models', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Phitsanulok, Thailand, pp. 397-402.
View/Download from: Publisher's site
View description>>
As a matter of fact, many so-called semantic search algorithms are derived from the traditional indexterm- based search models. In this paper, we survey the traditional information retrieval models by categorizing them into three main classes and eleven subclasses, and analyse their benefits and issues of them.
Hai Dong, Hussain, FK & Chang, E 1970, 'Developing a conceptual framework of semantic search engine to promote the collaborations between SMEs in the digital ecosystems environment', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Phitsanulok, Thailand, pp. 409-412.
View/Download from: Publisher's site
View description>>
The research with regards to digital ecosystems emerged in the end of last century, and has developed in this century. Due to its immaturity, some fields within it are deemed to be blank. This research proposes to fill one of the blanks in the digital ecosystems research. By analyzing the issues in the current research, we propose to develop a semantic search engine, with the purpose of querying services provided by SMEs. The objective of this research is to build a reliable and trustworthy link between SMEs in the digital ecosystems environment. Relevant research methods and steps are discussed in this paper.
Hai Dong, Hussain, FK & Chang, E 1970, 'Developing a semantic service transaction system in the DE environment', 2008 6th IEEE International Conference on Industrial Informatics, 2008 6th IEEE International Conference on Industrial Informatics (INDIN), IEEE, Daejeon, SOUTH KOREA, pp. 1353-1357.
View/Download from: Publisher's site
View description>>
Digital Ecosystem (DE), which is an emerging service environment beyond the service-oriented architecture (SOA), is increasingly attracting researchers' interest. However, current literature reveals that there is not reliable and trustworthy technical su
Hammadi, A, Hussain, FK, Chang, E, Dillon, TS & Ali, S 1970, 'Ontological framework for trust & reputation for DBE', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Phitsanulok, THAILAND, pp. 650-653.
View/Download from: Publisher's site
View description>>
Abstract- Today's e-Businesses rely heavily on trust and reputation systems. These systems are key indicators for businesses performance. Businesses that interact with each other for their business needs form a Digital Business Ecosystem (DBE). Members ofDBE need to know the trust and reputation value of each other before the start of business interactions. The feedback mechanism is needed so that members of DBE form a unanimous opinion about trustworthiness of any specific member of the community and based their business interactions on this opinion. We present an ontological framework that will combine the feedback from all different trust and reputation information publicly available for a specific member of a domain and gives the knowledge representation on the bases of combined feedback. We call this ontological framework 'feedback ontology'.
Heijboer, M & van den Hoven, E 1970, 'Keeping up appearances', Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges, NordiCHI08: 5th Nordic Conference on Human-Computer Interaction, ACM, Lund, Sweden, pp. 162-171.
View/Download from: Publisher's site
View description>>
The design and interaction of physical game artefacts is becoming increasingly important for the design of digital tabletop games. In this paper a study is described investigating the differences in interpretations of realistic and abstract game artifacts comparing children and adults. A game was created on a digital tabletop as a carrier for the user evaluation presented in this paper. The appearance of the game artifacts was explored and a family of each of the artifacts was created. The interpretations of each of the individual artifacts and their different visual appearances were tested to determine whether children rank and interpret the functionalities of the artefacts differently than adults. The results showed that overall the understanding of abstract artifacts compared to realistic ones was best for both children and adults. It also indicated there was no significant difference in the interpretations of the realistic and abstract artefacts between children and adults.
Huang, A, Milne, D, Frank, E & Witten, IH 1970, 'Clustering Documents with Active Learning Using Wikipedia', 2008 Eighth IEEE International Conference on Data Mining, 2008 Eighth IEEE International Conference on Data Mining (ICDM), IEEE, Pisa, ITALY, pp. 839-844.
View/Download from: Publisher's site
Huang, ML, Liang, J & Nguyen, QV 1970, 'A Usability Study on the Use of Multi-Context Visualization', 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, 2008 5th International Conference on Computer Graphics, Imaging and Visualisation (CGIV), IEEE, Penang, Malaysia, pp. 311-316.
View/Download from: Publisher's site
View description>>
Graph visualization has been widely used in real-world applications, as it provides better presentation of overall data structure. However, there are navigation problems existing in deep and large relational datasets. To address these challenges, a new technique called multi-context visualization, which provides users with rich contextual information, has been proposed as the solution to the navigation in large scale datasets. This paper evaluates the multi-context visualization by conducting an experiment-based user study. To answer whether the more contextual information positively assist in making more accurate and easier decisions, it aims to evaluate the effectiveness and efficiency of the multi-context visualization, by measuring the user performance. Specifically, this usability test was designed to test if the use of multiple context views can improve navigation problems for deep and large relational data sets. © 2008 IEEE.
Hussain, FK 1970, 'Papers in track 15 - Social networks', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. lxxxiv-lxxxv.
View/Download from: Publisher's site
Hussain, FK, Chang, E & Hussain, O 1970, 'A robust methodology for prediction of trust and reputation values', Proceedings of the 2008 ACM workshop on Secure web services, CCS08: 15th ACM Conference on Computer and Communications Security 2008, ACM, pp. 97-108.
View/Download from: Publisher's site
View description>>
In this paper, we present the FC direct trust value-based decision making methodology, for making direct trust value based decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot. The direct trust value-based decision making methodology models the context specific nature of trust and the dynamic nature of trust to make direct trust value-based decisions regarding interactions. Additionally in this paper, we present the FC reputation-based trust decision making methodology, for making reputation-based trust decisions regarding interactions, if direct trust value-based decisions cannot be made. The FC reputationbased trust decision making methodology can make reputationbased trust decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot. Copyright 2008 ACM.
Hussain, O, Chang, E, Dillon, T & Hussain, F 1970, 'Ascertaining the Semantic and Linguistic Level of Perceived Risk in e-Business Interactions', 2008 IEEE International Conference on e-Business Engineering, 2008 IEEE International Conference on e-Business Engineering, IEEE, Xian, China, pp. 723-727.
View/Download from: Publisher's site
View description>>
By analyzing the level of perceived risk in the domain of e-business, the interaction initiating agent can determine beforehand whether or not it will achieve its desired outcomes and the associated consequences to it in interacting with the other agent.
Hussain, O, Chang, E, Dillon, T & Hussain, F 1970, 'Determining the Level of Perceived Risk in e-business Web 2.0 Interactions', 2008 IEEE International Conference on e-Business Engineering, 2008 IEEE International Conference on e-Business Engineering, IEEE, Xian, China, pp. 13-20.
View/Download from: Publisher's site
View description>>
In the domain of e-commerce business it is important for the initiating agent of the interaction to analyze and consider the level of perceived risk in forming an interaction with an agent, apart from just considering the level of trust and security. By
Hussain, O, Dillon, T, Chang, E & Hussain, F 1970, 'Highlighting the issues in making an informed interaction-based decision in industrial ecosystems', 2008 6th IEEE International Conference on Industrial Informatics, 2008 6th IEEE International Conference on Industrial Informatics (INDIN), IEEE, Daejeon, SOUTH KOREA, pp. 1324-1329.
View/Download from: Publisher's site
View description>>
In the literature, the notion of trust has been widely discussed and various approaches have been proposed to assess and quantify it, in order to take it into consideration when making an interaction-based decision in industrial ecosystems. At the same t
Hussain, OK, Chang, E, Hussain, FK & Dillon, TS 1970, 'Determining the Failure Level for Risk Analysis in an e-Commerce Interaction', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 290-323.
View/Download from: Publisher's site
View description>>
Before initiating a financial e-commerce interaction over the World Wide Web, the initiating agent would like to analyze the possible Risk in interacting with an agent, to ascertain the level to which it will not achieve its desired outcomes in the interaction. By analyzing the possible risk, the initiating agent can make an informed decision of its future course of action with that agent. To determine the possible risk in an interaction, the initiating agent has to determine the probability of failure and the possible consequences of failure to its resources involved in the interaction. In this chapter as a step towards risk analysis, we propose a methodology by which the initiating agent can determine beforehand the probability of failure in interacting with an agent, to achieve its desired outcomes. © 2009 Springer Berlin Heidelberg.
Hussain, OK, Chang, E, Hussain, FK & Dillon, TS 1970, 'Quantifying the numeric and linguistic magnitude of perceived risk in E-Commerce Interactions for RDSS', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. 604-610.
View/Download from: Publisher's site
View description>>
In an e-commerce business interaction, the risk assessing agent by analyzing the possible level of perceived risk beforehand can make an informed decision of its future course of interaction with an agent. The perceived risk in the context of an e-commerce business interaction is a multidimensional construct which is the combination of its subcategories. In this paper we propose a methodology by which the risk assessing agent can ascertain the numeric and linguistic level of perceived risk in an interaction by combining its different subcategories. © 2008 IEEE.
Juszczyszyn, K, Kazienko, P, Musial, K & Gabrys, B 1970, 'Temporal Changes in Connection Patterns of an Email-Based Social Network', 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, pp. 9-12.
View/Download from: Publisher's site
View description>>
Network motifs are small subgraphs that reflect local network topology and were shown to be useful for creating profiles that reveal several properties of the network. Analysis of three-node motifs (triads) was used in this paper to track the temporal changes in the structure of large social network derived from email communication between the employees of Wroclaw University of Technology. © 2008 IEEE.
Kadlec, P & Gabrys, B 1970, 'Adaptive Local Learning Soft Sensor for Inferential Control Support', 2008 International Conference on Computational Intelligence for Modelling Control & Automation, 2008 International Conference on Computational Intelligence for Modelling Control & Automation, IEEE, Vienna, AUSTRIA, pp. 243-248.
View/Download from: Publisher's site
Kadlec, P & Gabrys, B 1970, 'Gating Artificial Neural Network Based Soft Sensor', NEW CHALLENGES IN APPLIED INTELLIGENCE TECHNOLOGIES, 21st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, Springer Berlin Heidelberg, Wroclaw, POLAND, pp. 193-202.
View/Download from: Publisher's site
Kadlec, P & Gabrys, B 1970, 'Learnt Topology Gating Artificial Neural Networks', 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), 2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong), IEEE, Hong Kong, PEOPLES R CHINA, pp. 2604-2611.
View/Download from: Publisher's site
Kaindl, H, Constantine, L, Pastor, O, Sutcliffe, A & Zowghi, D 1970, 'How to Combine Requirements Engineering and Interaction Design?', 2008 16th IEEE International Requirements Engineering Conference, 2008 16th IEEE International Requirements Engineering Conference (RE), IEEE, pp. 299-301.
