Azadeh, A, Aramoon, M & Saberi, M 2009, 'An integrated GA-time series algorithm for forecasting oil production estimation: USA, Russia, India, and Brazil', International Journal of Industrial and Systems Engineering, vol. 4, no. 4, pp. 368-368.
View/Download from: Publisher's site
View description>>
This study presents an integrated algorithm for forecasting oil production based on a Genetic Algorithm (GA) with variable parameters using stochastic procedures, time series and Analysis of Variance (ANOVA). The significance of the proposed algorithm is two fold. First, it is flexible and identifies the best model based on the results of ANOVA and MAPE, whereas previous studies consider the best fitted GA model based on Minimum Absolute Percentage Error (MAPE) or relative error results. Second, the proposed algorithm may identify conventional time series as the best model for future oil production forecasting because of its dynamic structure, whereas previous studies assume that GA always provides the best solutions and estimation. To show the applicability and superiority of the proposed algorithm, the data for oil production in USA, Russia, India and Brazil from 2001 to 2006 are used and applied to the proposed algorithm. Copyright © 2009, Inderscience Publishers.
Azadeh, A, Ardalani, N & Saberi, M 2009, 'Improved estimation of sir in mobile Cdma systems by integration of artificial neural network and time series technique', Australian Journal of Basic and Applied Sciences, vol. 3, no. 3, pp. 2955-2962.
View description>>
This study presents an integrated Artificial Neural Network (ANN) and time series framework to estimate and predict Signal to Interference Ratio (SIR) in Direct Sequence Code Division Multiple Access (DS/CDMA) systems. It is difficult to model uncertain behavior of SIR with only conventional ANN or time series and the integrated algorithm could be an ideal substitute for such cases. Artificial Neural Network (ANN) approach based on supervised multi layer perceptron (MLP) network are used in the proposed algorithm. All type of ANN-MLP are examined in present study. At last, Coefficient of Determination (R2) is used for selecting preferred model from different constructed MLP-ANN. One of unique feature of the proposed algorithm is utilization of Autocorrelation Function (ACF) to define input variables whereas conventional methods which use trial and error method. This is the first study that integrates ANN and time series for improved estimation of SIR in mobile CDMA systems. © 2009, INSInet Publication.
Azadeh, A, Khakestani, M & Saberi, M 2009, 'A flexible fuzzy regression algorithm for forecasting oil consumption estimation', Energy Policy, vol. 37, no. 12, pp. 5567-5579.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Anvari, M & Izadbakhsh, HR 2009, 'A Meta heuristic approach for performance assessment of production units', Expert Systems with Applications, vol. 36, no. 3, pp. 6559-6569.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Gitiforouz, A & Saberi, Z 2009, 'A hybrid simulation-adaptive network based fuzzy inference system for improvement of electricity consumption estimation', Expert Systems with Applications, vol. 36, no. 8, pp. 11108-11117.
View/Download from: Publisher's site
Azadeh, A, Sharifi, S & Saberi, M 2009, 'Design and implementation of a human centered expert system for improvement of strategic planning in a manufacturer of construction products', Australian Journal of Basic and Applied Sciences, vol. 3, no. 3, pp. 2447-2458.
View description>>
This paper introduces a human centered expert system for design and improvement of strategic planning in a manufacturer of construction products. The development process of the expert system is facilitated through knowledge base, learning module, inference engine, description tools and usability testing and inspection. To achieve the above objective, all indigenous and exogenous factors affecting strategic planning are categorized and translated into rules in the expert system. Moreover, general strategies and their decision circumstances or criteria are given to the system. The humancentered expert system is designed and tested for a medium-sized manufacturer of construction products. The s uperiority and applicability of the expert system was designed and tested for a manufacturer of construction products. This is the first study that introduces a human-centered expert system for improvement of strategic planning. © 2009, INSInet Publication.
Beydoun, G, Low, G, Henderson-Sellers, B, Mouratidis, H, Gomez-Sanz, JJ, Pavon, J & Gonzalez-Perez, C 2009, 'FAML: A Generic Metamodel for MAS Development', IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, vol. 35, no. 6, pp. 841-863.
View/Download from: Publisher's site
View description>>
AbstractIn some areas of software engineering research, there are several metamodels claiming to capture the main issues. Though it is profitable to have variety at the beginning of a research field, after some time, the diversity of metamodels becomes an obstacle, for instance to the sharing of results between research groups. To reach consensus and unification of existing metamodels, metamodel-driven software language engineering can be applied. This paper illustrates an application of software language engineering in the agent-oriented software engineering research domain. Here, we introduce a relatively generic agent-oriented metamodel whose suitability for supporting modeling language development is demonstrated by evaluating it with respect to several existing methodology-specific metamodels. First, the metamodel is constructed by a combination of bottom-up and top-down analysis and best practice. The concepts thus obtained and their relationships are then evaluated by mapping to two agent-oriented metamodels: TAO and Islander. We then refine the metamodel by extending the comparisons with the metamodels implicit or explicit within five more extant agent-oriented approaches: Adelfe, PASSI, Gaia, INGENIAS, and Tropos. The resultant FAML metamodel is a potential candidate for future standardization as an important component for engineering an agent modeling language.
Beydoun, G, Low, G, Mouratidis, H & Henderson-Sellers, B 2009, 'A security-aware metamodel for multi-agent systems (MAS)', INFORMATION AND SOFTWARE TECHNOLOGY, vol. 51, no. 5, pp. 832-845.
View/Download from: Publisher's site
View description>>
This paper adopts a model-based security (MBS) approach to identify security requirements during the early stages of multi-agent system development. Our adopted MBS approach is underpinned by a metamodel independent of any specific methodology. It allows for security considerations to be embedded within any situated agent methodology which then prescribes security considerations within its work products. Using a standard model-driven engineering (MDE) approach, these work products are initially constructed as high abstraction models and then transformed into more precise models until code-specific models can be produced. A multi-agent system case study is used to illustrate the applicability of the proposed security-aware metamodel.
Bremner, MJ, Mora, C & Winter, A 2009, 'Are Random Pure States Useful for Quantum Computation?', PHYSICAL REVIEW LETTERS, vol. 102, no. 19.
View/Download from: Publisher's site
View description>>
We show the following: a randomly chosen pure state as a resource for measurement-based quantum computation iswith overwhelming probabilityof no greater help to a polynomially bounded classical control computer, than a string of random bits. Thus, unlike the familiar ``cluster states, the computing power of a classical control device is not increased from P to BQP (bounded-error, quantum polynomial time), but only to BPP (bounded-error, probabilistic polynomial time). The same holds if the task is to sample from a distribution rather than to perform a bounded-error computation. Furthermore, we show that our results can be extended to states with significantly less entanglement than random states.
Cardwell, H, Voinov, A & Starler, N 2009, 'The Energy‐Water Nexus: Potential Roles for the U.S. Army Corps of Engineers', Journal of Contemporary Water Research & Education, vol. 143, no. 1, pp. 42-48.
View/Download from: Publisher's site
Cetindamar, D, Phaal, R & Probert, D 2009, 'Understanding technology management as a dynamic capability: A framework for technology management activities', Technovation, vol. 29, no. 4, pp. 237-246.
View/Download from: Publisher's site
Cetindamar, D, Wasti, SN, Ansal, H & Beyhan, B 2009, 'Does technology management research diverge or converge in developing and developed countries?', Technovation, vol. 29, no. 1, pp. 45-58.
View/Download from: Publisher's site
Chen, L, Bhowmick, SS & Nejdl, W 2009, 'NEAR-Miner', Proceedings of the VLDB Endowment, vol. 2, no. 1, pp. 1150-1161.
View/Download from: Publisher's site
View description>>
Web archives preserve the history of autonomous Web sites and are potential gold mines for all kinds of media and business analysts. The most common Web archiving technique uses crawlers to automate the process of collecting Web pages. However, (re)downloading entire collection of pages periodically from a large Web site is unfeasible. In this paper, we take a step towards addressing this problem. We devise a data mining-driven policy for selectively (re)downloading Web pages that are located in hierarchical directory structures which are believed to have changed significantly (e.g., a substantial percentage of pages are inserted to/removed from the directory). Consequently, there is no need to download and maintain pages that have not changed since the last crawl as they can be easily retrieved from the archive. In our approach, we propose an off-line data mining algorithm called near- Miner that analyzes the evolution history of Web directory structures of the original Web site stored in the archive and mines negatively correlated association rules (near) between ancestor-descendant Web directories. These rules indicate the evolution correlations between Web directories. Using the discovered rules, we propose an efficient Web archive maintenance algorithm called warm that optimally skips the subdirectories (during the next crawl) which are negatively correlated with it in undergoing significant changes. Our experimental results with real data show that our approach improves the efficiency of the archive maintenance process signifi...
Cheng-Jian Lin, Cheng-Hung Chen & Chin-Teng Lin 2009, 'A Hybrid of Cooperative Particle Swarm Optimization and Cultural Algorithm for Neural Fuzzy Networks and Its Prediction Applications', IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 39, no. 1, pp. 55-68.
View/Download from: Publisher's site
Devitt, SJ, Fowler, AG, Tilma, T, Munro, WJ & Nemoto, K 2009, 'Classical Processing Requirements for a Topological Quantum Computing System', International Journal of Quantum Information, vol. 8, no. 1-2, pp. 121-147.
View/Download from: Publisher's site
View description>>
Dedicated research into the design and construction of a large scale QuantumInformation Processing (QIP) system is a complicated task. The design of anexperimentally feasible quantum processor must draw upon results in multiplefields; from experimental efforts in system control and fabrication through tofar more abstract areas such as quantum algorithms and error correction.Recently, the adaptation of topological coding models to physical systems inoptics has illustrated a possible long term pathway to truly large scale QIP.As the topological model has well defined protocols for Quantum ErrorCorrection (QEC) built in as part of its construction, a more grounded analysisof the {\em classical} processing requirements is possible. In this paper weanalyze the requirements for a classical processing system, designedspecifically for the topological cluster state model. We demonstrate that viaextensive parallelization, the construction of a classical 'front-end' systemcapable of processing error correction data for a large topological computer ispossible today.
Devitt, SJ, Nemoto, K & Munro, WJ 2009, 'Quantum Error Correction for Beginners', Rep. Prog. Phys., vol. 76, no. 7, p. 076001.
View/Download from: Publisher's site
View description>>
Quantum error correction (QEC) and fault-tolerant quantum computationrepresent one of the most vital theoretical aspect of quantum informationprocessing. It was well known from the early developments of this excitingfield that the fragility of coherent quantum systems would be a catastrophicobstacle to the development of large scale quantum computers. The introductionof quantum error correction in 1995 showed that active techniques could beemployed to mitigate this fatal problem. However, quantum error correction andfault-tolerant computation is now a much larger field and many new codes,techniques, and methodologies have been developed to implement error correctionfor large scale quantum algorithms. In response, we have attempted to summarizethe basic aspects of quantum error correction and fault-tolerance, not as adetailed guide, but rather as a basic introduction. This development in thisarea has been so pronounced that many in the field of quantum information,specifically researchers who are new to quantum information or people focusedon the many other important issues in quantum computation, have found itdifficult to keep up with the general formalisms and methodologies employed inthis area. Rather than introducing these concepts from a rigorous mathematicaland computer science framework, we instead examine error correction andfault-tolerance largely through detailed examples, which are more relevant toexperimentalists today and in the near future.
Dong, Y, Xu, Y & Yu, S 2009, 'Linguistic multiperson decision making based on the use of multiple preference relations', Fuzzy Sets and Systems, vol. 160, no. 5, pp. 603-623.
View/Download from: Publisher's site
Doss, R, Li, G, Mak, V, Yu, S & Chowdhury, M 2009, 'Improving the QoS for information discovery in autonomic wireless sensor networks', Pervasive and Mobile Computing, vol. 5, no. 4, pp. 334-349.
View/Download from: Publisher's site
Dovey, K 2009, 'The role of trust in innovation', The Learning Organization, vol. 16, no. 4, pp. 311-325.