View/Download from: Publisher's site
View description>>
In this panel, we propose to figure out how requirements engineering and interaction design can be usefully combined. In particular, some people argue that scenarios / use cases should be concrete, as in story-telling. Others argue for use of "essential" use cases as a methodological approach to interaction and user-interface design. Somewhat in the middle, it is argued that use cases should help acquiring the requirements in the first place. What should the practitioner believe and, in particular, do, in order to develop useful and usable software and systems? Software development and interaction design require different skills and different methods and are typically done by different people. Still, scenario-based design is proposed for several activities relevant for both tasks, such as requirements elicitation, software design, and interaction design. Symbolic modeling in this spirit is actually common to various fields. However, scenario-based approaches vary, especially with regard to their use, e.g., employing abstract use cases or integrating scenarios with functions and goals in a systematic design process. So, the key issue to be raised at the panel is how to combine different approaches, e.g., in scenario-based development, so that the interaction design as well as the development of the user interface and of the software internally result in an overall useful and useable system. © 2008 IEEE.
Kierkels, J & van den Hoven, E 1970, 'Children's haptic experiences of tangible artifacts varying in hardness', Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges, NordiCHI08: 5th Nordic Conference on Human-Computer Interaction, ACM, Lund, Sweden, pp. 221-228.
View/Download from: Publisher's site
View description>>
In this paper we describe our investigations on the role of material hardness in the haptic experience of tangible artefacts. Without seeing the artifacts children had to rank their experience on a scale of two antonyms while touching and holding these artifacts. In this experiment it was shown that children have no problem ranking hardness. Two groups could be identified: soft artifacts were found to be cute, speedy and warm, e.g., and hard artifacts boring, sad and old-fashioned. We think that paying attention to this factor in the design of tangible user interfaces for children can improve their experience.
Kurian, JC 1970, 'A Multi-Paradigm Fuzzy Aggregation of Domain Ontology and Media Assets on the Semantic Web Framework', INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS, International Symposium on Information Technology, IEEE, MALAYSIA, Univ Kebangsaan, Fac Informat Sci & Technol, Kuala Lumpur, pp. 758-763.
Kurian, JC, Goh, DH-L, Htoo, THH, Wheeler, L & Hazel, L 1970, 'Enabling Single Sign-On Authentication for Web Repositories using Domain Directory Services', INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS, International Symposium on Information Technology, IEEE, MALAYSIA, Univ Kebangsaan, Fac Informat Sci & Technol, Kuala Lumpur, pp. 48-+.
Lawrence, E, Bachfischer, A, Dyson, LE & Litchfield, A 1970, 'Mobile Learning and Student Perspectives: An mReality Check!', 2008 7th International Conference on Mobile Business, 2008 7th International Conference on Mobile Business (ICMB), IEEE, Barcelona, Spain, pp. 287-295.
View/Download from: Publisher's site
View description>>
n this paper the authors report on the results of a survey aimed at ascertaining the opinions of contemporary university students on the use of mobile devices as learning tools. Four hundred and forty two postgraduate and undergraduate students from an Australian University completed the online survey. The authors analyzed both quantitative and qualitative data focusing on the ramifications for m-learning practices in university environments. Mobile technology acceptance factors are used to highlight important findings from the survey.
Lebbe, MA, Agbinya, JI, Chaczko, Z & Braun, R 1970, 'Artificial immune system inspired danger modelling in Wireless Mesh Networks', 2008 International Conference on Computer and Communication Engineering, 2008 International Conference on Computer and Communication Engineering (ICCCE), IEEE, Malaysia, pp. 984-988.
View/Download from: Publisher's site
View description>>
In recent years wireless mesh network (WMN) technologies and its applications have been actively researched and developed as the promising solution for future wireless mobile networks. On the other hand security of WMN is often a secondary reflection in development. In our previous work we proposed Artificial Immune System model to employ in secure routing in WMN. This paper improves and extends the algorithm in our previous work with more achievable danger levels and introduces responsible parameters and model danger in WMN. Moreover this paper proposes the elected network simulator for the experiments. ©2008 IEEE.
Lee, S & Lister, R 1970, 'Experiments in the dynamics of phase coupled oscillators when applied to graph colouring', Conferences in Research and Practice in Information Technology Series, Australasian Computer Science Conference, Australian Computer Society, Inc, Wollongong, Australia, pp. 83-89.
View description>>
This paper examines the capacity of networks of phase coupled oscillators to coordinate activity in a parallel, distributed fashion. To benchmark these networks of oscillators, we present empirical results from a study of the capacity of such networks to colour graphs. We generalise the update equation of Aihara et al. (2006) to an equation that can be applied to graphs requiring multiple colours. We find that our simple multi-phase model can colour some types of graphs, especially complete graphs and complete k-partite graphs with equal or a near equal number of vertices in each partition. A surprising empirical result is that the effectiveness of the approach appears to be more dependent upon the topology of the graph than the size of the graph. Copyright © 2008, Australian Computer Society, Inc.
Lee, S, Leaney, J, O’Neill, T & Hunter, M 1970, 'Evaluating Open Service Access with an Abstract Model of NGN Functions', 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Asia-Pacific Network Operations and Management Symposium, Springer Berlin Heidelberg, Beijing, China, pp. 487-490.
View/Download from: Publisher's site
View description>>
As new business models and market opportunities are rapidly emerging from the `opening up of telecommunications networks, we required a better understanding of the effectiveness of using open standards to provide access to functions in NGNs. In this paper we reason about the coverage of openly accessible functions using an abstract model of NGN functionality. Defining and using an abstract model allows us to evaluate the effectiveness of open standards from a perspective where a wide range of NGN functionality can be generalised and conveniently categorised. Subsequently, it will be possible to identify the gaps, which are a subset of functionality that we are specifically interested in for our project.
Lee, S, Leaney, J, O'Neill, T & Hunter, M 1970, 'Evaluating open service access with an abstract model of NGN functions', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 487-490.
View/Download from: Publisher's site
View description>>
As new business models and market opportunities are rapidly emerging from the 'opening up' of telecommunications networks, we required a better understanding of the effectiveness of using open standards to provide access to functions in NGNs. In this paper we reason about the coverage of openly accessible functions using an abstract model of NGN functionality. Defining and using an abstract model allows us to evaluate the effectiveness of open standards from a perspective where a wide range of NGN functionality can be generalised and conveniently categorised. Subsequently, it will be possible to identify the gaps, which are a subset of functionality that we are specifically interested in for our project. © 2008 Springer Berlin Heidelberg.
Lemke, C & Gabrys, B 1970, 'Do we need experts for time series forecasting?', Esann 2008 Proceedings 16th European Symposium on Artificial Neural Networks Advances in Computational Intelligence and Learning, pp. 253-258.
View description>>
This study examines a selection of off-the-shelf forecasting and forecast combination algorithms with a focus on assessing their practical relevance by drawing conclusions for non-expert users. Some of the methods have only recently been introduced and have not been part in comparative empirical evaluations before. Considering the advances of forecasting techniques, this analysis addresses the question whether we need human expertise for forecasting or whether the investigated methods provide comparable performance.
Leong, TW, Howard, S, Vetere, F & ACM 1970, 'Choice: Abdicating or exercising', CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, ACM Press, Florence, pp. 715-724.
View/Download from: Publisher's site
View description>>
Many people today have access to enormous libraries of digital content. Increasingly these libraries contain personal content, consumed in support of people's non-instrumental needs. If current trends persist, these repositories will only increase. Having to choose from so much could be unpleasant especially in the absence of strong preferences. This raises some concerns for user experience (UX) design. Approaches for such interactions should not only be optimized for UX but must also support users' noninstrumental needs. People face this predicament during digital music listening and yet report positive experiences when listening in shuffle. Through an empirical study of digital music listening and close examination of people's listening practices and experiences, we argue that a shufflebased approach-whereby people can abdicate choice to a random process while being able to modulate the randomness-not only mitigates the unpleasantness of choosing but also supports their non-instrumental needs while fostering desirable experiential outcomes. Copyright 2008 ACM.
Li, C-H, Kuo, B-C, Lin, C-T & Hung, C-C 1970, 'Dimension Reduction for Hyperspectral Image Classification via Support Vector based Feature Extraction', IGARSS 2008 - 2008 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2008 - 2008 IEEE International Geoscience and Remote Sensing Symposium, IEEE.
View/Download from: Publisher's site
Li, J & Hao, P 1970, 'Reliable Representation of Data on Manifolds', Procedings of the British Machine Vision Conference 2008, British Machine Vision Conference 2008, British Machine Vision Association, pp. 113.1-113.10.
View/Download from: Publisher's site
View description>>
The manifold learning algorithms are promising data analysis tools. However, to fit an unseen point in a learned model, the point must be located in the training set, which limits its scalability. In this paper, we discuss how to select landmarks from the data to help locate the test points. Our method is for data on manifolds: the way the landmarks represent the data in the ambient space should resemble the way they represent the data on the manifold. Compared to the previous research, (i) Our test foregoes the requirement of knowing the intrinsic manifold dimension and thus is more applicable and robust. (ii) Our selection implies a provable topology preservation property. (iii) We also provide a way to improve existing landmarks. Experiments on the synthetic data and the real data have been done. The results support the proposed properties and algorithms.
Li, J, Hao, P & Zhang, C 1970, 'Transferring Colours to Grayscale Images by Locally Linear Embedding', Procedings of the British Machine Vision Conference 2008, British Machine Vision Conference 2008, British Machine Vision Association, pp. 83.1-83.10.
View/Download from: Publisher's site
View description>>
In this paper, we propose a learning-based method for adding colours to grayscale images. In contrast to many previous computer-aided colourizing methods, which require intensive and accurate human intervention, our method needs only the user to provide a colourful image of the similar content as the grayscale image. We accept the "image manifold" assumption and apply manifold learning methods to model the relations between the chromatic channels and the gray levels in the training images. Then we synthesize the objective chromatic channels using the learned relations. Experiments show that our method gives superior results to those of the previous work.
Li, L, Rong, M & Zhang, G 1970, 'A Method Comparing Remote Procedure Call with Message-Oriented Middleware Quantitatively on the view of Software Architecture', ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 3rd International Conference on Computer Science and Education, XIAMEN UNIV PRESS, PEOPLES R CHINA, Kaifeng, pp. 947-951.
Lin, CT & Yu, YC 1970, 'Design of an effective pipeline FFT/IFFT processor', International Journal of Electrical Engineering, pp. 287-297.
View description>>
This investigation proposes the novel radix-42 and radix-4 3 algorithms with the low computational complexities of the radix-16 and radix-64 algorithms and the low hardware requirements of the radix-4 algorithm. Based on the multiplierless radix-4 butterfly structure, the proposed radix-42 single-path delay feedback (R42SDF) design and radix-43 single-path delay feedback (R43SDF) design support the 4096-point FFT/IFFT computations. Moreover, the retrenched constant multiplier and eight-folded complex multiplier structures are adopted to decrease the multiplier cost and the coefficient ROM size with the complex conjugate symmetry rule and subexpression elimination technology. To further decrease the chip cost, a finite word-length analysis is provided to indicate that the proposed R42SDF and R43SDF architectures only require 14 and 13-bit internal word-length to achieve 40dB SNR performance in the 4096-point FFT/IFFT computation. The comprehensive comparison results indicate that the proposed R43SDF design has the smallest hardware cost and the highest hardware utilization among the tested architectures for the FFT/IFFT computation, and thus has the highest efficiency. The implementation results show that the proposed R42SDF and R43SDF based 4096-point pipeline FFT/IFFT processors only consumes 6.3725 and 5.985 mW@20 MHz at 1.2V supply voltage in TSMC 0.13 μm CMOS process.
Lin, M, Rong, M & Zhang, G 1970, 'Research on the Component-based Compositional Timing Analysis for Embedded Real-time Software', ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 3rd International Conference on Computer Science and Education, XIAMEN UNIV PRESS, PEOPLES R CHINA, Kaifeng, pp. 929-935.
Lister, R 1970, 'After the gold rush: Toward sustainable scholarship in computing', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Wollongong, Australia, pp. 3-17.
View description>>
In just thirty years, we have gone from punched cards to Second Life. But, as the American National Science Foundation (NSF) recently noted, 'undergraduate computing education today often looks much as it did several decades ago' (NSF, 2006). Consequently, today's 'Nintendo Generation' have voted with their feet. We bore them. The contrast between the changes wrought via computer research over the last 30 years, and the failure of computing education to adapt to those changes, is because computing academics lead a double life. In our research lives we see ourselves as part of a community that reaches beyond our own university. We read literature, we attend conferences, we publish, and the cycle repeats, with community members building upon each other's work. But in our teaching lives we rarely discuss teaching beyond our own university, we are not guided by any teaching literature; instead we simply follow our instincts. Academics in computing, or in any other discipline, can approach their teaching as research into how novices become experts. Several recent multi-institutional research collaborations have studied the development of novice programmers. This paper describes some of the results from those collaborations. The separation of our teaching and research lives diminishes not just our teaching but also our research. The modern practice of stripping away all 'distractions' to maximize research output is like the practice of stripping away rainforest to grow beef - both practices appear to work, for a little while, but not indefinitely. Twenty-first century academia needs to bring teaching and research together, to form a scholarship of computing that is an integrated, sustainable, ecological whole. © 2008, Australian Computer Society, Inc.
Lister, R & Box, I 1970, 'A citation analysis of the ACE2005 - 2007 proceedings, with reference to the June 2007 CORE conference and journal rankings', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Wollongong, Australia, pp. 93-102.
View description>>
This paper compares the CORE rankings of computing education conferences and journals to the frequency of citation of those journals and conferences in the ACE2005, 2006 and 2007 proceedings. The assumption underlying this study is that citation rates are a measure of esteem, and so there should be a positive relationship between citation rates and rankings. The CORE conference rankings appear to broadly reflect the ACE citations, but there are some inconsistencies between citation rates and the journal rankings. The paper also identifies the most commonly cited books in these ACE proceedings. Finally, in the spirit of 'Quis custodiet ipsos custodes?' the paper discusses some ways in which the CORE rankings process itself might in future be made more transparent and open to scholarly discourse. © 2008, Australian Computer Society, Inc.
Lister, R & Box, I 1970, 'A citation analysis of the sigcse 2007 proceedings', Proceedings of the 39th SIGCSE technical symposium on Computer science education, SIGCSE '08: The 39th ACM Technical Symposium on Computer Science Education, ACM, Portland, OR, USA, pp. 476-480.
View/Download from: Publisher's site
View description>>
Abstract: This paper identifies the most commonly cited conferences, journals and books among the 1398 citations made in the 122 publications of the SIGCSE 2007 proceedings. The SIGCSE 2007 authors cited a very large array of conferences, journals and books, but the majority are only cited within a single paper. There are only a very small set of journals and conferences cited frequently. Most books cited are concerned with technical information or are textbooks. Only 2% of books are concerned with computer science education and 23% with education in general. The picture that emerges from this citation analysis is that the SIGCSE community does not have a substantial core set of educational literature. Also, the epistemology of the SIGCSE community is primarily objectivist, with a focus on content, rather than a constructivist, student-centered focus on learning.
Lister, R, Caspersen, ME & Clancy, M 1970, 'ICER'08 - Proceedings of the ACM Workshop on International Computing Education Research: Foreword', Icer 08 Proceedings of the ACM Workshop on International Computing Education Research.
Lister, RF & Simon, S 1970, 'Koli Calling 2007', Proceedings of the 7th Baltic Sea Conference on Computing Education Research, Baltic Sea Conference on Computing Education Research, Australian Computer Society, Koli National Park, Finland, pp. 1-231.
View description>>
The Seventh Baltic Sea Conference on Computing Education Research, Koli Calling 2007, was held in Finlandâs beautiful Koli National Park on 15-18 November 2007. Contributions to Koli Calling can take one of four forms. Research papers present unpublished original research. System papers describe tools for learning, instruction, or assessment in computing education, motivated by the didactic needs of computing. Discussion papers are shorter papers used to present novel ideas, proposals, prototypes, or work in progress. Posters are very short presentations describing novel approaches or work in progress. All papers and posters were double-blind peer reviewed by members of the international programme committee and additional reviewers. There were 30 âlongâ papers submitted (i.e. research or system papers). The acceptance rate for long papers was 43% (12 research papers and one system paper). The remaining long papers, and those papers submitted speciï¬cally as discussion papers, comprised a total of 28 papers, of which 15 (54%) were accepted as short papers. The authors of all these accepted papers are from 12 diï¬erent countries.
Lister, RF, Caspersen, M & Clancy, M 1970, 'Proceeding of the fourth International workshop on Computing education research', Proceeding of the fourth International workshop on Computing education research, International workshop on Computing education research, Association of Computing Machinery, Sydney, Australia, pp. 1-184.
View description>>
The call for papers attracted 46 submissions. All papers were double-blind peer-reviewed by members of the international program committee. After the reviewing, 16 papers (35%) were accepted for inclusion in the conference, written by authors across 9 countries: Australia, Canada, Denmark, Finland, Germany, New Zealand, Sweden, the United Kingdom, and the United States of America
Liu, C, Rong, M & Zhang, G 1970, 'A Method For Verifying The Consistency of Dynamic Behavioral Models of Real-time Software Based on UML/SPT', ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 3rd International Conference on Computer Science and Education, XIAMEN UNIV PRESS, PEOPLES R CHINA, Kaifeng, pp. 936-941.
Liu, W, Tao, D & Liu, J 1970, 'Transductive Component Analysis.', ICDM, IEEE International Conference on Data Mining, IEEE Computer Society, Pisa, Italy, pp. 433-442.
View/Download from: Publisher's site
View description>>
In this paper, we study semi-supervised linear dimensionality reduction. Beyond conventional supervised methods which merely consider labeled instances, the semi-supervised scheme allows to leverage abundant and ample unlabeled instances into learning so
Lopez, M, Whalley, J, Robbins, P & Lister, R 1970, 'Relationships between reading, tracing and writing skills in introductory programming', Proceedings of the Fourth international Workshop on Computing Education Research, ICER '08: International Computing Education Research Workshop, ACM, Sydney, Australia, pp. 101-112.
View/Download from: Publisher's site
View description>>
ABSTRACT: This study analyzed student responses to an examination, after the students had completed one semester of instruction in programming. The performance of students on code tracing tasks correlated with their performance on code writing tasks. A correlation was also found between performance on "explain in plain English" tasks and code writing. A stepwise regression, with performance on code writing as the dependent variable, was used to construct a path diagram. The diagram suggests the possibility of a hierarchy of programming related tasks. Knowledge of programming constructs forms the bottom of the hierarchy, with "explain in English", Parson's puzzles, and the tracing of iterative code forming one or more intermediate levels in the hierarchy.
Lu, J, Deng, X, Vroman, P, Zeng, X, Ma, J & Zhang, G 1970, 'A fuzzy multi-criteria group decision support system for nonwoven based cosmetic product development evaluation', 2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence), 2008 IEEE 16th International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, Kong Kong, China, pp. 1700-1707.
View/Download from: Publisher's site
View description>>
Product prototype evaluation is an important phase in new product development (NPD). Such evaluation often requires multiple criteria that are within a hierarchy and a group of evaluators. The evaluation process and these evaluation criteria often involve uncertain and fuzzy data in the weights of these criteria and the judgments of these evaluators. To evaluate nonwoven cosmetic product prototypes, this study first develops a NPD evaluation model, which has evaluation criteria within three levels, based on the features of nonwoven products. It then proposes a fuzzy (multi-level) multi-criteria group decision-making (FMCGDM) method for supporting the evaluation task. A fuzzy multi-criteria group decision support system (FMCGDSS) is developed to implement the proposed method and applied in nonwoven cosmetic product development evaluation. © 2008 IEEE.
Lu, J, Deng, X, Zeng, X, Vroman, P, Wu, F & Zhang, G 1970, 'A fuzzy multi-objective decision support system for nonwoven products experiment design', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 787-792.
View/Download from: Publisher's site
View description>>
Experiment design often involves multiple objectives and uncertain data in its optimizing process. Fuzzy multi-objective linear programming (FMOLP) is an appropriate method to handle this problem. For the case of modeling nonwoven-based resilient product
Lu, J, Zhu, Y, Zeng, X, Koehl, L, Ma, J & Zhang, G 1970, 'A Fuzzy Decision Support System for Garment New Product Development', AI 2008: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, Australasian Joint Conference on Artificial Intelligence, Springer, New Zealand, pp. 532-+.
View/Download from: Publisher's site
View description>>
Garment new product development (NPD) evaluation requires considering multiple criteria under a hierarchical structure. The evaluation process often involves uncertainty and fuzziness in both the relationships between criteria and the judgments of evaluators. This study first presents a garment NPD evaluation model under a well-being concept. It then proposes a fuzzy multi-criteria group decision-making (FMCGDM) method to evaluate garment NPD. The advantages of the FMCGDM method include handling criteria in a hierarchical structure, dealing with three kinds of uncertainties simultaneously, and using suitable types of fuzzy numbers to describe linguistic terms. A fuzzy multi-criteria group decision support system (FMCGDSS) is developed to implement the proposed method. Finally a garment NPD evaluation case study demonstrates the proposed method and software system.
Lu, J, Zhu, Y, Zeng, X, Koehl, L, Ma, J & Zhang, G 1970, 'A fuzzy multi-criteria group decision support system for textile material fabric-hand evaluation', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 1129-1134.