View/Download from: Publisher's site
View description>>
PurposeThe purpose of this paper is to explore the role of trust in the collaborative learning processes that underpin innovation as a competitive strategy in organizations.Design/methodology/approachAs a conceptual paper, the argument is framed by academic perspectives, drawn from the academic literature on the topic and by professional and life experience.FindingsThe collaborative learning practices that underpin idea generation and realization in organizations are strongly dependent for their effectiveness upon the availability, within and beyond stakeholder networks, of trust and other key social capital resources.Practical implicationsIf innovation is dependent upon social capital resources, such as trust, then leadership endeavour needs to be much more focused upon the creation of a social environment that nurtures rich stakeholder and other relevant network, relationships. New forms of governance and power management, and more appropriate and aligned organizational structures, are required in organizations that are attempting to compete through innovation.Originality/valueThe paper's explication of the role of social capital resources, like trust, in organizational innovation offers new insights into this complex but increasingly vital form of competitive strategy.
Dyson, LE, Litchfield, A, Lawrence, E, Raban, R & Leijdekkers, P 2009, 'Advancing the m-learning research agenda for active, experiential learning: Four case studies', AUSTRALASIAN JOURNAL OF EDUCATIONAL TECHNOLOGY, vol. 25, no. 2, pp. 250-267.
View description>>
This article reports on an m-learning research agenda instituted at our university in order to explore how mobile technology can enhance active, experiential learning. Details of the implementation and results of four areas of m-learning are presented: mobile supported fieldwork, fostering interactivity in large lectures with mobile technology, using mobile devices to learn about mobile technology and, finally, podcasting. These directions are informed by a concern for achieving m-learning practices consistent with sound educational theory and the needs of the contemporary, technologically aware student body. All four implementations have been successfully embedded in mainstream subjects on a continuing basis. Therefore they represent a departure from the project based approach of much m-learning reported in the literature. This outcome was achieved through a focus on the economic sustainability and feasibility of each case. An evaluation focusing on how well each case assisted students' learning found that, with the exception of lecture podcasting, all supported high quality experiential learning.
Dyson, LE, Raban, R, Litchfield, A & Lawrence, E 2009, 'Addressing the cost barriers to mobile learning in higher education', International Journal of Mobile Learning and Organisation, vol. 3, no. 4, pp. 381-381.
View/Download from: Publisher's site
View description>>
This paper addresses one of the main barriers to the widespread adoption of mobile learning in higher education, that of cost. Usage charges billed by telecommunications providers and the cost of mobile hardware are identified as the key cost issues. However, opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. The authors describe two experiments in low-cost mobile learning: one that uses packet technology (mobile WAP/WML) to build low-cost interactivity in the classroom and the second that involves mobile-supported fieldwork using several cost-saving strategies. © 2009 Inderscience Enterprises Ltd.
Eklund, JM & McGregor, C 2009, 'Standards for physiological data transmission and archiving for the support of the service of critical care', ACM SIGBED Review, vol. 6, no. 2, pp. 1-6.
View/Download from: Publisher's site
View description>>
Physiological data is monitored and displayed on medical devices around the world every day, and the volume of this data is steadily increasing and newer monitoring devices enter the clinical setting. However, the vast majority of this data is lost since it is most often displayed once as it is recorded, perhaps replayed one or more times while it exists in the device's volatile memory. What little data that is permanently recorded is most commonly saved through hand written annotations, in paper records and in some limited samples stored on hospital clinical information systems. Meanwhile, current methods of data analysis provide opportunities to utilize this data for improved care of these same critical care patients. A major inhibitor to this becoming reality is the lack of standards for the representation, transmission and storage of physiological data. HL7, for example, does not include definitions for time series data. Research into the use of these data will soon be reaching the clinical setting and the need for such standards to be defined is becoming urgent.
GAO, YA, ZHANG, G & LU, JIE 2009, 'A FUZZY MULTI-OBJECTIVE BILEVEL DECISION SUPPORT SYSTEM', International Journal of Information Technology & Decision Making, vol. 08, no. 01, pp. 93-108.
View/Download from: Publisher's site
View description>>
In a bilevel decision problem, both the leader and the follower may have multiple objectives, and the coefficients involved in these objective functions or constraints may be described by some uncertain values. To express such a situation, a fuzzy multi-objective bilevel (FMOBL) programming model and related solution methods are introduced. This research develops a FMOBL decision support system through implementing the proposed FMOBL methods.
Gui, L, Li, Q, Liu, B, Zhang, W & Zheng, C 2009, 'Low complexity channel estimation method for TDS-OFDM based Chinese DTTB system', IEEE Transactions on Consumer Electronics, vol. 55, no. 3, pp. 1135-1140.
View/Download from: Publisher's site
Gutierrez, F & Dyson, LE 2009, 'Confucian or Fusion?', The International Journal of Learning: Annual Review, vol. 16, no. 5, pp. 373-384.
View/Download from: Publisher's site
View description>>
This research aims to uncover the perceptions of first-year Confucian-heritage students towards their lived experience of university study in Australia. Data was gathered from the students via interviews and analyzed using a phenomenological approach. From the students perspective, prior experience of western-style pedagogy was found to be helpful in giving students an idea of what the Australian learning environment would entail, although many students still had difficulty with classroom interaction due to persistent cultural conditioning. In terms of teacher behaviour, important factors include the lecturer demonstrating an understanding of the students culture, using humour in teaching, being a role model, developing a good relationship with the student and demonstrating a commitment to their learning. Issues included the students lack of understanding of the true significance of assignments and lecturers misunderstanding of the valuable role of memorization in Confucian-heritage students learning. The findings of this work allow academics an insight into the lived educational experiences of the student participants. They may also be tentatively offered as a means of informing future course design and delivery, with the goal of improving the quality of student learning and, therefore, academic success.
Izadbakhsh, H, Hour Ali, M, Amirkhani, A, Montazeri, A & Saberi, M 2009, 'Performance assessment and optimization of the after-sale networks', World Academy of Science, Engineering and Technology, vol. 37, pp. 910-914.
View description>>
The after-sales activities are nowadays acknowledged as a relevant source of revenue, profit and competitive advantage in most manufacturing industries. Top and middle management, therefore, should focus on the definition of a structured business performance measurement system for the after-sales business. The paper aims at filling this gap, and presents an integrated methodology for the after-sales network performance measurement, and provides an empirical application to automotive case companies and their official service network. This is the first study that presents an integrated multivariate approach for total assessment and improvement of after-sale services. © 2009 WASET.ORG.
Jakeman, AJ, Rizzoli, AE & Voinov, AA 2009, 'Outstanding reviewers for environmental modelling and software in 2008', Environmental Modelling & Software, vol. 24, no. 10, pp. 1137-1138.
View/Download from: Publisher's site
Juszczyszyn, K, Musiał, K, Kazienko, P & Gabrys, B 2009, 'Temporal changes in local topology of an email-based social network', Computing and Informatics, vol. 28, no. 6, pp. 763-779.
View description>>
The dynamics of complex social networks has become one of the research areas of growing importance. The knowledge about temporal changes of the network topology and characteristics is crucial in networked communication systems in which accurate predictions are important. The local network topology can be described by the means of network motifs which are small subgraphs - usually containing from 3 to 7 nodes. They were shown to be useful for creating profiles that reveal several properties of the network. In this paper, the time-varying characteristics of social networks, such as the number of nodes and edges as well as clustering coefficients and different centrality measures are investigated. At the same time, the analysis of three-node motifs (triads) was used to track the temporal changes in the structure of a large social network derived from e-mail communication between university employees. We have shown that temporal changes in local connection patterns of the social network are indeed correlated with the changes in the clustering coefficient as well as various centrality measures values and are detectable by means of motifs analysis. Together with robust sampling network motifs can provide an appealing way to monitor and assess temporal changes in large social networks.
Ken-Li Lin, Chin-Teng Lin, Pal, NR & Ojha, S 2009, 'Structural building blocks', IEEE Engineering in Medicine and Biology Magazine, vol. 28, no. 4, pp. 38-44.
View/Download from: Publisher's site
Li, J & Hao, P 2009, 'Finding representative landmarks of data on manifolds', Pattern Recognition, vol. 42, no. 11, pp. 2335-2352.
View/Download from: Publisher's site
Li, K, Zhou, W & Yu, S 2009, 'Effective metric for detecting distributed denial-of-service attacks based on information divergence', IET Communications, vol. 3, no. 12, pp. 1851-1851.
View/Download from: Publisher's site
Lindahl, M, José, M, Jurado, L, Pilar, M, Ramos, G & Carmen, M 2009, 'A decision making method for educational management based on distance measures', Revista de Metodos Cuantitativos para la Economia y la Empresa, vol. 8, pp. 29-49.
View description>>
We develop a new approach for decision making in educational management based on the use of distance measures. We focus on the selection of a studies plan from the perspective of an academic institution. We try to develop this approach showing the benefits of establishing an ideal plan that we compare with the available alternatives. We use the Minkowski distance, the ordered weighted averaging (OWA) operator and the interval numbers. The use of the Minkowski distance allows to make comparisons between the ideal plan and the available ones in the market. The OWA operator is an aggregation operator that provides a parameterized family of aggregation operators that includes the maximum, the minimum and the average criteria, among oth- ers. And the interval numbers is a very useful technique to represent the information when the environment is very complex, because it gives all the possible results from the minimum to the maximum. We introduce a new aggregation operator called the uncertain generalized ordered weighted aver- aging distance (UGOWAD) operator. It is a distance aggregation operator that uses the main characteristics of the Minkowski distance, the OWA op- erator and the interval numbers. We develop an illustrative example where we can see the usefulness of the UGOWAD operator to select a studies plan in education management. The main advantage of using the UGOWAD is that we can consider a wide range of distance aggregation methods in the decision problem. Then, the decision maker gets a more complete view of the decision problem, being able to select the alternative that better fits the interests.
Lister, R 2009, 'CS research', ACM SIGCSE Bulletin, vol. 41, no. 2, pp. 72-74.
View/Download from: Publisher's site
View description>>
This is a regular invited column I write for this journal.
Lister, R, Fidge, C & Teague, D 2009, 'Further evidence of a relationship between explaining, tracing and writing skills in introductory programming', ACM SIGCSE Bulletin, vol. 41, no. 3, pp. 161-165.
View/Download from: Publisher's site
View description>>
This paper reports on a replication of earlier studies into a possible hierarchy of programming skills. In this study, the students from whom data was collected were at a university that had not provided data for earlier studies. Also, the students were taught the programming language 'Python', which had not been used in earlier studies. Thus this study serves as a test of whether the findings in the earlier studies were specific to certain institutions, student cohorts, and programming languages. Also, we used a non-parametric approach to the analysis, rather than the linear approach of earlier studies. Our results are consistent with the earlier studies. We found that students who cannot trace code usually cannot explain code, and also that students who tend to perform reasonably well at code writing tasks have also usually acquired the ability to both trace code and explain code.
Lu, J, Bai, C & Zhang, G 2009, 'Cost-benefit factor analysis in e-services using bayesian networks', EXPERT SYSTEMS WITH APPLICATIONS, vol. 36, no. 3, pp. 4617-4625.
View/Download from: Publisher's site
View description>>
This study applies Bayesian network techniques to analyze and verify the relationships among cost factors and benefit factors in e-service systems. This study first establishes a Bayesian network for e-service cost-benefit factor relationships based on our previous study [Lu, J. & Zhang, G. Q. (2003). Cost benefit factor analysis in e-services. International Journal of Service Industry Management (IJSIM), 14(5), 570-595]. It then calculates conditional probability distributions among these factors shown in the Bayesian network. Finally it runs a Junction-tree algorithm to conduct inference for verifying these cost-benefit factor relationships, and the data collected through a survey is as evidences in the inference process. Through the above application of Bayesian network techniques a set of useful findings is obtained for the costs involved in e-service developments against the benefits received by adopting these e-service systems. The case of 'increased investments in maintaining e-services' would significantly contribute to 'enhancing perceived company image', and the case of 'increased investments in security of e-service systems' would bring high benefits in 'building customer relationships' and 'improving cooperation between companies'. These findings have great potential to improve the strategic planning of businesses by determining more effective investments items and adopting more suitable development activities in e-service systems and applications. © 2008 Elsevier Ltd. All rights reserved.