View/Download from: Publisher's site
View description>>
Fabric-hand evaluation is one of the key features and measures in textile material selection for fashion design. Fabric-hand evaluation requires considering multiple criteria with in a group of evaluators, The evaluation process often involves fuzziness
Ma, J & Guangquan Zhang. 1970, 'Team Situation Awareness measurement using group aggregation and implication operators', 2008 3rd International Conference on Intelligent System and Knowledge Engineering, 2008 3rd International Conference on Intelligent System and Knowledge Engineering (ISKE 2008), IEEE, Xianeb, pp. 625-630.
View/Download from: Publisher's site
View description>>
Situation Awareness (SA) has been received much attention from human factors and ergonomics community during the past two decades. Team working plays a vital role in complex dynamic situations, increasing requirements for sharing perceptions and comprehension of a situation among team members and improving team situation awareness have been merged. This paper presents a team SA measurement (TSAM) method taking both qualitative and quantitative information into consideration. The TSAM method uses a hierarchy to depict team's shared mental model, applies linguistic terms to represent individual SA and adopts a group aggregation strategy to integrate individual SA through indicator-specified implication operators. Example has shown its effective. © 2008 IEEE.
Madhisetty, S, Busch, P & Feuerlicht, G 1970, 'Utility Computing Framework and its Impact on the Medical Industry', Con-IRM 2008 (IRMA), International Conference on Information Resources Management, IDEA Group Publishing, Ontario, Canada, pp. 1-7.
Madhisetty, S, Busch, P, Feuerlicht, G & Flax, L 1970, 'Utility computing and its influence on the IT-industry', International Conference on Enterprise Information Systems and Web Technologies 2008, EISWT 2008, International Conference On Enterprise Systems and Web Technologies, ISRST, Orlando, USA, pp. 134-140.
View description>>
Though much service-oriented architecture have failed before to deliver on their promises of remote delivery of IT services, the ubiquitous nature of computing which is now present is the motivating factor for computing to be seen in a 'Utility model'. Utility Computing (UC) is an on demand delivery of enterprise applications and business process in a shared, secured and scalable standards based environment over the Internet. The impact of this new technology will be seen in many areas. Utility applications built on multi-tenant architecture where many users can access their applications concurrently is a cost effective means for providing service oriented computing to the end user. This paper studies the adoption of such technology in the IT industry. This paper studies the inhibiting factors for the successful adoption of Utility Computing model in the IT-Industry.
Mathieson, L & Szeider, S 1970, 'Parameterized Graph Editing with Chosen Vertex Degrees', COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS, 2nd International Conference on Combinatorial Optimization and Applications, Springer Berlin Heidelberg, St Johns, CANADA, pp. 13-22.
View/Download from: Publisher's site
Mathieson, L & Szeider, S 1970, 'The parameterized complexity of regular subgraph problems and generalizations', Conferences in Research and Practice in Information Technology Series.
View description>>
We study variants and generalizations of the problem of finding an r-regular subgraph (where r ≥ 3) in a given graph by deleting at most k vertices. Moser and Thilikos (2006) have shown that the problem is fixed-parameter tractable (FPT) if parameterized by (k, r). They asked whether the problem remains fixed-parameter tractable if parameterized by k alone. We answer this question negatively: we show that if parameterized by k alone the problem is W[1]-hard and therefore very unlikely fixed-parameter tractable. We also give W[1]-hardness results for variants of the problem where the parameter is the number of vertex and edge deletions allowed, and for a new generalized form of the problem where the obtained subgraph is not necessarily regular but its vertices have certain prescribed degrees. Following this we demonstrate fixed-parameter tractability for the considered problems if the parameter includes the regularity r or an upper bound on the prescribed degrees in the generalized form of the problem. These FPT results are obtained via kernelization, so also provide a practical approach to the problems presented. © 2008, Australian Computer Society, Inc.
Maxwell, C, Leaney, J & O'Neill, T 1970, 'Utilising Abstract Matching to Preserve the Nature of Heuristics in Design Optimisation', 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008), 2008 15th Annual IEEE International Conference on Engineering of Computer Based Systems (ECBS), IEEE, Belfast, NORTH IRELAND, pp. 287-296.
View/Download from: Publisher's site
McGregor, C & Eklund, JM 1970, 'Real-Time Service-Oriented Architectures to Support Remote Critical Care: Trends and Challenges', 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008 32nd Annual IEEE International Computer Software and Applications Conference, IEEE, pp. 1199-1204.
View/Download from: Publisher's site
View description>>
Healthcare providers and governments are under pressure to maintain and improve the quality of care to an increasing volume of critical care patients at either end of the life cycle, namely premature and ill-term babies together with the elderly. The provision of a service of critical care utilizing real-time service-oriented architectures has the potential to enable clinicians to be supported in the care of a greater number patients that are, perhaps more importantly, located elsewhere to their intensive care units. This paper presents a review of recent research in the application of computing and IT to support the service of critical care and determines the trends and challenges for the application of real-time service-oriented architectures within the domain. © 2008 IEEE.
McGregor, C & Frize, M 1970, 'Women in Biomedical Engineering and Health Informatics', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 5933-5934.
View/Download from: Publisher's site
McGregor, C, Smith, KP & Percival, J 1970, 'Women in biomedical engineering and health informatics and its impact on gender representation for accepted publications at IEEE EMBC 2007', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 2881-2884.
View/Download from: Publisher's site
Medelyan, O & Milne, D 1970, 'Augmenting domain-specific thesau with knowledge from wikipedia', New Zealand Computer Science Research Student Conference, NZCSRSC 2008 - Proceedings, pp. 108-114.
View description>>
We propose a new method for extending a domain-specific thesaurus with valuable information from Wikipedia. The main obstacle is to disambiguate thesaurus concepts to correct Wikipedia articles. Given the concept name, we first identify candidate mappings by analyzing article titles, their redirects and disambiguation pages. Then, for each candidate, we compute a link-based similarity score to all mappings of context terms related to this concept. The article with the highest score is then used to augment the thesaurus concept. It is the source for the extended gloss, explaining the concept's meaning, synonymous expressions that can be used as additional non-descriptors in the thesaurus, translations of the concept into other languages, and new domain-relevant concepts. Copyright is held by the author/owner(s).
Medelyan, O, Witten, IH & Milne, D 1970, 'Topic indexing with wikipedia', AAAI Workshop - Technical Report, pp. 19-24.
View description>>
Wikipedia can be utilized as a controlled vocabulary for identifying the main topics in a document, with article titles serving as index terms and redirect titles as their synonyms. Wikipedia contains over 4M such titles covering the terminology of nearly any document collection. This permits controlled indexing in the absence of manually created vocabularies. We combine state-of-the-art strategies for automatic controlled indexing with Wikipedia's unique property-a richly hyperlinked encyclopedia. We evaluate the scheme by comparing automatically assigned topics with those chosen manually by human indexers. Analysis of indexing consistency shows that our algorithm performs as well as the average person.
Mehboob, Z, Zowghi, D & Lowe, D 1970, 'Supporting integrated dependency model for change impact analysis in web systems', AusWeb 2008: 14th Australasian World Wide Web Conference, Australian World Wide Web Conference, Southern Cross University, Ballina, Australia, pp. 173-178.
View description>>
Change Impact Analysis (CIA) is typically used to identify the consequences of making a software change by utilizing the dependency and traceability information with regard to that change. Previous research highlights that CIA techniques are developed by both an understanding of interdependencies (between system components) as well as interaction of architectural modules. Given that Web systems (WS) are usually developed as a multi-tier and components based system, it is postulated that their multi-tier interaction and components interdependencies require different CIA methods. In this paper we propose extending current CIA techniques with the concept of an integrated dependency model to accommodate multi-tier and interoperability dependencies in WS. © 2008. Zafar Mehboob, Didar Zowghi and David Lowe.
MERIGÓ, JM & CASANOVAS, M 1970, 'DECISION MAKING WITH DEMPSTER-SHAFER BELIEF STRUCTURE USING THE 2-TUPLE LINGUISTIC REPRESENTATION MODEL', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, SPAIN, pp. 325-330.
View/Download from: Publisher's site
MERIGÓ, JM & CASANOVAS, M 1970, 'DECISION MAKING WITH DISTANCE MEASURES AND INDUCED AGGREGATION OPERATORS', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, SPAIN, pp. 483-488.
View/Download from: Publisher's site
Merigó, JM & Casanovas, M 1970, 'Fuzzy induced aggregation operators in decision making with Dempster-Shafer belief structure', ICEIS 2008 - Proceedings of the 10th International Conference on Enterprise Information Systems, 10th International Conference on Enterprise Information Systems, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Barcelona, SPAIN, pp. 548-552.
View description>>
We develop a new approach for decision making with Dempster-Shafer theory of evidence when the available information is uncertain and it can be assessed with fuzzy numbers. With this approach, we are able to represent the problem without losing relevant information, so the decision maker knows exactly which are the different alternatives and their consequences. For doing so, we suggest the use of different types of fuzzy induced aggregation operators in the problem. As a result, we get new types of fuzzy induced aggregation operators such as the belief structure - fuzzy induced ordered weighted averaging (BS-FIOWA) operator. We also develop an application of the new approach in a financial decision making problem.
Merigó, JM & Casanovas, M 1970, 'The generalized hybrid averaging operator and its application in financial decision making', ICEIS 2008 - Proceedings of the 10th International Conference on Enterprise Information Systems, 10th International Conference on Enterprise Information Systems, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Barcelona, SPAIN, pp. 467-471.
View description>>
We present the generalized hybrid averaging (GHA) operator. It is a new aggregation operator that generalizes the hybrid averaging (HA) operator by using the generalized mean. Then, we are able to generalize a wide range of mean operators such as the HA, the hybrid quadratic averaging (HQA), etc. The HA is an aggregation operator that includes the ordered weighted averaging (OWA) operator and the weighted average (WA). Then, with the GHA, we are able to get all the particular cases obtained by using generalized means in the OWA and in the WA such as the weighted geometric mean, the ordered weighted geometric (OWG) operator, the weighted quadratic mean (WQM), etc. We further generalize the GHA by using quasi-arithmetic means. Then, we obtain the quasi-arithmetic hybrid averaging (Quasi-HA) operator. Finally, we apply the new approach in a financial decision making problem.
MERIGÓ, JM & GIL-LAFUENTE, AM 1970, 'THE INDUCED LINGUISTIC GENERALIZED OWA OPERATOR', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, SPAIN, pp. 513-518.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 1970, 'The linguistic generalized OWA operator and its application in strategic decision making', ICEIS 2008 - Proceedings of the 10th International Conference on Enterprise Information Systems, 10th International Conference on Enterprise Information Systems, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Barcelona, SPAIN, pp. 219-224.
View description>>
We introduce the linguistic generalized ordered weighted averaging (LGOWA) operator. It is a new aggregation operator that uses linguistic information and generalized means in the OWA operator. It is very useful for uncertain situations where the available information can not be assessed with numerical values but it is possible to use linguistic assessments. This aggregation operator generalizes a wide range of aggregation operators that use linguistic information such as the linguistic generalized mean (LGM), the linguistic weighted generalized mean (LWGM), the linguistic OWA (LOWA) operator, the linguistic ordered weighted geometric (LOWG) operator and the linguistic ordered weighted quadratic averaging (LOWQA) operator. We also introduce a new type of Quasi-LOWA operator by using quasi-arithmetic means in the LOWA operator. Finally, we develop an application of the new approach. We analyze a decision making problem about selection of strategies.
Merigó, JM, Casanovas, M & Martínez, L 1970, 'A Decision Making Model Based on Dempster-Shafer Theory and Linguistic Hybrid Aggregation Operators', 2008 Eighth International Conference on Hybrid Intelligent Systems, 2008 8th International Conference on Hybrid Intelligent Systems (HIS), IEEE, pp. 180-185.
View/Download from: Publisher's site
View description>>
The solving processes for decision making problems based on the use of the Dempster-Shafer (D-S) theory can be accomplished in different ways according to the necessities of each single problem. In this contribution we present a decision making scheme based on the D-S defined in a linguistic framework and then, we propose the use of an hybrid averaging operator (2-THA) that use the 2-tuple linguistic representation model. By using the 2-THA in D-S theory, we obtain a new aggregation operator: the belief structure - 2-THA (BS-2-THA) operator. We study some of its main properties and then show an illustrative example of the new approach in a decision making problem. © 2008 IEEE.
Milne, D & Witten, IH 1970, 'An effective, low-cost measure of semantic relatedness obtained from wikipedia links', AAAI Workshop - Technical Report, pp. 25-30.
View description>>
This paper describes a new technique for obtaining measures of semantic relatedness. Like other recent approaches, it uses Wikipedia to provide structured world knowledge about the terms of interest. Our approach is unique in that it does so using the hyperlink structure of Wikipedia rather than its category hierarchy or textual content. Evaluation with manually defined measures of semantic relatedness reveals this to be an effective compromise between the ease of computation of the former approach and the accuracy of the latter. Copyright © 2008.
Milne, D & Witten, IH 1970, 'Learning to link with wikipedia', Proceedings of the 17th ACM conference on Information and knowledge management, CIKM08: Conference on Information and Knowledge Management, ACM, pp. 509-518.
View/Download from: Publisher's site
View description>>
This paper describes how to automatically cross-reference documents with Wikipedia: the largest knowledge base ever known. It explains how machine learning can be used to identify significant terms within unstructured text, and enrich it with links to the appropriate Wikipedia articles. The resulting link detector and disambiguator performs very well, with recall and precision of almost 75%. This performance is constant whether the system is evaluated on Wikipedia articles or -real world- documents. This work has implications far beyond enriching documents with explanatory links. It can provide structured knowledge about any unstructured fragment of text. Any task that is currently addressed with bags of words-indexing, clustering, retrieval, and summarization to name a few-could use the techniques described here to draw on a vast network of concepts and semantics. © 2008 ACM.
Milne, D, Nichols, DM & Witten, IH 1970, 'A competitive environment for exploratory query expansion', Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries, JCDL08: Joint Conference on Digital Libraries, ACM, pp. 197-200.
View/Download from: Publisher's site
View description>>
Most information workers query digital libraries many times a day. Yet people have little opportunity to hone their skills in a controlled environment, or compare their performance with others in an objective way. Conversely, although search engine logs record how users evolve queries, they lack crucial information about the user's intent. This paper describes an environment for exploratory query expansion that pits users against each other and lets them compete, and practice, in their own time and on their own workstation. The system captures query evolution behavior on predetermined information-seeking tasks. It is publicly available, and the code is open source so that others can set up their own competitive environments. Copyright 2008 ACM.
Mohamed Mowjoon, D, Agbinya, JI & Chaczko, ZC 1970, 'Policy-based Danger Management in Artificial Immune System Inspired Secure Routing in Wireless Mesh Networks', Proceedings International MultiConference of Engineers and Computer Scientists, International MultiConference of Engineers and Computer Scientists, International Association of Engineers, Hong Kong, pp. 268-270.
View description>>
This paper introduces Policy based Management Information Base to manage danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management functions are defined and the paper focuses only on the security function. Proposed policy based management and typical operation of the architecture are also reported.
Molina, B, Pileggi, SF, Palau, CE & Esteve, M 1970, 'A social framework for content distribution in mobile transient networks', Proceedings of the third international workshop on Use of P2P, grid and agents for the development of content networks, HPDC '08: International Symposium on High Performance Distributed Computing, ACM, pp. 29-36.
View/Download from: Publisher's site
View description>>
Transient networks are spontaneous networks that appear for a short period of time in order to provide basic services such as connectivity and content distribution among a small community. Nowadays mobile devices are becoming multimode by nature providing multiple connection paths. This paper investigates the efficiency and benefit of a mobile transient network where multiple nodes collaborate offering a multihomed network with community services by means of intelligent agents. The paper also proposes the required architecture and negotiation protocols for such scenario with two different services: file downloading and multimedia streaming. Copyright 2008 ACM.
Mu, K, Jin, Z & Zowghi, D 1970, 'A Measurement-Driven Process Model For Managing Inconsistent Software Requirements', APSEC 2008:15TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, Asia-Pacific Software Engineering Conference, IEEE Explore, Beijing, China, pp. 291-298.
View/Download from: Publisher's site
View description>>
nconsistency is a pervasive issue in software engineering. Both general rules of inconsistency management and special case-based approaches to handling inconsistency have recently been considered. In this paper, we present a process model for handling requirements inconsistency within the viewpoints framework. In this process model, when an inconsistency among viewpoints is detected, a set of candidate proposals for handling inconsistency will be generated using techniques from multi-agent automated negotiations. The proposals are then prioritized using an integrated measurement of inconsistencies. The viewpoints involved in the inconsistency will then enter the negotiations by being presented with the candidate proposals and thus selecting an acceptable proposal based on the priorities associated with each candidate proposal. To facilitate usability, in our process, we assume that the natural language requirements statements are first translated into corresponding logical formulas using a translator software. Moreover, the candidate proposals for handling inconsistency are also translated back from formal logic into natural language before being presented for selection.
Niu, L & Zhang, G 1970, 'A Model of Cognition-Driven Decision Process for Business Intelligence', 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), IEEE, Sydney, Australia, pp. 876-879.
View/Download from: Publisher's site
View description>>
We proposed a cognition-driven decision process model for business intelligence. In this model, a manager's situation awareness (SA) and mental models are developed and enriched for naturalistic decision making based on traditional business intelligence systems. Mental models are also used to supervise the process of situation information retrieval and presentation. The final decision-making process is based on recognition-primed decision model. © 2008 IEEE.
Pal, U, Sharma, N, Wakabayashi, T & Kimura, F 1970, 'Handwritten Character Recognition of Popular South Indian Scripts', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 251-264.
View/Download from: Publisher's site
View description>>
India is a multi-lingual, multi-script country. Considerably less work has been done towards handwritten character recognition of Indian languages than for other languages. In this paper we propose a quadratic classifier based scheme for the recognition of off-line handwritten characters of three popular south Indian scripts: Kannada, Telugu, and Tamil. The features used here are mainly obtained from the directional information. For feature computation, the bounding box of a character is segmented into blocks, and the directional features are computed in each block. These blocks are then down-sampled by a Gaussian filter, and the features obtained from the down-sampled blocks are fed to a modified quadratic classifier for recognition. Here, we used two sets of features. We used 64-dimensional features for high speed recognition and 400-dimensional features for high accuracy recognition. A five-fold cross validation technique was used for result computation, and we obtained 90.34%, 90.90%, and 96.73% accuracy rates from Kannada, Telugu, and Tamil characters, respectively, from 400 dimensional features. © 2008 Springer-Verlag Berlin Heidelberg.
Parakhine, A, Leaney, J & O'Neill, T 1970, 'Design guidance using simulation-based Bayesian belief networks', FIFTEENTH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, IEEE International Conference and Workshop on the Engineering of Computer Based Systems, IEEE, Belfast, Northern Ireland, pp. 76-84.
View/Download from: Publisher's site
View description>>
In this work, the task of complex computer-based system design optimization involves exploration of a number of possible candidate designs matching the optimisation criteria. However, the process by which the possible candidate designs are generated and rated is fundamental to an optimal outcome. It is dependent upon the set of system characteristics deemed relevant by the designer given the systems requirements. We propose a method which is aimed at providing the designer with guidance based upon description of the possible causal relationships between various system characteristics and qualities. This guidance information is obtained by employing principles of multiparadigm simulation to generate a set of data which is then processed by an algorithm to generate a Bayesian Belief Network representation of causalities present in the source system. Furthermore, we address the issues and tools associated with application of the proposed method by presenting a detailed simulation and network generation effort undertaken as part of a significant industrial case study.
Pei-Yu Chen, Lan-Da Van, Reddy, HC & Chin-Teng Lin 1970, 'A new VLSI 2-D diagonal-symmetry filter architecture design', APCCAS 2008 - 2008 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2008 - 2008 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), IEEE, Macao, PEOPLES R CHINA, pp. 320-323.
View/Download from: Publisher's site
Prior, J, Robertson, T & Leaney, J 1970, 'Situated Software Development: Work Practice and Infrastructure Are Mutually Constitutive', 19th Australian Conference on Software Engineering (aswec 2008), 2008 19th Australian Conference on Software Engineering ASWEC, IEEE, pp. 160-169.
View/Download from: Publisher's site
View description>>
Software developers' work is much more interesting and multifarious in practice than formal definitions of software development processes imply. Rational models of work are often representations of processes defined as they should be performed, rather than portrayals of what people actually do in practice. These models offer a simplified picture of the phenomena involved, and are frequently confused with how the work is carried out in reality, or they are advocated as the ideal way to accomplish the work. A longitudinal ethnographic study (45 days of fieldwork over 20 months) of a group of professional software developers revealed the importance of including their observed practice, and the "infrastructure" that supports and shapes this practice, in an authentic account of their work. Moreover, this research revealed that software development work practice and the infrastructure used to produce software are inextricably entwined and mutually constitutive over time. © 2008 IEEE.
Prior, J, Robertson, T & Leaney, J 1970, 'Situated software development: Work practice and infrastructure are mutually constitutive', ASWEC 2008: 19TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 19th Australian Software Engineering Conference, IEEE COMPUTER SOC, Perth, AUSTRALIA, pp. 160-+.