Lu, J, Zhu, Y, Zeng, X, Koehl, L, Ma, J & Zhang, G 2009, 'A linguistic multi-criteria group decision support system for fabric hand evaluation', FUZZY OPTIMIZATION AND DECISION MAKING, vol. 8, no. 4, pp. 395-413.
View/Download from: Publisher's site
View description>>
Fabric hand evaluation (FHE) is the main measure in textile material selection for fashion design and development. Fabric hand evaluation requires considering multiple evaluation aspects/criteria by a group of evaluators. Some fabric features can also be measured using instruments. The evaluation often uses linguistic terms in the weights of criteria, and the weights and judgments of evaluators. To support a FHE-based material selection, this study first develops a fabric hand-based textile material evaluation model. It then proposes a human-machine measure integrated fuzzy multi-criteria group decision-making method. A software tool is also developed, which implements the proposed method and is applied in fabric hand-based textile material evaluation. © 2009 Springer Science+Business Media, LLC.
Ma, J, Lu, J & Zhang, G 2009, 'Information inconsistencies detection using a rule-map technique', EXPERT SYSTEMS WITH APPLICATIONS, vol. 36, no. 10, pp. 12510-12519.
View/Download from: Publisher's site
View description>>
Timely detecting information inconsistencies (anomalies) in real-time information provides strong support for decision-making in a dynamic decision-making situation. Existing techniques for information inconsistencies detection mainly focus on stored information by using a single structured-fixed descriptive model which always requires support from sufficient prior knowledge. The aim of this study is to develop a method for information inconsistencies detection for real-time information in dynamic decision-making situation where prior knowledge is insufficient by using multiple descriptive models. First, a rule-map technique is presented. A rule-map is a hierarchical directed graph, whose vertexes are selected descriptive models and whose arcs represent the covering relationship between descriptive models. A rule-map provides a strategy for selecting detecting descriptive models by means of the covering relationship and its structure is adjustable with the change in a situation. Then, a real-time information inconsistencies detection method, named RMDID, is developed based on the rule-map technique, which can take full advantage of multiple descriptive models. Finally, the proposed RMDID method is tested through two real cases. Experiments indicate that the proposed rule-map technique can trace the changes of a dynamic decision-making situation and the developed RMDID method can efficiently detect potential anomalies in real-time information.
Mazalek, A & Van Den Hoven, E 2009, 'Framing tangible interaction frameworks', AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, vol. 23, no. 3, pp. 225-235.
View/Download from: Publisher's site
View description>>
Tangible interaction is a growing area of human-computer interaction research that has become popular in recent years. Yet designers and researchers are still trying to comprehend and clarify its nature, characteristics, and implications. One approach has been to create frameworks that help us look back at and categorize past tangible interaction systems, and look forward at the possibilities and opportunities for developing new systems. To date, a number of different frameworks have been proposed that each provide different perspectives on the tangible interaction design space, and which can guide designers of new systems in different ways. In this paper, we map the space of tangible interaction frameworks.We order existing frameworks by their general type, and by the facets of tangible interaction design they address. One of our main conclusions is that most frameworks focus predominantly on the conceptual design of tangible systems, whereas fewer frameworks abstract the knowledge gained from previous systems, and hardly any framework provides concrete steps or tools for building new tangible systems. In addition, the facets most represented in existing frameworks are those that address the interactions with or the physicality of the designed systems. Other facets, such as domain-specific technology and experience, are rare. This focus on design, interaction, and physicality is interesting, as the origins of the field are rooted in engineering methods and have only recently started to incorporate more design-inspired approaches. As such, we expected more frameworks to focus on technologies and to provide concrete building suggestions for new tangible interaction systems.
McGregor, C & Maeder, A 2009, 'eHealth and services computing in healthcare', Journal of Theoretical and Applied Electronic Commerce Research, vol. 4, no. 2.
Medelyan, O, Milne, D, Legg, C & Witten, IH 2009, 'Mining meaning from Wikipedia', International Journal of Human-Computer Studies, vol. 67, no. 9, pp. 716-754.
View/Download from: Publisher's site
MERIGO, J & GILLAFUENTE, A 2009, 'The induced generalized OWA operator', Information Sciences, vol. 179, no. 6, pp. 729-741.
View/Download from: Publisher's site
Merigó, JM & Casanovas, M 2009, 'Geometric operators in decision making with minimization of regret', World Academy of Science, Engineering and Technology, vol. 39, pp. 514-521.
View description>>
We study different types of aggregation operators and the decision making process with minimization of regret. We analyze the original work developed by Savage and the recent work developed by Yager that generalizes the MMR method creating a parameterized family of minimal regret methods by using the ordered weighted averaging (OWA) operator. We suggest a new method that uses different types of geometric operators such as the weighted geometric mean or the ordered weighted geometric operator (OWG) to generalize the MMR method obtaining a new parameterized family of minimal regret methods. The main result obtained in this method is that it allows to aggregate negative numbers in the OWG operator. Finally, we give an illustrative example.
Merigó, JM & Casanovas, M 2009, 'Induced aggregation operators in decision making with the Dempster-Shafer belief structure', International Journal of Intelligent Systems, vol. 24, no. 8, pp. 934-954.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 2009, 'OWA operators in generalized distances', World Academy of Science, Engineering and Technology, vol. 33, pp. 866-873.
View description>>
Different types of aggregation operators such as the ordered weighted quasi-arithmetic mean (Quasi-OWA) operator and the normalized Hamming distance are studied. We introduce the use of the OWA operator in generalized distances such as the quasiarithmetic distance. We will call these new distance aggregation the ordered weighted quasi-arithmetic distance (Quasi-OWAD) operator. We develop a general overview of this type of generalization and study some of their main properties such as the distinction between descending and ascending orders. We also consider different families of Quasi-OWAD operators such as the Minkowski ordered weighted averaging distance (MOWAD) operator, the ordered weighted averaging distance (OWAD) operator, the Euclidean ordered weighted averaging distance (EOWAD) operator, the normalized quasi-arithmetic distance, etc.
Mo, T, Wang, Z, Xu, X & Wang, X 2009, 'A Virtualization-Based Service System Development Method', Journal of Service Science and Management, vol. 02, no. 01, pp. 1-9.
View/Download from: Publisher's site
Ngo, HH, Chuang, H, Guo, WS, Ho, DP, Pham, TTN, Johnston, A, Lim, R & Listowski, A 2009, 'Resident's strategy survey on a new end use of recycled water in Australia', DESALINATION AND WATER TREATMENT, vol. 11, no. 1-3, pp. 93-97.
View/Download from: Publisher's site
View description>>
The concept of using recycled water for washing machine was introduced as a new end use. As there is a noticeable lack social research in understanding the general public perceptions of this application, the resident's strategy survey was carried out at some selective suburbs in Sydney with demographically based significant differences of general, gender, age, education, and property style and ownership. The survey indicates that the majority in the community considers the use of recycled water for washing machine is indispensable in view of continuing drought and the associated water shortages. Given safety assurance and demonstration, recycled water for washing machine has a considerable proportion within the responses. The general level of knowledge in community clearly understand that recycled water is more environmentally friendly option, whereas from cleanness and public health point of view, higher quality water is required to be reused in washing machine. Moreover, the residents reckon to have a small unit for pre-treatment (point of use) before recycled water entering washing machines might assure the quality and safety. The survey also shows the major concerns for a resident to use recycled water for washing machine are public health, water cleanness and washing machine durability. © 2009 Desalination Publications.
Percival, J, Catley, C, McGregor, C & James, A 2009, 'A Design for Modelling the Impact of Information and Communication Technologies on Patient Journeys in Neonatal Intensive Care Units', Studies in Computational Intelligence, vol. 189, pp. 147-169.
View/Download from: Publisher's site
View description>>
This paper presents the conceptual model of a survey and knowledge translation methodology to enable the assessment of the implementation of technology in neonatal intensive care units (NICUs) in order to determine the impact of information technology (IT) on information flows and patient care. Survey data, will be completed by healthcare practitioners from multiple roles, for various patient care scenarios, levels of care, and hospitals, and will then be translated using a structured data modelling approach into patient journey models. The data model is defined such that users can develop queries to generate patient journey models based on a pre-defined Patient Journey Model Architecture (PaJMa). PaJMa models will then be analyzed to build a visual representation of information flows and the use of IT in the NICU. The models will offer a sophisticated view of health informatics usage, providing not only details of what IT solutions a hospital utilizes, but also the impact that the IT solutions have when integrated into the patient journey, how they support the patient information flow, and why they improve the patient journey. © 2009 Springer-Verlag Berlin Heidelberg.
Pietroni, N, Ganovelli, F, Cignoni, P & Scopigno, R 2009, 'Splitting cubes: a fast and robust technique for virtual cutting.', Vis. Comput., vol. 25, pp. 227-239.
View/Download from: Publisher's site
Saito, S, Tilma, T, Devitt, SJ, Nemoto, K & Semba, K 2009, 'Experimentally realizable controlled NOT gate in a flux qubit/resonator system', Physical Review B, vol. 80, no. 22.
View/Download from: Publisher's site
Shepherd, D & Bremner, MJ 2009, 'Temporally unstructured quantum computation', PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, vol. 465, no. 2105, pp. 1413-1439.
View/Download from: Publisher's site
View description>>
We examine theoretic architectures and an abstract model for a restricted class of quantum computation, called here temporally unstructured ('instantaneous') quantum computation because it allows for essentially no temporal structure within the quantum dynamics. Using the theory of binary matroids, we argue that the paradigm is rich enough to enable sampling from probability distributions that cannot, classically, be sampled efficiently and accurately. This paradigm also admits simple interactive proof games that may convince a sceptic of the existence of truly quantum effects. Furthermore, these effects can be created using significantly fewer qubits than are required for running Shor's algorithm. This journal is © 2009 The Royal Society.
Thongkam, J, Xu, G, Zhang, Y & Huang, F 2009, 'Toward breast cancer survivability prediction models through improving training space', Expert Systems with Applications, vol. 36, no. 10, pp. 12200-12209.
View/Download from: Publisher's site
View description>>
Due to the difficulties of outlier and skewed data, the prediction of breast cancer survivability has presented many challenges in the field of data mining and pattern precognition, especially in medical research. To solve these problems, we have proposed a hybrid approach to generating higher quality data sets in the creation of improved breast cancer survival prediction models. This approach comprises two main steps: (1) utilization of an outlier filtering approach based on C-Support Vector Classification (C-SVC) to identify and eliminate outlier instances; and (2) application of an over-sampling approach using over-sampling with replacement to increase the number of instances in the minority class. In order to assess the capability and effectiveness of the proposed approach, several measurement methods including basic performance (e.g., accuracy, sensitivity, and specificity), Area Under the receiver operating characteristic Curve (AUC) and F-measure were utilized. Moreover, a 10-fold cross-validation method was used to reduce the bias and variance of the results of breast cancer survivability prediction models. Results have indicated that the proposed approach leads to improving the performance of breast cancer survivability prediction models by up to 28.34% due to the improved training data space.
van Boerdonk, K, Tieben, R, Klooster, S & van den Hoven, E 2009, 'Contact through canvas: an entertaining encounter', PERSONAL AND UBIQUITOUS COMPUTING, vol. 13, no. 8, pp. 551-567.