View/Download from: Publisher's site
View description>>
Software developers work is much more interesting and multifarious in practice than formal definitions of software development processes imply. Rational models of work are often representations of processes defined as they should be performed, rather than portrayals of what people actually do in practice. These models offer a simplified picture of the phenomena involved, and are frequently confused with how the work is carried out in reality, or they are advocated as the ideal way to accomplish the work. A longitudinal ethnographic study (45 days of fieldwork over 20 months) of a group of professional software developers revealed the importance of including their observed practice, and the infrastructure that supports and shapes this practice, in an authentic account of their work. Moreover, this research revealed that software development work practice and the infrastructure used to produce software are inextricably entwined and mutually constitutive over time.
Qiao, Y & Tartary, C 1970, 'Counting Method for Multi-party Computation over Non-abelian Groups', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Cryptology and Network Security, Springer Berlin Heidelberg, Hong Kong, pp. 162-177.
View/Download from: Publisher's site
View description>>
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. The function to be computed is f G (x 1,...,x n ) :∈=∈x 1 •...•x n where each participant P i holds an input x i from the non-commutative group G. The settings of their study are the passive adversary model, information-theoretic security and black-box group operations over G. They presented three results. The first one is that honest majority is needed to ensure security when computing f G . Second, when the number of adversary , they reduced building such a secure protocol to a graph coloring problem and they showed that there exists a deterministic secure protocol computing f G using exponential communication complexity. Finally, Desmedt et al. turned to analyze random coloring of a graph to show the existence of a probabilistic protocol with polynomial complexity when t∈<∈n/μ, in which μ is a constant less than 2.948. We call their analysis method of random coloring the counting method as it is based on the counting of the number of a specific type of random walks. This method is inspiring because, as far as we know, it is the first instance in which the theory of self-avoiding walk appears in multiparty computation. In this paper, we first give an altered exposition of their proof. This modification will allow us to adapt this method to a different lattice and reduce the communication complexity by 1/3, which is an important saving for practical implementations of the protocols. We also show the limitation of the counting method by presenting a lower bound for this technique. In particular, we will deduce that this approach would not achieve the optimal collusion resistance. © 2008 Springer Berlin Heidelberg.
Raban, R, Leigh, EE, Litchfield, AJ & Dyson, LE 1970, 'Using Internet-Enabled Mobile Devices to Support Low-Cost Experiential Learning', 11th International Conference on Experiential Learning (ICEL 2008): Identity of Experience: Challenges for Experiential Learning, 11th International Conference on Experiential Learning, ICEL, Sydney, Australia, pp. 1-9.
View description>>
This paper examines model-making, specifically prototyping, as a problem-based, and possibly experiential, learning activity. Prototyping activities are increasingly being introduced by schools of architecture around the world for the teaching of architectural design and construction technology. Such activities mediate between sophisticated digital modeling technologies, new materials and new construction techniques, and are a means of enabling students to oscillate between the abstract and the concrete: between the virtual world of the computer screen and the physical reality of a model built to scale from representative materials. This paper reviews the literature on what is being done and how. It discusses whether current prototyping activities are taking advantage of the large body of knowledge contained within theories of experiential learning and proposes that a series of guidelines should be formulated to inform the implementation of experimental prototyping activities in the architecture studio. The paper concludes with my own prototyping case study conducted at the University of Technology, Sydney in 2007, which was deliberately designed as an experiential learning activity. Perceptions of its successes and challenges are discussed. A hands-on construction activity will be provided to engage participants in this session.
Rahman, A, Kennedy, P, Simmonds, A & Edwards, J 1970, 'Fuzzy logic based modelling and analysis of network traffic', 2008 8th IEEE International Conference on Computer and Information Technology, 2008 8th IEEE International Conference on Computer and Information Technology (CIT), IEEE, Sydney, Australia, pp. 652-657.
View/Download from: Publisher's site
View description>>
Accurate computer network traffic models are required for many network tasks such as network traffic analysis and performance optimization. Existing statistical traffic modelling techniques rely on precise mathematical analysis of extensive measured data such as packet arrival time, packet size and server-side or client-side round trip time. With the advent of high speed broadband networks, gathering an acceptable quantity of data needed for the precise representation of traffic is a difficult, time consuming, expensive and in some cases almost an impossible task. In this work we developed a fuzzy logic based traffic models using imprecise data sets that can be obtained realistically. The model include a parameter, the R parameter, which is also useful for analysis of network traffic.
Raza, M, Hussain, FK & Chang, E 1970, 'A methodology for quality-based mashup of data sources', Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, iiWAS08: 10th International Conference on Information Integration and Web-based Applications & Services, ACM, pp. 528-533.
View/Download from: Publisher's site
View description>>
The concept of mashup is gaining tremendous popularity and its application can be seen in a large number of domains. Enterprises using and relying upon mashup have improved their mass collaboration and personalization. In order for mashup technology to be widely accepted and widely used, we need a methodology by which can make use of the quality of the input to the mashup process as a governing principle to carry out mashup. This paper reviews the concept of mashup in different domains and proposes a conceptual solution framework for providing quality based mashup process. © 2008 ACM.
Roddick, J, Li, J, Christen, P & Kennedy, PJ 1970, 'Data Mining & Analytics 20068: Proceedings of the 7th Australasian Data Mining Conference (AusDM 2008)', Data Mining & Analytics 20068: Proceedings of the 7th Australasian Data Mining Conference (AusDM 2008), Australian Data Mining Conference, Australian Computer Society, Adelaide.
Roddick, JF, Li, J, Christen, P & Kennedy, P 1970, 'Preface', Conferences in Research and Practice in Information Technology Series.
Saberi, M, Azadeh, A & Ghorbani, S 1970, 'Forecasting oil production by adaptive neuro fuzzy inference system', 2008 IEEE International Symposium on Industrial Electronics, 2008 IEEE International Symposium on Industrial Electronics (ISIE 2008), IEEE, pp. 1035-1043.
View/Download from: Publisher's site
View description>>
In this paper, the efficiency of neuro fuzzy network (ANFIS) is examined against auto regression (AR). Mean absolute percentage error (MAPE) is applied for this purpose. After applying different data preprocessing methods, the models are developed. A method for calculating ANFIS performance is also proposed. Due to various seasonal and monthly changes in oil production and difficulties in modeling it with conventional methods, we consider a case study in four countries for oil production estimation. Finally, analysis of variance (ANOVA) and Duncan Multiple Range Test (DMRT) is conducted for each country to evaluate the most efficient method. © 2008 IEEE.
Saberi, M, Azadeh, A & Ghorbani, S 1970, 'Forecasting Oil Production by Adaptive Neuro Fuzzy Inference system', 2008 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-5, IEEE International Symposium on Industrial Electronics, IEEE, Cambridge, ENGLAND, pp. 240-+.
Schirmer, SG, Kandasamy, G & Devitt, SJ 1970, 'Control paradigms for quantum engineering', 2008 3rd International Symposium on Communications, Control and Signal Processing, 2008 3rd International Symposium on Communications, Control and Signal Processing (ISCCSP), IEEE, St Julians, MALTA, pp. 966-971.
View/Download from: Publisher's site
Sheard, J, Carbone, A, Lister, R, Simon, B, Thompson, E & Whalley, JL 1970, 'Going SOLO to assess novice programmers', Proceedings of the 13th annual conference on Innovation and technology in computer science education, ITiCSE '08: 13th Annual Conference on Innovation and Technology in Computer Science Education, ACM, Madrid, Spain, pp. 209-213.
View/Download from: Publisher's site
View description>>
ABSTRACT: This paper explores the programming knowledge of novices using Biggs' SOLO taxonomy. It builds on previous work of Lister et al. (2006) and addresses some of the criticisms of that work. The research was conducted by studying the exam scripts for 120 introductory programming students, in which three specific questions were analyzed using the SOLO taxonomy. The study reports the following four findings: when the instruction to students used by Lister et al. - "In plain English, explain what the following segment of Java code does" - is replaced with a less ambiguous instruction, many students still provide multistructural responses; students are relatively consistent in the SOLO level of their answers; student responses on SOLO reading tasks correlate positively with performance on writing tasks; postgraduates students manifest a higher level of thinking than undergraduates.
Sidhu, A, Hussain, FK & Madzic, M 1970, 'Papers in track 14 - Health ecosystems', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. xi-xi.
View/Download from: Publisher's site
Simon, Carbone, A, de Raadt, M, Lister, R, Hamilton, M & Sheard, J 1970, 'Classifying computing education papers', Proceedings of the Fourth international Workshop on Computing Education Research, ICER '08: International Computing Education Research Workshop, ACM, Sydney, Australia, pp. 161-172.
View/Download from: Publisher's site
View description>>
ABSTRACT: We have applied Simon's system for classifying computing education publications to all three years of papers from ICER. We describe the process of assessing the inter-rater reliability of the system and fine-tuning it along the way. Our analysis of the ICER papers confirms that ICER is a research-intensive conference. It also indicates that the research is quite narrowly focused, with the majority of the papers set in the context of programming courses. In addition we find that ICER has a high proportion of papers involving more than one institution, and high proportions of papers on the themes of ability/aptitude and theories and models of teaching and learning.
Simon, S, Sheard, J, Carbone, A, de Raadt, M, Hamilton, M, Lister, RF & Thompson, E 1970, 'Eight years of computing education papers at NACCQ', Proceedings of the 21st Annual Conference of the National Advisory Committee on Computing Qualifications, National Advisory Committee on Computing Qualifications, National Advisory Committee on Computing Qualifications, Auckland, New Zealand, pp. 101-107.
View description>>
Abstract: The 157 computing education papers from the past eight NACCQ conferences are categorised and summarised by a group of researchers from multiple institutions, with steps taken to measure and improve the consistency of classification. The papers are set predominantly in programming subjects, hardware/architecture/systems/ network subjects, and capstone projects. The bulk of the papers are about teaching/learning techniques, assessment techniques, teaching/learning tools, curriculum, and educational technology. Most of the papers are set within single subjects, a few in multiple subjects within a single program or department, and fewer still in a range of subjects across the whole institution or multiple institutions. Nearly a quarter of the papers either expound a position or outline a proposal; a large but diminishing proportion report on something such as a change of curriculum or approach; and a large and increasing proportion are clearly research papers, focusing on the analysis of data to answer an explicit research question.
Smith, G & Johnston, AJ 1970, 'Interactive Software for Guitar Learning', Sound : Space - Proceedings of the Australasian Computer Music Conference, Australasian Computer Music Conference, Australasian Computer Music Association, Sydney, Australia, pp. 69-77.
View description>>
In this paper we present software designed to help address problems encountered by beginning guItarists, using interactive software to find effective solutions to enhance the learning process. Software can be utilised to improve a player's ability tdhear mistakes in theIr performance, as well as to create a fun and entertaining learning environment 'to motivate the player to practice. A software prototype ~~s been developed, which served as a basIs for usabllzty testmg, to highlight the usefulness of vari~us methods of feedback and provide a way forward in developing valuable software for guitar tuition.