View/Download from: Publisher's site
View description>>
When meeting someone new, the first impression is often influenced by someoneâs physical appearance and other types of prejudice. In this paper, we present TouchMeDare, an interactive canvas, which aims to provide an experience when meeting new people, while preventing visual prejudice and lowering potential thresholds. The focus of the designed experience was to stimulate people to get acquainted through the interactive canvas. TouchMeDare consists of a flexible, opaque canvas, which plays music when touched simultaneously from both sides. Dynamic variation of this bodily contact is reflected through real-time adaptations of the musical compositions. Two redesigns were qualitatively and quantitatively evaluated and a final version was placed in the Lowlands Festival as a case study. Evaluation results showed that some explanation was needed for the initial interaction with the installation. On the other hand, after this initial unfamiliarity passed, results showed that making bodily contact through the installation did help people to get acquainted with each other and increased their social interaction.
Voinov, A & Cardwell, H 2009, 'The Energy‐Water Nexus: Why Should We Care?', Journal of Contemporary Water Research & Education, vol. 143, no. 1, pp. 17-29.
View/Download from: Publisher's site
Wang, C, Lu, J & Zhang, G 2009, 'Web ontology data matching for integration: method and framework', International Journal of Web Information Systems, vol. 5, no. 2, pp. 220-238.
View/Download from: Publisher's site
View description>>
PurposeMatching relevant ontology data for integration is vitally important as the amount of ontology data increases along with the evolving Semantic web, in which data are published from different individuals or organizations in a decentralized environment. For any domain that has developed a suitable ontology, its ontology annotated data (or simply ontology data) from different sources often overlaps and needs to be integrated. The purpose of this paper is to develop intelligent web ontology data matching method and framework for data integration.Design/methodology/approachThis paper develops an intelligent matching method to solve the issue of ontology data matching. Based on the matching method, it also proposes a flexible peer‐to‐peer framework to address the issue of ontology data integration in a distributed Semantic web environment.FindingsThe proposed matching method is different from existing data matching or merging methods applied to data warehouse in that it employs a machine learning approach and more similarity measurements by exploring ontology features.Research limitations/implicationsThe proposed method and framework will be further tested for some more complicated real cases in the future.Originality/valueThe experiments show that this proposed intelligent matching method increases ontology data matching accuracy.
Yucheng Dong, Yinfeng Xu & Shui Yu 2009, 'Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model', IEEE Transactions on Fuzzy Systems, vol. 17, no. 6, pp. 1366-1378.
View/Download from: Publisher's site
Zandieh, M, Azadeh, A, Hadadi, B & Saberi, M 2009, 'Application of Artificial Neural Networks for Airline Number of Passenger Estimation in Time Series State', Journal of Applied Sciences, vol. 9, no. 6, pp. 1001-1013.
View/Download from: Publisher's site
View description>>
This study presents an integrated Artificial Neural Networks (ANN) to estimate and predict airline number of passenger in Iran. All type of ANN-Multi Layer Perceptron (MLP) is examined to this estimation. The ANN models are implemented on MATLAB software. Auto-Correlation Function (ACF) is utilized to define input variables. Finally, the best type of ANN-MLP is determined with Data Envelopment Analysis (DEA). Kruskal-Wallis test is used for asses the impact of raw data, preprocessed data and post process method on ANN performance. Monthly airline number of passenger of Iran airline from 1993 to 2005 is considered as the case of this study. © 2009 Asian Network for Scientific Information.
Zhang, G & Lu, J 2009, 'A linguistic intelligent user guide for method selection in multi-objective decision support systems', INFORMATION SCIENCES, vol. 179, no. 14, pp. 2299-2308.
View/Download from: Publisher's site
View description>>
Some multi-objective decision-making (MODM) methods are more effective than others for particular decision problems and/or particular decision makers. It is therefore necessary to provide a set of MODM methods in a multi-objective decision support system (MODSS) to support a wide range of problem solving. However, it is always difficult for decision makers to select the most suitable method for individual cases because MODM methods involve a deep knowledge of mathematics. To handle this difficulty, this study develops a MODM method selection guide supported by a fuzzy matching optimization method. In this paper, we first present the modelling process for the knowledge of characteristics of the main MODM methods. We then present related matching techniques between the characteristics of a real-world decision-making situation and a set of predefined situation descriptions (characteristics of a MODM method) where the elements of the two sets may be expressed by linguistic terms. Based on this process, a fuzzy matching optimization-based MODM method selection approach is proposed. The approach applies general fuzzy numbers, fuzzy distance, fuzzy multi-criteria decision-making concepts, and rule-based inference techniques to recommend the most suitable method from a MODM method-base. The approach is adopted in a linguistic intelligent user guide within a MODSS. Experiments have shown that the development of the linguistic intelligent user guide can increase the ability of the MODSS to support decision makers in arriving at a satisfactory solution in a most effective way. © 2009 Elsevier Inc. All rights reserved.
Zhang, G, Dillon, TS, Cai, K-Y, Ma, J & Lu, J 2009, 'Operation properties and delta-equalities of complex fuzzy sets', INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, vol. 50, no. 8, pp. 1227-1249.
View/Download from: Publisher's site
View description>>
A complex fuzzy set is a fuzzy set whose membership function takes values in the unit circle in the complex plane. This paper investigates various operation properties and proposes a distance measure for complex fuzzy sets. The distance of two complex fuzzy sets measures the difference between the grades of two complex fuzzy sets as well as that between the phases of the two complex fuzzy sets. This distance measure is then used to define δ-equalities of complex fuzzy sets which coincide with those of fuzzy sets already defined in the literature if complex fuzzy sets reduce to real-valued fuzzy sets. Two complex fuzzy sets are said to be δ-equal if the distance between them is less than 1 - δ. This paper shows how various operations between complex fuzzy sets affect given δ-equalities of complex fuzzy sets. An example application of signal detection demonstrates the utility of the concept of δ-equalities of complex fuzzy sets in practice. © 2009 Elsevier Inc. All rights reserved.
Zhang, G, Ma, J & Lu, J 2009, 'Emergency management evaluation by a fuzzy multi-criteria group decision support system', STOCHASTIC ENVIRONMENTAL RESEARCH AND RISK ASSESSMENT, vol. 23, no. 4, pp. 517-527.
View/Download from: Publisher's site
View description>>
Emergency risk management (ERM) is a process which involves dealing with risks to the community arising from emergency events. Emergency management evaluation as one of the important parts of ERM aims assessing and improving social preparedness and organizational ability in identifying, analyzing, and treating emergency risks. This study first develops an emergency management evaluation model. It then proposes an extended fuzzy multi-criteria group evaluation method, which can deal with both subjective and objective criteria under multi-levels by a group of evaluators, for emergency management evaluation. A fuzzy multi-criteria group decision support system (FMCGDSS) is then developed to implement the proposed method for the case of emergency operating center/system evaluation. © Springer-Verlag 2008.
Zhang, Y & Xu, G 2009, 'On web communities mining and recommendation', Concurrency and Computation: Practice and Experience, vol. 21, no. 5, pp. 561-582.
View/Download from: Publisher's site
View description>>
AbstractBecause of the lack of a uniform schema for web documents and the sheer amount and dynamics of web data, both the effectiveness and the efficiency of information management and retrieval of web data are often unsatisfactory when using conventional data management and searching techniques. To address this issue, we have adopted web mining and web community analysis approaches. On the basis of the analysis of web document contents, hyperlinks analysis, user access logs and semantic analysis, we have developed various approaches or algorithms to construct and analyze web communities, and to make recommendations. This paper will introduce and discuss several approaches on web community mining and recommendation. Copyright © 2009 John Wiley & Sons, Ltd.
Zheng, Z, Lu, J, Zhang, G & He, Q 2009, 'Rule sets based bilevel decision model and algorithm', EXPERT SYSTEMS WITH APPLICATIONS, vol. 36, no. 1, pp. 18-26.
View/Download from: Publisher's site
View description>>
Bilevel decision addresses the problem in which two levels of decision makers, each tries to optimize their individual objectives under certain constraints, act and react in an uncooperative, sequential manner. As bilevel decision making often involves many uncertain factors in real world problems, it is hard to formulate the objective functions and constraints of the leader and the follower in modelling a real bilevel decision problem. This study explores a new approach that uses rule sets to formulate a bilevel decision problem. It first develops related theories to prove the feasibility to model a bilevel decision problem by rule sets. It then proposes an algorithm to describe the modelling process. A case study is discussed to illustrate the functions and effectiveness of the proposed rule sets based bilevel decision modelling algorithm. © 2007 Elsevier Ltd. All rights reserved.
Ab Aziz, R, Zowghi, D & McBride, T 1970, 'Towards a classification of requirements relationships', Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, International Conference on Software Engineering and Knowledge Engineering, Knowledge Systems Institute Graduate School, Boston, Massachusetts, pp. 26-32.
View description>>
Requirements are related to and affect each other in many different ways. Developing a comprehensive knowledge of these relationships is an important part of understanding requirements. This paper proposes a classification of requirements relationships from several perspectives such as Feature Oriented, Aspect Oriented and Goal Oriented Approaches. We compare and contrast these relationship classifications and provide examples of each to increase our understanding of this complex phenomenon. This paper aims at integrating requirements relationship classifications from major bodies of work in requirements engineering and to improve awareness on the role they play in software testing practices.
Ab Aziz, R, Zowghi, D & McBride, TM 1970, 'Towards a Classification of Requirements Relationships', Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE 2009), International Conference on Software Engineering and Knowledge Engineering, Knowledge Systems Institute Graduate School, Boston, Massachusetts, USA, pp. 26-32.
View description>>
Requirements are related to and affect each other in many different ways. Developing a comprehensive knowledge of these relationships is an important part of understanding requirements. This paper proposes a classification of requirements relationships from several perspectives such as Feature Oriented, Aspect Oriented and Goal Oriented Approaches. We compare and contrast these relationship classifications and provide examples of each to increase our understanding of this complex phenomenon. This paper aims at integrating requirements relationship classifications from major bodies of work in requirements engineering and to improve awareness on the role they play in software testing practices.
Al-hassan, M, Lu, H & Lu, J 1970, 'A framework for delivering personalized e-government services from a citizen-centric approach', Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, iiWAS '09: 11th International Conference on Information Integration and Web-based Applications & Services, ACM, Kuala Lumpur, Malaysia, pp. 434-438.
View/Download from: Publisher's site
View description>>
E-government is becoming more attentive towards providing intelligent personalized online services to citizens so that citizens can receive better services with less time and effort. This paper proposes a new conceptual framework for delivering personalized e-government services to citizens from a citizen-centric approach, called Pe-Gov service framework. This framework outlines the main components and their interconnections. Detailed explanations about these components are given and the special features of this framework are highlighted. This framework has the potential to outperform the existing e-Gov service systems as illustrated by two real life examples.
Antle, AN, Corness, G, Bakker, S, Droumeva, M, van den Hoven, E, Bevans, A & ACM 1970, 'Designing to Support Reasoned Imagination through Embodied Metaphor', C & C 09: PROCEEDINGS OF THE 2009 ACM SIGCHI CONFERENCE ON CREATIVITY AND COGNITION, C&C' 09, ACM, Berkeley, CA, USA, pp. 275-284.
View/Download from: Publisher's site
View description>>
Supporting users' reasoned imagination in sense making during interaction with tangible and embedded computation involves supporting the application of their existing mental schemata in understanding new forms of interaction. Recent studies that include an embodied metaphor in the interaction model, which relates action-based inputs to digital outputs, have provided evidence that this approach is beneficial. Yet the design of such systems has been difficult and full of setbacks. Wide spread adoption of this approach requires a better understanding of how to design such embodied metaphor-based interactional models. We analyze three recent design-based research studies in which we have been involved in order to derive design knowledge that may inform others. Following a case study methodology we identify kernels or points in the design process where discontinuities between predicted and actual interaction highlight important design knowledge.
Bakker, S, Antle, AN & van den Hoven, E 1970, 'Identifying embodied metaphors in children's sound-action mappings', Proceedings of the 8th International Conference on Interaction Design and Children, IDC '09: The 8th International Conference on Interactive Design and Children, ACM, Como, Italy, pp. 140-149.
View/Download from: Publisher's site
View description>>
Physical activity and manipulating physical objects can be beneficial for learning. Earlier studies [2] have shown that interaction models that rely on unconscious and embodied knowledge (based on embodied metaphors) can benefit the learning process. However, more than one embodied metaphor might be applicable. In this paper, we present the results of a user study (n=65) designed to identify embodied metaphors seven to nine year old children use when enacting abstract concepts related to musical sound. The results provide evidence that multiple different embodied metaphors can unconsciously be used to structure the understanding of these concepts. In addition, we have identified and categorized commonly used metaphors based on the children's enactments of changing sound concepts.
Barzinpour, F, Izadbakhsh, HR, Azadeh, A & Saberi, M 1970, 'A Genetic Algorithm for Total Assessment of Telecommunication Sectors', 2009 3RD IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 3rd IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Istanbul, TURKEY, pp. 242-+.
Barzmpour, F, Izadbakhsh, HR, Azadeh, A & Saben, M 1970, 'A genetic algorithm for total assessment of telecommunication sectors', 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. 97-102.
View/Download from: Publisher's site
View description>>
This paper presents a genetic algorithm (GA) to assessment the decision making units (DMU). The Telecommunication sectors based on standards indicators identified by international telecommunication union (ITU) are considered for total assessment by the proposed approach. The indicators are categorized as telephone network size, other services, quality of service, traffic, tariffs, staff, demography, economy, information technology, broadcasting and mobile services. To present the applicability of the proposed approach, data for the year 2003 of 62 developed and developing countries are used. A total of 9 indicators are considered, out of which 4 are inputs and 5 are outputs respectively. The results of GA are verified by Principle Component Analysis (PCA) approach. The results show weak and strong points of each sector and identify the most efficient inputs or outputs, which can aid management in overall assessment. The proposed approach of this study may be easily used for assessment of other sectors. ©2009 IEEE.
Bogdanov, A & Qiao, Y 1970, 'On the Security of Goldreich’s One-Way Function', APPROXIMATION, RANDOMIZATION, AND COMBINATORIAL OPTIMIZATION, 12th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems/13th International Workshop on Randomization and Computation, Springer Berlin Heidelberg, Berkeley, CA, pp. 392-405.
View/Download from: Publisher's site
Bremner, MJ 1970, 'Are random pure states useful for quantum computation?', Institute of Mathematics and its Applications Conference on Quantum Computing and Complexity of Quantum Simulation, London.
View description>>
Quantum computing represents the prodigiously fertile union of quantum physics with the theory of computation and especially issues of computational complexity. It is known that quantum processes can offer solutions to some information processing tasks that are exponentially more efficient than any known classical methods. Perhaps the most celebrated example is Shor's 1994 quantum algorithm for integer factorisation. In recent years there has been a surge of activity in our understanding of quantum computational power and its prospective applicability and limitations. A variety of problems in diverse areas of mathematics, has been identified (so-called BQP-complete problems) that have efficient quantum algorithms and also embody the full power of efficient quantum computation. In quantum many body physics (including study of quantum circuits, of local hamiltonians, and of further formalisms such as measurement based computing) some problems have been shown, surprisingly, to admit efficient classical solution while others (e.g. certain ground state properties of local hamiltonians) are likely to be computationally intractible, having been shown to be so-called QMA-complete. Quantum entanglement is often regarded as an essential ingredient in these considerations and there has been considerable development in understanding its scaling behaviour in many body systems. This conference is devoted to recent theoretical developments in these areas and related issues. Invited speakers will be requested to include overview material (in addition to recent research) with the aim of making the essential ideas of these important developments accessible to a broader audience of QIP researchers.
Bremner, MJ 1970, 'Instantaneous quantum computation', Institute of Mathematics and its Applications Conference on Quantum Computing and Complexity of Quantum Simulation, London.
View description>>
Quantum computing represents the prodigiously fertile union of quantum physics with the theory of computation and especially issues of computational complexity. It is known that quantum processes can offer solutions to some information processing tasks that are exponentially more efficient than any known classical methods. Perhaps the most celebrated example is Shor's 1994 quantum algorithm for integer factorisation. In recent years there has been a surge of activity in our understanding of quantum computational power and its prospective applicability and limitations. A variety of problems in diverse areas of mathematics, has been identified (so-called BQP-complete problems) that have efficient quantum algorithms and also embody the full power of efficient quantum computation. In quantum many body physics (including study of quantum circuits, of local hamiltonians, and of further formalisms such as measurement based computing) some problems have been shown, surprisingly, to admit efficient classical solution while others (e.g. certain ground state properties of local hamiltonians) are likely to be computationally intractible, having been shown to be so-called QMA-complete. Quantum entanglement is often regarded as an essential ingredient in these considerations and there has been considerable development in understanding its scaling behaviour in many body systems. This conference is devoted to recent theoretical developments in these areas and related issues. Invited speakers will be requested to include overview material (in addition to recent research) with the aim of making the essential ideas of these important developments accessible to a broader audience of QIP researchers.
Bremner, MJ 1970, 'Instantaneous quantum computation', Twelth Workshop on Quantum Information Processing, Santa Fe, New Mexico, USA.
View description>>
Fifteen years ago, Shor's efficient quantum algorithms for factoring integers and evaluating discrete logarithms launched the field of quantum information processing (QIP) into the public consciousness. QIP is now one of the most active and fastest-growing research areas in computer science and physics, spanning topics such as quantum computation, quantum communication, and quantum cryptography. QIP 2009 is the twelfth in a series of international workshops dedicated to disseminating recent theoretical advances in this field.
Bremner, MJ 1970, 'Most quantum states are useless for measurement-based quantum computation', Twelth Workshop on Quantum Information Processing, Santa Fe, New Mexico, USA.
View description>>
Fifteen years ago, Shor's efficient quantum algorithms for factoring integers and evaluating discrete logarithms launched the field of quantum information processing (QIP) into the public consciousness. QIP is now one of the most active and fastest-growing research areas in computer science and physics, spanning topics such as quantum computation, quantum communication, and quantum cryptography. QIP 2009 is the twelfth in a series of international workshops dedicated to disseminating recent theoretical advances in this field.
Brodka, P, Musial, K & Kazienko, P 1970, 'A Performance of Centrality Calculation in Social Networks', 2009 International Conference on Computational Aspects of Social Networks, 2009 International Conference on Computational Aspects of Social Networks (CASON), IEEE, ESIGETEL, Fontainebleau, FRANCE, pp. 24-31.
View/Download from: Publisher's site
Brodka, P, Musial, K & Kazienko, P 1970, 'Efficiency of Node Position Calculation in Social Networks', KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II, PROCEEDINGS, 13th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Univ Chile, Fac Phys Sci & Math, Santiago, CHILE, pp. 455-463.
View/Download from: Publisher's site
Catley, C, Smith, K, McGregor, C & Tracy, M 1970, 'Extending CRISP-DM to incorporate temporal data mining of multidimensional medical data streams: A neonatal intensive care unit case study', 2009 22nd IEEE International Symposium on Computer-Based Medical Systems, 2009 22nd IEEE International Symposium on Computer-Based Medical Systems (CBMS), IEEE.
View/Download from: Publisher's site
View description>>
Using a Neonatal Intensive Care Unit (NICU) case study, this work investigates the current CRoss Industry Standard Process for Data Mining (CRISP-DM) approach for modeling Intelligent Data Analysis (IDA)-based systems that perform temporal data mining (TDM). The case study highlights the need for an extended CRISP-DM approach when modeling clinical systems applying Data Mining (DM) and Temporal Abstraction (TA). As the number of such integrated TA/DM systems continues to grow, this limitation becomes significant and motivated our proposal of an extended CRISP-DM methodology to support TDM, known as CRISP-TDM. This approach supports clinical investigations on multi-dimensional time series data. This research paper has three key objectives: 1) Present a summary of the extended CRISP-TDM methodology; 2) Demonstrate the applicability of the proposed model to the NICU data, focusing on the challenges associated with multi-dimensional time series data; and 3) Describe the proposed IDA architecture for applying integrated TDM. ©2009 IEEE.
Catley, C, Smith, K, McGregor, C & Tracy, M 1970, 'Extending CRISP-DM to Incorporate Temporal Data Mining of Multidimensional Medical Data Streams: A Neonatal Intensive Care Unit Case Study', 2009 22ND IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 22nd IEEE International Symposium on Computer-Based Medical Systems, IEEE, Albuquerque, NM, pp. 418-+.
Chen, L & Bhowmick, SS 1970, 'In the Search of NECTARs from Evolutionary Trees', DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 14th International Conference on Database Systems for Advanced Applications, SPRINGER-VERLAG BERLIN, Brisbane, AUSTRALIA, pp. 714-+.
Clancy, M, Caspersen, M & Lister, R 1970, 'ICER'09 - Proceedings of the 2009 ACM Workshop on International Computing Education Research: Foreword', ICER'09 - Proceedings of the 2009 ACM Workshop on International Computing Education Research.
Clancy, M, Caspersen, ME & Lister, RF 1970, 'Proceeding of the fifth International workshop on Computing education research', Fifth International Computing Education Research Workshop, International Computing Education Research Workshop, Association for Computing Machinery, Berkeley, CA, USA, pp. 1-165.
View description>>
The fifth International workshop on Computing education research workshop attracted 24 submissions. All papers were double-blind peer-reviewed by members of the international program committee. After the reviewing, 13 papers (54%) were accepted for inclusion in the conference, written by authors across nine countries: Australia, Finland, Germany, Israel, New Zealand, Sweden, the Philippines, the United Kingdom, and the United States of America. The papers spanned a wide variety of topics, including tools and tool use; conceptions, preconceptions, and misconceptions; attitudes; collaborative learning; research categorization; teacher adaptation to new paradigms; and broad-scale adoption of CS innovation.
Dunlu Peng, Chen Li & Huan Huo 1970, 'An extended UsernameToken-based approach for REST-style Web Service Security Authentication', 2009 2nd IEEE International Conference on Computer Science and Information Technology, 2009 2nd IEEE International Conference on Computer Science and Information Technology, IEEE.
View/Download from: Publisher's site
Dyson, L, Litchfield, A, Raban, R & Tyler, J 1970, 'mInteract: Online tool for sustainable active experiential mobile learning', ASCILITE 2009 - The Australasian Society for Computers in Learning in Tertiary Education, pp. 230-232.
View description>>
The rapid evolution and ubiquitous use of mobile devices is an historical opportunity to improve experiential interactivity in education practices to support 'deep' learning. A major barrier to the widespread adoption of mobile learning in higher education is that of cost. Opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. mInteract™ is an online system which uses packet technology to build no-to-low cost interactivity into learning spaces. mInteract supports sustainable active experiential learning transactions for both student and teacher. © 2009 Laurel Dyson, Andrew Litchfield Ryszard Raban and Jon Tyler.
Dyson, LE & Brady, F 1970, 'Mobile Phone Adoption and Use in Lockhart River Aboriginal Community', 2009 Eighth International Conference on Mobile Business, 2009 Eighth International Conference on Mobile Business, IEEE, Dalian, Liaoning, China, pp. 170-175.
View/Download from: Publisher's site
View description>>
This paper reports on an ethnographic study of mobile phone adoption and use in a remote Aboriginal community in Cape York, Australia. The researchers found that, within nine months of the introduction of the 3G network, 58% of the Indigenous people interviewed had acquired a mobile phone, a much higher rate of adoption than any other ICT. The phones were employed for communication, with multimedia uses (music, games, videos, photos) also very popular. Issues included the cost, robustness and usability of the devices, although most people managed costs well by purchasing pre-paid phones. The findings suggest a number of possible initiatives that government, service providers and business could consider to leverage mobile phone usage and develop capacity in the community.
Dyson, LE, Litchfield, A, Raban, R & Tyler, J 1970, 'Interactive classroom mlearning and the experiential transactions between students and lecturer', ASCILITE 2009 - The Australasian Society for Computers in Learning in Tertiary Education, pp. 233-242.