Thongkam, J, Xu, G & Zhang, Y 1970, 'AdaBoost algorithm with random forests for predicting breast cancer survivability', 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), 2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong), IEEE, Hong Kong, China, pp. 3062-3069.
View/Download from: Publisher's site
Thongkam, J, Xu, G, Zhang, Y & Huang, F 1970, 'Support Vector Machine for Outlier Detection in Breast Cancer Survivability Prediction', Advanced Web and NetworkTechnologies, and Applications Lecture Notes in Computer Science, Asia Pacific Web Conference, Springer Berlin Heidelberg, Shenyang, China, pp. 99-109.
View/Download from: Publisher's site
View description>>
Finding and removing misclassified instances are important steps in data mining and machine learning that affect the performance of the data mining algorithm in general. In this paper, we propose a C-Support Vector Classification Filter (C-SVCF) to identify and remove the misclassified instances (outliers) in breast cancer survivability samples collected from Srinagarind hospital in Thai- land, to improve the accuracy of the prediction models. Only instances that are correctly classified by the filter are passed to the learning algorithm. Perform- ance of the proposed technique is measured with accuracy and area under the re- ceiver operating characteristic curve (AUC), as well as compared with several popular ensemble filter approaches including AdaBoost, Bagging and ensemble of SVM with AdaBoost and Bagging filters. Our empirical results indicate that C-SVCF is an effective method for identifying misclassified outliers. This ap- proach significantly benefits ongoing research of developing accurate and robust prediction models for breast cancer survivability.
Tran, Q-NN, Beydoun, G, Low, G & Gonzalez-Perez, C 1970, 'Preliminary validation of MOBMAS (ontology-centric agent oriented methodology): Design of a peer-to-peer information sharing MAS', AGENT-ORIENTED INFORMATION SYSTEMS IV, 8th International Bi-Conference on Agent-Oriented Information Systems, SPRINGER-VERLAG BERLIN, Luxembourg, GERMANY, pp. 73-89.
Tsai, Y-S, Chung, I-F, Lin, C-T & Pal, NR 1970, 'Identification of Different Sets of Biomarkers for Diagnostic Classification of Cancers', NEURAL INFORMATION PROCESSING, PART II, 14th International Conference on Neural Information Processing (ICONIP 2007), Springer Berlin Heidelberg, Kitakyushu, JAPAN, pp. 866-875.
View/Download from: Publisher's site
Voinov, A, Arctur, D, Zaslavskiy, I & Ali, S 1970, 'Community-based software tools to support participatory modelling: A vision', Proc Iemss 4th Biennial Meeting Int Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making Iemss 2008, pp. 766-774.
View description>>
Environmental management depends on analysis of complex dynamics and spatial relationships of ecological and socio-economic systems. Modelling, when used to conduct such analyses, is recognized as an effective decision support tool in environmental management. Modelling conducted in a participatory fashion, involving stakeholders in various stages of model building and data processing has evolved as an efficient method for conflict resolution and decision-making. However, successful participatory modelling efforts require specific software and computer tools that are not available or accessible for stakeholders. There is a clear need for specialized modelling and data processing infrastructure that would allow comprehensive environmental simulations, based on limited computer programming skills, computer power, and data availability. We are developing a software framework of model and data modules to enable various stakeholders to tap into the recent and ongoing advances in environmental modelling, and high-quality data available on the Internet. The proposed framework would allow managers and planners to run simulations of policy scenarios and utilize state-of-the-art algorithms to develop and evaluate policy alternatives. The web-based modelling framework is based on the following components: A web-based domain-specific interface which facilitates the development, configuration, and execution of models applicable to region-specific watershed issues; A data-finder and transformer unique to the landscape modelling framework that lever-ages relevant Open GIS catalogue, RDF, and GRID resource discovery standards; A module composer that uses a module pool and guided composition of modules based on expert rules, which are either automatically acquired or input from human users, to guide the simulation-modelling process; and A semi-automatic model calibrator and verifier to deliver high quality simulation models. The framework's core components, i.e. model c...
Voinov, A, Zaslavskiy, I, Arctur, D, Duffy, C & Seppelt, R 1970, 'Community modelling, and data-model interoperability', Proc Iemss 4th Biennial Meeting Int Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making Iemss 2008, pp. 2035-2050.
View description>>
Community modelling is a promising paradigm to develop complex evolving and adaptable modelling systems that can share methods, data and models more easily within specialized communities. Why then are cooperative modelling communities still quite rare and do not propagate easily? Why has open source been so successful for software development, yet open models are still quite exotic? One difference between software and models is that software shares some common language. Models often use very different principles, theories, and semantics. For example hydrodynamic models, ecological models, and decision support models may have limited commonalities, In these cases, the disciplinary problem being solved may be the impediment to communication and to development of effective community tools these principles to another; it becomes difficult for one model to talk to another one. Similar problems prevail in data operations, when data sets (which are also models of sort) are hard to integrate with other data. An issue of contemporary interest is how will community data and models be implemented within environmental observatories. The environmental observatory may are become the ultimate driver for advancing research with a clear need for interoperability standards and functionality. There are at least three facets to the problem: • Lack of common modelling and software tools to enable modularity and connectivity; • Insufficient community understanding or access to basic tools; • Lack of social motivation and communication skills to enable communal work and sharing environments. The goals of this paper are to explore these areas with respect to the following points: • Understand the interoperability needs of the community for data and models within a participatory and collaborative framework; • Discuss research scenarios that would benefit from interoperability and explore interoperability architecture and standards supporting these scenarios; • Explore environme...
Wang Jian-zhou, Zhu Su-ling, Sun Dong-huai & Lu Hai-yan 1970, 'Combining principal component analysis and fuzzy cluster analysis for China's oil security', 2nd International Symposium on Information Technologies and Applications in Education (ISITAE 2008), 2nd International Symposium on Information Technologies and Applications in Education (ISITAE 2008), IEE, Xiamen, China, pp. 287-292.
View/Download from: Publisher's site
View description>>
It is significant to evaluate the situations of oil security for taking national oil security measures, because very important relationships exist between the oil security and the national security. A novel combined method is presented in this paper, which is based on using principal component analysis (PCA) and fuzzy cluster analysis (FCA) modeling. It is used for assessing oil security. In this paper, the data of 13 years is taken as sample and 10 indexes are selected to constitute an evaluation system for oil security. PCA is used for reducing the dimensions of indexes, and the new indexes are formed for oil security. Then FCA is used for classifying the 13 samples. At last a dialed analysis is made and some suggestions are put forward to ensure oil security.
Wang, C, Lu, J & Zhang, G 1970, 'An ontology data matching method for web information integration', Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, iiWAS08: 10th International Conference on Information Integration and Web-based Applications & Services, ACM, Linz, Austria, pp. 208-213.
View/Download from: Publisher's site
Wang, J, Che, J, Liang, J & Lu, H 1970, 'A Fuzzy Pattern Recognition System Based on SOM Clustering and RBF Neural Networks for Prediction', Proceedings of the 6th International Conference on Information Collection and Data Disposal.
Wang, J, Wang, H, Sun, D & Lu, H 1970, 'Ontology-based assembly design and information sharing for supply chain information', 38th International Conference on Computers and Industrial Engineering 2008, Hawaii International Conference on System Sciences, Organizing committee of the 38th International Conference on Computers and Industrial Engineering, Beijing, China, pp. 1220-1226.
View description>>
Nowadays, supply chain information is increasingly used by many entities around the world. Then, the need of sharing information from different sources is an obvious consequence from such proliferation of systems. Unfortunately, integrating supply chain information is not a trivial issue, because data and knowledge exchange among users of supply chain information systems presents many challenges. We must deal with the heterogeneity problem, which increase complexity of integration approaches. This paper discusses issues related to the use of ontologies in the development of supply chain information systems and proposes the creation of software components from diverse ontologies as a way to share data and supply chain information. Copyright© (2008) by Computers & Industrial Engineering.
Wang, J, Wang, Y, Sun, D & Lu, H 1970, 'Supply Chain Safety Stock Quantity's Fractal Forecast and Study', 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), IEEE, Dalian, China, pp. 1-4.
View/Download from: Publisher's site
View description>>
Safety stock, a very important composing of the stock management, which is significant for reducing the cost and increasing interests for an enterprise, is the base of the setting of enterprise's stocks, so it is crucial for stock management to presume a rational and exact SS. In this paper, introducing fractal theory, a new method based on the fractal collage theorem and the iterative process of fractal interpolation functions was proposed to forecast the safety stock. Based on the fractal collage theorem, it uses the iterated function system whose attractor is close to the historical data to establish the fractional function, and set the forecasting model proposed according to the iterative process of fractional function. Then by an example the rationality and reliability of this method is verified, and the result show that it is helpful indeed to set the reasonable safety stock for enterprise.
Wang, J, Zhu, W, Sun, D & Lu, H 1970, 'Application of SVM Combined with Mackov Chain for Inventory Prediction in Supply Chain', 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), IEEE, Dalian, China, pp. 1-4.
View/Download from: Publisher's site
View description>>
The aim of this paper is to predict the inventory of the relevant upstream enterprises in supply chain. The support vector machine, a novel artificial intelligence-based method developed from statistical learning theory, is adopted herein to establish a short-term stage forecasting model. However, take the fact into account that demand signal is affected by variant random factors and behaves big uncertainty, the predicted accuracy of SVM is not approving when the data show great randomness. It is obligatory that we present Markov chain to improve the predicted accuracy of SVM. This combined model takes advantage of the high predictable power of SVM model and at the same time take advantage of the prediction power of Markov chain modeling on the discrete states based on the SVM modeling residual sequence. Then we use the statistical data of the output of the gasoline of China from Feb-06 to Dec-07 for a validation of the effectiveness of the above model.
Wang, J-Z, Che, J-X, Liang, J-Z & Lu, H 1970, 'Research on Real Estate Early Warning System Based on Decision Tree and Fuzzy Recognition Theory', 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), IEEE, Jinan, PEOPLES R CHINA, pp. 414-418.
View/Download from: Publisher's site
Wang, J-Z, Wen, J-N, Sun, D-H & Lu, H-Y 1970, 'Detecting and Disposing Abnormal Signal Outliers with Masking Effect by Using Data Accumulated Generating Operation', 2008 Congress on Image and Signal Processing, 2008 Congress on Image and Signal Processing, IEEE, Hainan, pp. 426-430.