View description>>
This paper seeks to address a major deficit in understandings of mobile learning, that is, its lack of a solid theoretical foundation. An overview of existing theoretical concepts of mobile learning is presented, followed by an analysis of interactive classroom systems and the learning that they provide. The implementation of a specific interactive system mInteract in the lectures of a large accounting subject is described. mInteract is a Web- based system using no-to-low cost data-packet technology and provides for interactions from students' own Internet-enabled mobile devices. The paper examines, by means of reflections from the lecturer and students, the learning which took place during the implementation. The analysis demonstrates that interactive mobile learning can be interpreted using experiential learning theory, and that both students and lecturers engage in experiential learning. Furthermore, they enter into transactions of knowledge which are facilitated by the mobile learning system. © 2009 Laurel Evelyn Dyson, Andrew Litchfield, Ryszard Raban and Jonathan Tyler.
Dyson, LE, Litchfield, AJ, Raban, R & Tyler, JV 1970, 'Reflections on interactive classroom mLearning and the experiential transactions between students and lecturer', Same places, different spaces. Proceedings ascilite Auckland 2009, Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education, The University of Auckland, Auckland University of Technology, and Australasian Society for Computer, Auckland, New Zealand, pp. 232-242.
View description>>
This paper seeks to address a major deficit in understandings of mobile learning, that is, its lack of a solid theoretical foundation. An overview of existing theoretical concepts of mobile learning is presented, followed by an analysis of interactive classroom systems and the learning that they provide. The implementation of a specific interactive system mInteract in the lectures of a large accounting subject is described. mInteract is a Webbased system using no-to-low cost data-packet technology and provides for interactions from students own Internet-enabled mobile devices. The paper examines, by means of reflections from the lecturer and students, the learning which took place during the implementation. The analysis demonstrates that interactive mobile learning can be interpreted using experiential learning theory, and that both students and lecturers engage in experiential learning. Furthermore, they enter into transactions of knowledge which are facilitated by the mobile learning system.
Fis, AM & Cetindamar, D 1970, 'Unlocking the relationship between corporate entrepreneurship and performance', PICMET '09 - 2009 Portland International Conference on Management of Engineering & Technology, Technology, IEEE, pp. 1819-1830.
View/Download from: Publisher's site
View description>>
Corporate entrepreneurship is the implementation of a value creation process in an organizational setting. Consistent with the Schumpeterian understanding of entrepreneurship, a "new combination" that should directly affect the performance of the firm is formed; and the process of forming this new combination manifests itself as an outcome of a complex social mechanism affected by internal and external factors. However, in spite of the biasing anecdotal evidence, conventional wisdom, and tendency in favor of entrepreneurship, a "black box" between firm-level entrepreneurship and performance has pervaded the relationship. Nevertheless, the model proposed in this study brings a new and distinguishing line of sight into the firm-level entrepreneurship literature: rather than being an equivalent, the entrepreneurial orientation construct is treated as an antecedent of corporate entrepreneurship; moreover the behavioral construct of corporate entrepreneurship is placed in between this strategic posture and performance, to complete "the missing" link between firm-level entrepreneurship and performance. It is proposed that this formulation of roles and meanings attached to both terms, leads to a solid, conclusive, and systematic direct positive relationship between firm level entrepreneurship and performance. Empirical findings confirm this proposal, making this formulation the most important contribution of this study to the firm level entrepreneurship literature. © 2009 PICMET.
Gao, Y, Zhang, G & Lu, J 1970, 'A particle swarm optimization based algorithm for fuzzy bilevel decision making with constraints-shared followers', Proceedings of the 2009 ACM symposium on Applied Computing, SAC09: The 2009 ACM Symposium on Applied Computing, ACM, Hawaii, USA, pp. 1075-1079.
View/Download from: Publisher's site
View description>>
In a bilevel decision problem, decision making may involve multiple followers and fuzzy demands. This research focuses on the problem of fuzzy linear bilevel decision making with multiple followers who share common constraints (FBCSF). Based on the ranking relationship among fuzzy sets defined by cut set and satisfactory degree α, a FBCSF model is presented and a particle swarm optimization based algorithm is developed. The experiments reveal that solutions obtained by this algorithm are reasonable and stable. Copyright 2009 ACM.
Gao, Y, Zhang, G, Lu, J & Wee, H-M 1970, 'A Fuzzy Bi-level Pricing Model and a PSO Based Algorithm in Supply Chains', NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, International Conference on Neural Information Processing, Springer, Bangkok, Thailand, pp. 226-233.
View/Download from: Publisher's site
View description>>
Due to rapid technological innovation and severe competition, the upstream component price and the downstream product cost in hi-tech industries usually decline significantly with time. In building a pricing supply chain model, some coefficients are generally obtained from experiments and cannot be defined as crisp numbers. Thus, an effective fuzzy pricing supply chain model becomes crucial. This paper establishes a fuzzy bi-level pricing model for buyers and vendors in supply chains. Then, a particle swarm optimization (PSO) based algorithm is developed to solve problems defined by this model. Experiments show that this PSO-based algorithm can solve fuzzy bi-level pricing problems effectively.
Goyal, ML & Zhang, G 1970, 'Using attribute and attitude assessment for bidding in automated auctions.', iiWAS, ACM, pp. 380-384.
View/Download from: Publisher's site
View description>>
An automated auction is an efficient market institution for real-world trading of commodities. This paper presents a novel fuzzy bidding strategy (FAA-Bid), which employs assessments of multiple attributes of items as well as agents' attitude on bidding item to procure an item in automated auction. The assessment of attributes adapts the fuzzy sets technique to handle uncertainty of the bidding process as well use heuristic rules to determine attitude of bidding agents in simulated auctions to procure goods. The overall assessment is used to determine a price range based on current bid, which finally selects the best one as the new bid. © 2010 ACM.
Guo, Y, Xu, W, Zhu, J, Lu, H, Wang, Y & Jin, J 1970, 'Design and analysis of a linear induction motor for a prototype HTS maglev transportation system', 2009 International Conference on Applied Superconductivity and Electromagnetic Devices, 2009 International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD), IEEE, Chengdu, China, pp. 81-84.
View/Download from: Publisher's site
View description>>
This paper investigates the design and analysis of a linear induction motor (LIM) drive for a prototype transportation system, which is levitated by the interaction force between high temperature superconducting (HTS) bulks placed on the ground and permanent magnets (PMs) mounted on the bottom of the vehicle, while the driving force is provided by a linear induction motor system on the side of the prototype vehicle. An equivalent electrical circuit is applied to predict the motor characteristics and the computation results show that the proposed LIM drive system is appropriate for driving the HTS maglev transportation prototype.
Guo, Y, Zhu, J, Dorrell, D, Lu, H, Wang, Y & IEEE 1970, 'Development of a Claw Pole Permanent Magnet Motor with a Molded Low-Density Soft Magnetic Composite Stator Core', 2009 IEEE ENERGY CONVERSION CONGRESS AND EXPOSITION, VOLS 1-6, IEEE Energy Conversion Congress and Exposition, IEEE, San Jose, CA, pp. 703-710.
Guo, Y, Zhu, J, Lu, H, Wang, Y & Jin, J 1970, 'Design and analysis of a permanent magnet motor with SMC core for driving dishwasher pump', 2009 International Conference on Applied Superconductivity and Electromagnetic Devices, 2009 International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD), IEEE, 138, pp. 138-141.
View/Download from: Publisher's site
View description>>
This paper presents the development of a permanent magnet motor with soft magnetic composite (SMC) stator core for driving a dishwasher pump. The unique properties of the SMC, such as 3D magnetic isotropy and molding production technique, have been taken into account in the design. 3D magnetic field finite element analysis is carried out to accurately compute the motor parameters and an equivalent electrical circuit is derived to predict the motor performance. Analysis results show that the developed motor is appropriate.
Hitchens, M & Lister, R 1970, 'A focus group study of student attitudes to lectures', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Wellington, New Zealand, pp. 93-100.
View description>>
This paper reports on the findings from focus groups, conducted at Macquarie University, on the attitudes of computing students to lectures. Students felt that two things were vital for a good lecture: (1) that the lecturer goes beyond what is written in the lecture notes; (2) that the lecture is interactive, by which students meant that the lecturer asks if students understand concepts and adjusts the delivery accordingly, and also the lecturer answers the students' questions. The students in the focus groups also discussed what makes for a bad lectures: (1) lecturers reading straight from slides; (2) lecturers who 'blame the students', by saying that students don't work hard enough and are too lazy to turn up to lectures; and (3) lecturers who cover the material too slowly or too quickly. The most prominent reason given for not attending lectures was the timetabling of lectures in such a way that students had too few classes in one day to make the sojourn to university worthwhile. Any university seeking to improve attendance at lectures should perhaps look as much to improving its timetabling practices as it does to improving the practices of its individual lecturers. © 2009, Australian Computer Society, Inc.
Homayounfard, H & Kennedy, PJ 1970, 'HDAX: Historical symbolic modelling of delay time series in a communications network', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, Australian Computer Society, Melbourne, Australia, pp. 129-137.
View description>>
There are certain performance parameters like packet delay, delay variation (jitter) and loss, which are decision factors for online quality of service (QoS) traffic routing. Although considerable efforts have been placed on the Internet to assure QoS, the dominant TCP/IP - like the best-effort communications policy - does not provide sufficient guarantee without abrupt change in the protocols. Estimation and forecasting end-to-end delay and its variations are essential tasks in network routing management for detecting anomalies. A large amount of research has been done to provide foreknowledge of network anomalies by characterizing and forecasting delay with numerical forecasting methods. However, the methods are time consuming and not efficient for real-time application when dealing with large online datasets. Application is more difficult when the data is missing or not available during online forecasting. Moreover, the time cost in statistical methods for trivial forecasting accuracy is prohibitive. Consequently, many researchers suggest a transition from computing with numbers to the manipulation of perceptions in the form of fuzzy linguistic variables. The current work addresses the issue of defining a delay approximation model for packet switching in communications networks. In particular, we focus on decision-making for smart routing management, which is based on the knowledge provided by data mining (informed) agents. We propose a historical symbolic delay approximation model (HDAX) for delay forecasting. Preliminary experiments with the model show good accuracy in forecasting the delay time-series as well as a reduction in the time cost of the forecasting method. HDAX compares favourably with the competing Autoregressive Moving Average (ARMA) algorithm in terms of execution time and accuracy. © 2009, Australian Computer Society, Inc.
Huang, A, Milne, D, Frank, E & Witten, IH 1970, 'Clustering Documents Using a Wikipedia-Based Concept Representation', ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer Berlin Heidelberg, Bangkok, THAILAND, pp. 628-636.
View/Download from: Publisher's site
Huang, ML, Liang, J & Nguyen, QV 1970, 'A Visualization Approach for Frauds Detection in Financial Market', 2009 13th International Conference Information Visualisation, 2009 13th International Conference Information Visualisation, IV, IEEE, Barcelona, Spain, pp. 197-202.
View/Download from: Publisher's site
View description>>
The traditional solutions to the stock market security are not sufficient in identifying attackers and further attack plans from the analysis of existing events. Therefore, it is difficult for analysts to prevent future unexpected events or frauds by only monitoring the realtime trading information. The event-driven fraud detection in financial market could not help analysts to find attack plans and the further intention of attackers. This paper proposed a new framework of visual analytics for stock market security. The proposed solution consists of two stages: 1) Visual Surveillance of Market Performance, and 2) Behavior-Driven Visual Analysis of Trading Networks. In the first stage, we use a 3D treemap to monitor the realtime stock market performance and to identify a particular stock that produced an unusual trading pattern. We then move to the next stage: social network visualization to conduct behavior-driven visual analysis of suspected pattern. Through the visual analysis of social (or trading) network, analysts may finally identify the attackers (the sources of the fraud), and further attack plans. © 2009 IEEE.
Huo, H, Chen, Q, Wang, G & Peng, D 1970, 'Keyword Search on Streaming XML Fragments', 2009 First International Conference on Information Science and Engineering, 2009 First International Conference on Information Science and Engineering, IEEE.
View/Download from: Publisher's site
I-Hung Khoo, Reddy, HC, Van, L-D & Lin, C-T 1970, '2-D digital filter architectures without global broadcast and some symmetry applications', 2009 IEEE International Symposium on Circuits and Systems, 2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009, IEEE, Taipei, TAIWAN, pp. 952-+.
View/Download from: Publisher's site
Jeng, JJ, McGregor, C & Schiefer, J 1970, 'RTSOAA 2009 Message', 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009 33rd Annual IEEE International Computer Software and Applications Conference, IEEE, p. 18.
View/Download from: Publisher's site
Jin, Z, Chen, X & Zowghi, D 1970, 'Performing Projection in Problem Frames Using Scenarios', APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, Asia-Pacific Software Engineering Conference, IEEE, Batu Ferringhi, Penang, Malaysia, pp. 249-256.
View/Download from: Publisher's site
View description>>
In the Problem Frames (PF) approach there are five basic problem frames and some variants to them. When a problem is being analysed, it is initially matched against these frames. If the problem does not fit into the basic problem frames or their variants, then problem analysis is performed. It has been recognised that ‘projection’ is an effective technique for analysing problems. That is, each sub-problem is considered as a projection of the main problem concerned only with the phenomena relevant to that sub-problem. The PF approach lacks a precise definition of problem projection and does not provide specific instructions on how to perform this projection. In this paper, we use the concept of projection from relational algebra and combine it with concepts from the PF and scenario-based approaches to present a conceptual model for conducting problem projection in requirements engineering. This model and ontology extend problem description at scenario level and support systematic derivation of sub-problems from scenarios. We also provide a detailed process description for performing projection for problem analysis and present the utility of our approach with a case study.
Johnston, A, Candy, L & Edmonds, E 1970, 'Designing for conversational interaction', Proceedings of the International Conference on New Interfaces for Musical Expression, New Interfaces for Musical Expression, Carnegie Mellon University, Pittsburgh, USA, pp. 207-212.
View description>>
In this paper we describe an interaction framework which classifies musicians’ interactions with virtual musical instruments into three modes: instrumental, ornamental and conversational. We argue that conversational interactions are the most difficult to design for, but also the most interesting. To illustrate our approach to designing for conversational interactions we describe the performance work Partial Reflections 3 for two clarinets and interactive software. This software uses simulated physical models to create a virtual sound sculpture which both responds to and produces sounds and visuals.
Juszczyszyn, K & Musiał, K 1970, 'Structural Changes in an Email-Based Social Network', AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 3rd KES International Symposium on Agent and Multi-Agent Systems, Springer Berlin Heidelberg, Uppsala Univ, Uppsala, SWEDEN, pp. 40-49.
View/Download from: Publisher's site
Juszczyszyn, K, Musial, A, Musial, K & Brodka, P 1970, 'Molecular dynamics modelling of the temporal changes in complex networks', 2009 IEEE Congress on Evolutionary Computation, 2009 IEEE Congress on Evolutionary Computation (CEC), IEEE, Trondheim, NORWAY, pp. 553-+.
View/Download from: Publisher's site
Jutao, H, Qingkui, C, Huan, H & JingJing, Z 1970, 'An Adaptive Load Balanced on Demand Routing Protocol', 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), IEEE.
View/Download from: Publisher's site
Kamaleswaran, R, McGregor, C & Percival, J 1970, 'Service oriented architecture for the integration of clinical and physiological data for real-time event stream processing', 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Minneapolis, MN, pp. 1667-+.
View/Download from: Publisher's site
Karimi, F & Chiang Choon Poo, D 1970, 'Personal and external determinants of medical bloggers' knowledge sharing behavior', Proceedings of the American Society for Information Science and Technology, Wiley, pp. 1-23.
View/Download from: Publisher's site
View description>>
AbstractThis paper investigates the factors affecting medical bloggers' knowledge sharing behavior from both personal and external aspects. We develop a model based on the social cognitive theory and augment it with the social capital theory. The model is empirically examined based on the survey data collected from 75 bloggers writing on medical issues, and evaluated with confirmatory factor analysis and structural equation modeling. Among the personal factors, we examined outcome expectations including reputation and enjoyment in helping others. Encouragement by others, identification and interaction ties were investigated as external factors. Enjoyment in helping others and reputation were found to have significant direct affect on medical bloggers' knowledge sharing behavior, while encouragement by others, identification, and interaction ties showed no significant direct affect. However, encouragement by others exhibited significant impact on reputation and enjoyment in helping others. The implications for theory and practice, and future possible research are discussed.
Kazienko, P, Musiał, K & Zgrzywa, A 1970, 'Evaluation of node position based on email communication', Control and Cybernetics, Conference on Data Processing Technologies, POLISH ACAD SCIENCES SYSTEMS RESEARCH INST, Poznan, POLAND, pp. 67-86.
View description>>
Rapid development of various kinds of social networks within the Internet enabled investigation of their properties and analyzing their structure. An interesting scientific problem in this domain is the assessment of the node position within the directed, weighted graph that represents the social network of email users. The new method of node position analysis, which takes into account both the node positions of the neighbors and the strength of connections between network nodes, is presented in the paper. The node position can be used to discover key network users, who are the most important in the population and who have potentially the greatest influence on others. The experiments carried out on two datasets enabled studying the main properties of the new measure.
Kennard, R, Edmonds, E & Leaney, J 1970, 'Separation anxiety: Stresses of developing a modern day separable User Interface', 2009 2nd Conference on Human System Interactions, 2009 2nd Conference on Human System Interactions (HSI), IEEE, Catania, Italy, pp. 228-235.
View/Download from: Publisher's site
View description>>
The evolution of user interface (UI) tools has generally regarded the UI as separable from the underlying application it represents. This viewpoint leaves the UI having to restate invariants already specified in other subsystems of an application, and any discrepancy between the versions in the UI and those in the subsystems leads to errors. This paper explores a sample of real world subsystems in use by enterprise applications today, and underscores the problem of duplication between them and the UI. It then surveys the prevalence of this issue within mainstream software development.
Kennard, R, Edmonds, E, Leaney, J & IEEE 1970, 'Separation Anxiety: stresses of developing a modern day Separable User Interface', HSI: 2009 2ND CONFERENCE ON HUMAN SYSTEM INTERACTIONS, 2nd Conference on Human System Interactions, IEEE, Catania, ITALY, pp. 225-232.
Kennedy, PJ, Ong, K & Christen, P 1970, 'Data Mining and Analytics', Data Mining and Analytics 2009 (AusDM'09), Australian Data Mining Conference, Australian Computer Society, Melbourne, Australia, pp. 1-218.
Kennedy, PJ, Ong, KL & Christen, P 1970, 'Preface', Conferences in Research and Practice in Information Technology Series.
Khan, A, Saqib, M & Kaleem, Z 1970, 'Functional unit level parallelism in RISC architecture', Proceedings of the 7th International Conference on Frontiers of Information Technology, FIT '09: 7th International Conference on Frontiers of Information Technology, ACM.
View/Download from: Publisher's site
View description>>
This paper presents the design and implementation of RISC processor having five stages pipelined architecture. Functional unit parallelism is exploited through the implementation of pipelining in five stages of RISC processor. The hazards which come to life due to parallelism are data, structural, and control hazards .In order to achieve the true benefits of the parallelism through pipelining; these hazards must be properly handled. The data hazards are solved using bypassing in which we forward the required value of the operand to the succeeding instruction. Structural hazards are solved by implementing three port register file so that two operand reading and one register writing can be performed in parallel without degrading the performance. Control hazards arise from Branch, Jump and Call instructions. To solve these problems, we insert automated NOP in stage2, stage3 and stage4. The processor designed is a fully functional processor which can execute any program including jump statements, switch statements, loops and subroutines which are the basic ingredients of any computer program. Copyright 2009 ACM.
Kraaijenbrink, E, van Gils, F, Cheng, Q, van Herk, R & van den Hoven, E 1970, 'Balancing Skills to Optimize Fun in Interactive Board Games', HUMAN-COMPUTER INTERACTION - INTERACT 2009, PT I, Interact '09, Springer-Verlag, Uppsala, Sweden, pp. 301-313.
View/Download from: Publisher's site
View description>>
Playing games against people with a different skill level can be boring or frustrating, which decreases fun. A solution is to introduce specific rules that balance a game. In this paper we describe a study in which we used an electronic board game with tangible interaction to investigate whether balancing a game indeed increases fun experienced. We also investigate whether balancing skill levels implicitly (players are unaware) or explicitly (players are aware) has an influence on the fun experienced. We found that players who lost a game felt more successful in the balanced game compared to the unbalanced game. The balanced game also offered the players more fun experience than they expected beforehand. Finally, players preferred to play an explicitly balanced game because it increased the feeling of effort and challenge.
Li, K, Zhou, W, Yu, S & Dai, B 1970, 'Effective DDoS Attacks Detection Using Generalized Entropy Metric', ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 9th International Conference on Algorithms and Architectures for Parallel Processing, Springer Berlin Heidelberg, Natl Taiwan Univ Sci & Technol, Taipei, TAIWAN, pp. 266-280.
View/Download from: Publisher's site
Lin, C-T, Ko, L-W, Chang, C-J, Wang, Y-T, Chung, C-H, Yang, F-S, Duann, J-R, Jung, T-P & Chiou, J-C 1970, 'Wearable and Wireless Brain-Computer Interface and Its Applications', FOUNDATIONS OF AUGMENTED COGNITION, PROCEEDINGS, 5th International Conference on Foundation of Augmented Cognition, Springer Berlin Heidelberg, San Diego, CA, pp. 741-748.
View/Download from: Publisher's site
Lister, R & Box, I 1970, 'A citation analysis of the ICER 2005-07 proceedings', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Wellington, New Zealand, pp. 119-128.
View description>>
This paper identifies the most commonly cited conferences, journals and books of the 43 papers within the first three ICER proceedings. A large array of conferences, journals, and books were cited. However, only a small set of journals and conferences were cited frequently, and the majority were only cited within a single paper, which is consistent with a power law distribution, as predicted by Zipf's Law. The most commonly cited books are concerned with education in general (29%) or psychology (20%), while 17% of books are concerned with computer science education and 12% with computing content. The citation results for ICER are contrasted with earlier published citation analyses of SIGCSE 2007 and ACE2005-07. © 2009, Australian Computer Society, Inc.
Lister, R, Fidge, C & Teague, D 1970, 'Further evidence of a relationship between explaining, tracing and writing skills in introductory programming', Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education, ITiCSE '09: Annual Conference on Innovation and Technology in Computer Science Education, ACM, Paris, France, pp. 161-165.
View/Download from: Publisher's site
View description>>
ABSTRACT: This paper reports on a replication of earlier studies into a possible hierarchy of programming skills. In this study, the students from whom data was collected were at a university that had not provided data for earlier studies. Also, the students were taught the programming language "Python", which had not been used in earlier studies. Thus this study serves as a test of whether the findings in the earlier studies were specific to certain institutions, student cohorts, and programming languages. Also, we used a non-parametric approach to the analysis, rather than the linear approach of earlier studies. Our results are consistent with the earlier studies. We found that students who cannot trace code usually cannot explain code, and also that students who tend to perform reasonably well at code writing tasks have also usually acquired the ability to both trace code and explain code.
Litchfield, A, Raban, R, Dyson, LE, Leigh, E, Tyler, J & IEEE 1970, 'Using Students' Devices and a No-To-Low Cost Online Tool to Support Interactive Experiential mLearning', ICALT: 2009 IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, IEEE International Conference on Advanced Learning Technologies, IEEE Computer Society, Riga latvia, pp. 674-678.
View/Download from: Publisher's site
View description>>
The rapid evolution and ubiquitous use of mobile devices is an historical opportunity to improve experiential interactivity in education practices to support deep learning. A major barrier to the widespread adoption of mLearning in higher education is that of cost. Usage charges and the cost of mobile hardware are key issues. Opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. The paper introduces mInteract, a system which uses packet technology (mobile WAP/WML) to build no-to-low cost interactivity into learning spaces. The online tool supports active experiential learning transactions for both student and teacher. In 2008 mInteract was trialled in a subject with large numbers. Focus group feedback is presented that indicates high levels of engagement with both users and non-users of the tool.