View/Download from: Publisher's site
View description>>
In this paper, we study a signal processing problem which concentrates on outlier detection and data mining in order to rediscover some useful information. Moreover, the great difficulty of the subject is caused by both the external environment and the internal mechanism. In the external, owing to limit of impersonal condition, such as, realistic disturbance from noise signal can not avoid. In the internal, the masking effect appears in outlying observation so as to produce some unreasonable results by data analysis. Therefore, based not only on the requirement of external quality assurance schemes, but also on internal quality control where screening for outliers should probably be part of the procedure for our main goal. As a consequence, we have applied data accumulated generating operation and sample median test for solving the conundrum. © 2008 IEEE.
Wei-Chung Huang, Shao-Hang Hung, Jen-Feng Chung, Meng-Hsiu Chang, Lan-Da Van & Chin-Teng Lin 1970, 'FPGA implementation of 4-channel ICA for on-line EEG signal separation', 2008 IEEE Biomedical Circuits and Systems Conference, 2008 IEEE Biomedical Circuits and Systems Conference - Intelligent Biomedical Systems (BioCAS), IEEE, Baltimore, MD, pp. 65-68.
View/Download from: Publisher's site
Wen, JN, Wang, JZ & Lu, HY 1970, 'An improved new approach for electric capacity forecasting based on historical data of GDP', 2008 3rd IEEE Conference on Industrial Electronics and Applications, 2008 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA), IEEE, Singapore, pp. 2487-2491.
View/Download from: Publisher's site
View description>>
Prediction is important for the electricity capacity management. Accurate prediction can help the policymaker make correct decision and promote the decision making quality. For improving an accuracy of prediction, in this paper, we adopt the theory of Grey prediction to develop a new forecasting approach that integrates historical data of the gross domestic products (GDP) into an electric capacity forecasting. We adopted Grey prediction as a forecasting means because of its fast calculation with as few as four data inputs needed. As a result, our study considered that Wu and Chen proposed a modeling method of the improved grey relational analysis and main shows that the general Grey model, GM (1, 1), which is an especial case, is adequate to handle an electrical power system. In this study, the prediction is improved significantly by applying the transformed Grey model and the concept of average system slope. The adaptive value of a in the Grey differential equation is obtained quickly with the average system slope technique. In such a way, the wastage of electric consumption can be avoided. That is, it is another achievement of virtual electric power plant. ©2008 IEEE.
Wenjun Zhang, Lin Gui, Wenfeng Ma, Bo Liu & Jian Xiong 1970, 'The television broadcasting network of Chinese High Speed Railway', 2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE, Las Vegas, NV, pp. 1-4.
View/Download from: Publisher's site
Wongthongtham, P, Hussain, FK, Chang, E & Dillon, TS 1970, 'Multi-site Software Engineering Ontology Instantiations Management Using Reputation Based Decision Making', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 199-218.
View/Download from: Publisher's site
View description>>
In this paper we explore the development of systems for software engineering ontology instantiations management in the methodology for multi-site distributed software development. Ultimately the systems facilitate collaboration of teams in multi-site distributed software development. In multi-site distributed environment, team members in the software engineering projects have naturally an interaction with each other and share lots of project data/agreement amongst themselves. Since they are not always residing at the same place and face-to-face meetings hardly happen, there is a need for methodology and tools that facilitate effective communication for efficient collaboration. Whist multi-site distributed teams collaborate, there are a lot of shared project data updated or created. In a large volume of project data, systematic management is of importance. Software engineering knowledge is represented in the software engineering ontology whose instantiations, which are undergoing evolution, need a good management system. Software engineering ontology instantiations signify project information which is shared and has evolved to reflect project development, changes in the software requirements or in the design process, to incorporate additional functionality to systems or to allow incremental improvement, etc. © 2009 Springer Berlin Heidelberg.
Xu, G, Zhang, Y & Yi, X 1970, 'Modelling User Behaviour for Web Recommendation Using LDA Model', 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, Sydney, NSW, Australia, pp. 529-532.
View/Download from: Publisher's site
Ya Gao, Guangquan Zhang & Jie Lu 1970, 'A particle swarm optimization based algorithm for fuzzy bilevel decision making', 2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence), 2008 IEEE 16th International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, Kong Kong, China, pp. 1452-1457.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques are developed for decentralized planning problems with decision makers located in a two-level system. This study develops a particle swarm optimization based algorithm to solve fuzzy linear bilevel (FLBL) decision problems. A main advantage of this algorithm is that the optimization technique is adopted directly on FLBL problems by fully considering the original information carried by the fuzzy parameters, thus minimizing information loss. Experiments reveal that this algorithm can effectively solve the fuzzy linear bilevel decision problems. © 2008 IEEE.
Yu, S & Zhou, W 1970, 'Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks', 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008 IEEE International Conference on Pervasive Computing and Communications (PerCom), IEEE, Hong Kong, PEOPLES R CHINA, pp. 566-571.
View/Download from: Publisher's site
Yu, S, Doss, R, Thapngam, T & Qian, D 1970, 'A Transformation Model for Heterogeneous Servers', 2008 10th IEEE International Conference on High Performance Computing and Communications, 2008 10th IEEE International Conference on High Performance Computing and Communications (HPCC), IEEE, Dalian Univ Technol, Dalian, PEOPLES R CHINA, pp. 665-671.
View/Download from: Publisher's site
Zadjabbari, B, Wongthongtham, P & Hussain, FK 1970, 'Towards an Ontological Intellectual Capital based Model in Sustainable Business Performance', 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2, pp. 512-515.
View/Download from: Publisher's site
View description>>
In this paper, we focus on the returns generated by assets that are not reported. These refer mainly to the assets other than those reported on the balance sheet. These sources create value to organisations. Traditional capital e.g. physical and human capitals cannot guarantee future success of a business. We define and include social capital as an internal-based source and market capital as an external-based source for sustainable business performance. These intangible assets may represent a huge source but at the same time they are the hardest to quantify and express numerically and tangibly. There is a lack of a standard metric method to measure this kind of knowledge and assests. Ontology, a particular type of knowledge based technology, can be used to help understand how knowledge within organisations creates value. By making knowledge explicit and transparent, it promotes trust which in turn promotes governance. Generally speaking, an ontology is used to explicitly express how the intellectual capital is valued and thus results are sensible for managers. The ontology enables evidence based formation of knowledge valuation. © 2008 IEEE.
Zhang, G, Yang, X & Lu, J 1970, 'A SVM-based classification approach for early warning systems', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 549-554.
View/Download from: Publisher's site
ZHANG, G, ZHANG, G & XIE, H 1970, 'HYBRID GENETIC ALGORITHM BASED ON DISTANCE DENSITY AND QUASI-SIMPLEX TECHNIQUE', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, Spain, pp. 737-742.
View/Download from: Publisher's site
Zhang, J, Lu, J & Zhang, G 1970, 'An integrated framework of early warning systems', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 683-688.
View/Download from: Publisher's site
View description>>
An early warning system (EWS) is critical to saving lives and mitigating loss from disasters. Literature addresses specific technical issues of EWSs in different hazard domains, however, only a few discussions on framework and standards. The paper proposes a set of practical designing standards and a comprehensive EWS integration framework. The framework takes considerations of human factors, lead-time and feed-back issues, therefore more suitable for a wide range of applications in practice.
Zhang, S, Rong, M, Zhang, G & Cao, J 1970, 'High-confidence Embedded Software Development Based on UML2.0 Communication Diagram and Temporal Logic', ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 3rd International Conference on Computer Science and Education, XIAMEN UNIV PRESS, PEOPLES R CHINA, Kaifeng, pp. 912-916.
Zhang, X, Liu, W, Li, S & Ying, M 1970, 'Reasoning with Cardinal Directions: An Efficient Algorithm.', AAAI, National Conference of the American Association for Artificial Intelligence, AAAI Press, Chicago, Illinois, USA, pp. 387-392.
View description>>
Direction relations between extended spatial objects are important commonsense knowledge. Recently, Goyal and Egenhofer proposed a formal model, called Cardinal Direction Calculus (CDC), for representing direction relations between connected plane regions. CDC is perhaps the most expressive qualitative calculus for directional information, and has attracted increasing interest from areas such as artificial intelligence, geographical information science, and image retrieval. Given a network of CDC constraints, the consistency problem is deciding if the network is realizable by connected regions in the real plane. This paper provides a cubic algorithm for checking consistency of basic CDC constraint networks. As one byproduct, we also show that any consistent network of CDC constraints has a canonical realization in digital plane. The cubic algorithm can also been adapted to cope with disconnected regions, in which case the current best algorithm is of time complexity O(n5).
Zhang, Y & Xu, G 1970, 'Using Web Clustering for Web Communities Mining and Analysis', 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), IEEE, Sydney, NSW, Australia, pp. 20-31.
View/Download from: Publisher's site
Zhu, J, Lu, H, Guo, Y & Lin, Z 1970, 'Development of electromagnetic linear actuators for micro robots (invited)', Proceedings of the 11th International Conference on Electrical Machines and Systems, ICEMS 2008, International Conference on Electrical Machines and Systems, World Publishing Corporation, Wuhan, China, pp. 3673-3679.
View description>>
For micro robotic applications, piezoelectric actuators are widely used, whereas electromagnetic actuators are not favored because of the complex structures and difficult fabrication. On the other hand, electromagnetic actuators have many merits that are suitable for robotic applications, such as relatively large displacement or stroke and no need of high voltage power supply. With the recent fast development of micro precision machining techniques, the fabrication of complex structures is no longer a problem. This paper presents our recent study of developing electromagnetic actuators for micro robotic applications, including a comparison between piezoelectric and electromagnetic actuators, design of two types of electromagnetic actuators, and fabrication and testing of a moving magnet tubular linear actuator.
Zi Lu, Rui-ling Han, Pei-pei Zhang, Yi-ming Ren & Guangquan Zhang 1970, 'An intelligent evaluation system for tourism websites in Shijiazhuang city', 2008 3rd International Conference on Intelligent System and Knowledge Engineering, 2008 3rd International Conference on Intelligent System and Knowledge Engineering (ISKE 2008), IEEE, Xianeb, pp. 1404-1408.
View/Download from: Publisher's site
View description>>
This study conducts evaluate research on ten selected tourism websites of Shijiazhuang city and establishes a complete tourism website intelligence evaluation index system. This paper presents this system and analyzes its components and functions. It also presents how to apply fuzzy clustering analysis to evaluate the development of these tourism websites. The proposed evaluation system can be used for other cities tourism website evaluation and the evaluation results can be directly used for improving Shijiazhuang city tourism website development.
Zowghi, D & Cleland-Huang, J 1970, 'Transforming the Requirements Engineering Classroom Experience', 2008 16th IEEE International Requirements Engineering Conference, 2008 16th IEEE International Requirements Engineering Conference (RE), IEEE, pp. 297-297.
View/Download from: Publisher's site
View description>>
This panel presents and discusses effective techniques for teaching requirements engineering principles and practices, in ways which actively engage students in the learning process. © 2008 IEEE.