Low, G, Beydoun, G, Henderson-Sellers, B & Gonzalez-Perez, C 1970, 'Towards Method Engineering for Multi-Agent Systems: A Validation of a Generic MAS Metamodel', AGENT COMPUTING AND MULTI-AGENT SYSTEMS, Pacific Rim International Workshop on Multi-Agents, Springer-Verlag, Bangkok, pp. 255-267.
View description>>
It is a widely accepted premise that no single methodology can be suitable for all Multi-Agent System (MAS) software projects. This premise is playing a significant role in the appearance of new methodologies at an increasing pace. To effectively harness the software engineering knowledge of methodologies, method engineering is an appealing approach. It focuses on project-specific methodology construction from existing method fragments and it requires a generic product-focussed metamodel to serve as a representational infrastructure to unify existingmethodologies into a single specification.As part of its ongoing validation towards method engineering forMAS development,we present our generic metamodel and illustrate in this paper its wide applicability with respect to 10 methodologies extant agent-oriented. This validation provides further evidence to support the use of our metamodel towards the construction of situated MAS methodologies.
Lu, H & Nguyen, TTS 1970, 'Experimental Investigation of PSO Based Web User Session Clustering', 2009 International Conference of Soft Computing and Pattern Recognition, 2009 International Conference of Soft Computing and Pattern Recognition, IEEE, Malacca, Malaysia, pp. 647-652.
View/Download from: Publisher's site
View description>>
Web user session clustering is very important in web usage mining for web personalization. This paper proposes a Particle Swarm Optimization (PSO) based sequence clustering approach and presents an experimentally investigation of the PSO based sequence clustering methods, which use three original PSO variants and their corresponding variants of a hybrid PSO with real value mutation. The investigation was conducted in 45 test cases using five web user session datasets extracted from a real world web site. The experimental results of these methods are compared with the results obtained from the traditional k-means clustering method. Some interesting observations have been made. In the most of test cases under consideration, the PSO and PSO-RVM methods have better performance than the k-means method. Furthermore, the PSO-RVM methods show better performance than the corresponding PSO methods in the cases in which the similarity measure function is more complex. © 2009 IEEE.
Lu, J, Shambour, Q & Zhang, G 1970, 'Recommendation technique-based government-to-business personalized e-services', NAFIPS 2009 - 2009 Annual Meeting of the North American Fuzzy Information Processing Society, NAFIPS 2009 - 2009 Annual Meeting of the North American Fuzzy Information Processing Society, IEEE, Cincinnati, Ohio, USA, pp. 1-6.
View/Download from: Publisher's site
View description>>
One of the new directions in current e-government development is to provide personalized online services to citizens and businesses. Recommendation techniques can bring a possible solution for this issue. This study proposes a hybrid recommendation approach to provide personalized government to business (G2B) e-services. The approach integrates fuzzy setsbased semantic similarity and traditional item-based collaborative filtering methods to improve recommendation accuracy. A recommender system named Intelligent Business Partner Locator (IBPL) is designed to apply the proposed recommendation approach for supporting government agencies to recommend business partners.
Lu, N, Lu, J & Zhang, G 1970, 'An Integrated Knowledge Adaption Framework for Case-Based Reasoning Systems', KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II, PROCEEDINGS, International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer, Santiago, Chile, pp. 372-379.
View/Download from: Publisher's site
View description>>
The development of effective knowledge adaption techniques is one of the promising solutions to improve the performance of case-based reasoning (CBR) systems. Case-base maintenance becomes a powerful method to refine knowledge in CBR systems. This paper proposes an integrated knowledge adaption framework for CBR systems which contains a meta database component and a maintenance strategies component. The meta database component can help track changes of interested concepts and therefore enable a CBR system to signal a need for maintenance or to invoke adaption on its own. The maintenance strategies component can perform cross-container maintenance operations in a CBR system. This paper also illustrates how the proposed integrated knowledge adaption framework assists decision makers to build dynamic prediction and decision capabilities. © 2009 Springer Berlin Heidelberg.
Lu, N, Lu, J & Zhang, G 1970, 'Maintaining Footprint-Based Retrieval for Case Deletion', NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, International Conference on Neural Information Processing, Springer, Bangkok, Thailand, pp. 318-325.
View/Download from: Publisher's site
View description>>
The effectiveness and efficiency of case-based reasoning (CBR) systems depend largely on the success of case-based retrieval. The case-base maintenance (CBM) issues become imperative and important especially for modern societies. This paper proposes a new competence model and a new maintenance procedure for the proposed competence model. Based on the proposed competence maintenance procedure, footprint-based retrieval (FBR), a competence-based case base retrieval method, is able to preserve its own retrieval effectiveness and efficiency. © 2009 Springer-Verlag Berlin Heidelberg.
Ma, J, Zhang, G, Lu, J & Ruan, D 1970, 'Impute Missing Assessments by Opinion Clustering in Multi-Criteria Group Decision Making Problems', PROCEEDINGS OF THE JOINT 2009 INTERNATIONAL FUZZY SYSTEMS ASSOCIATION WORLD CONGRESS AND 2009 EUROPEAN SOCIETY OF FUZZY LOGIC AND TECHNOLOGY CONFERENCE, IFSA World Congress, IFSA/EUSFLAT, Lisbon, Portugal, pp. 555-560.
View description>>
Multi-criteria group decision-making and evaluation (MCGDME) method typically aggregates information in evaluation tables. For various reasons, evaluation tables (decision matrix) often include missing data that highly affect correct decision-making and evaluation. Most existing imputation methods of missing data are based on statistical features which do not exist in an MCGDME setting. This paper proposes an imputation method of missing data (IMD) in evaluation tables. The IMD method measures the similarity betweent two evaluators' mental models. Evaluators are then classed into several groups based on their similarities by using fuzzy clustering methods. Finally, missing data are imputated under the assumption that the imputated value of missing data does not change the previous clustering results. The proposed IMD method is implemented and tested in two numerical experiments.
MacDougall, C, Percival, J & McGregor, C 1970, 'Integrating health information technology into clinical guidelines', 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Minneapolis, MN, pp. 4646-+.
View/Download from: Publisher's site
Mairiza, D, Zowghi, D & Nurmuliani, N 1970, 'Managing conflicts among non-functional requirements', 12th Australian Workshop on Requirements Engineering, Australian Workshop on Requirements Engineering, University of Technology, Sydney, Sydney, Australia, pp. 11-19.
View description>>
Abstractâ Non-functional requirements (NFRs) tend to interfere, conflict, and contradict with one other. Unlike functional requirements, this inevitable conflict arises as a result of inherent contradiction among various types of NFRs. A number of techniques to deal with this conflict have been developed. Majority of them focus on categorizing, documenting, or listing the potential conflicts among NFRs. Several models that represent the positive or negative relationships among NFRs have also been published in literature. However, the interpretation of NFRs may vary depending on numerous factors, such as the context of the system being developed and stakeholder involvement. Consequently, the relationships among them are not always obvious. This paper investigates the gaps in the existing research literature about the conflicts among NFRs and proposes a framework to manage this type of conflict.
McGregor, C & Smith, KP 1970, 'A Survey of Physiological Monitoring Data Models to Support the Service of Critical Care', 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009 33rd Annual IEEE International Computer Software and Applications Conference, IEEE, pp. 104-109.
View/Download from: Publisher's site
View description>>
Vast quantities of data is created by utilizing sensors to gather information from patients located in intensive care units worldwide through physiological monitoring. The service oriented architectural model has emerged as a mechanism to support data interchange in a structured way to support the provision of services. The nature of critical care is such that clinicians provide a service of care, often to patients that are not located within their intensive care unit, and prior to the arrangement of transport to their unit. As a result opportunities exist to utilize the service oriented approach to provide a service of critical care. This research presents a survey of how recent computing and IT research as applied to physiological collection, transmission and storage of physiological data utilizes the service of critical care concept based on a service oriented architecture approach. © 2009 IEEE.
McGregor, C & Smith, KP 1970, 'A Survey of Physiological Monitoring Data Models to support the Service of Critical Care', 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, IEEE 33rd International Computer Software and Applications Conference, IEEE, Seattle, WA, pp. 777-782.
McGregor, C, Smith, KP & Eklund, JM 1970, 'A Survey of Recent Physiological Monitoring and transmission to support the Service of Critical Care', 2009 22ND IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 22nd IEEE International Symposium on Computer-Based Medical Systems, IEEE, Albuquerque, NM, pp. 363-369.
McGregor, C, Smith, KP & Eklund, JM 1970, 'A survey of recent physiological monitoring and transmission to support the service of critical care', 2009 22nd IEEE International Symposium on Computer-Based Medical Systems, 2009 22nd IEEE International Symposium on Computer-Based Medical Systems (CBMS), IEEE.
View/Download from: Publisher's site
View description>>
Vast quantities of data is sensed from patients located in intensive care units worldwide through physiological monitoring. In recent times the service oriented architectural model has emerged as a mechanism to providing a structured computing approach to support the provision of services. The nature of critical care is such that clinicians provide a service of care, often to patients that are not located within their intensive care unit. As a result opportunities exist to utilize the service oriented approach to provide a service of critical care. This research presents a survey of recent computing research as applied to physiological collection and transmission to support intelligent patient monitoring using the service of critical care concept based on a service oriented architecture approach. ©2009 IEEE.
Mehboob, Z & Zowghi, D 1970, 'Industrial perspectives on architecture level change impact analysis in Web systems evolution', 2009 11th IEEE International Symposium on Web Systems Evolution, 2009 11th IEEE International Symposium on Web Systems Evolution (WSE), IEEE, Edmonton, Alberta, Canada, pp. 17-26.
View/Download from: Publisher's site
View description>>
Change impact analysis (CIA) approaches are mostly developed based on the understanding of both system development process and system architecture. It is thus reasonable to assume that if the development process or system architecture is fundamentally different, then CIA approaches must address these differences accordingly. This is particularly relevant in the context of Web systems, given that these systems often have a specific set of characteristics related to differences both in the architecture and the process through which they are developed. To investigate this issue we have interviewed web designers/architects and reported the industrial perspectives on using current architecture CIA approaches. The interview findings reveal a set of elicited needs that an architecture CIA approach should address to be suitably adopted during Web systems evolution. Additionally, systematic classification of these needs indicates the focus areas and their relevance in Web systems. Finally, the study findings provide guidance for the possible extension of architecture CIA approaches specifically for Web systems.
Mehboob, Z, Zowghi, D & Lowe, D 1970, 'An Approach for Comparison of Architecture Level Change Impact Analysis Methods and their relevance in Web Systems Evolution', ASWEC 2009: 20TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, Australian Software Engineering Conference, IEEE Computer Society Press, Gold Coast, Australia, pp. 162-172.
View/Download from: Publisher's site
View description>>
Change impact analysis (CIA) methods have been developed to identify the consequences of making changes to system artifacts and to support decision making with regards to that change. There is a growing body of research on CIA methods that specifically addresses changes and their impacts at a system architecture level. Most of the methods have been developed and validated on software system domain. However, there is little research consensus on: (i) the features that architectural CIA methods should comprehensively address; and (ii) which existing methods are comparatively suitable in a particular system domain such as Web systems. This paper presents a comparison approache that offer guidance on the selection of the most appropriate method for CIA activity and suitability of these methods in the context of Web systems.
Merigo, JM 1970, 'On the Use of the OWA Operator in the Weighted Average and its Application in Decision Making', WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, World Congress on Engineering 2009, INT ASSOC ENGINEERS-IAENG, Imperial Coll London, London, ENGLAND, pp. 82-87.
MERIGÓ, JM 1970, 'INDUCED GENERALIZED AGGREGATION OPERATORS IN THE WEIGHTED AVERAGE', Intelligent Decision Making Systems, Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering, WORLD SCIENTIFIC, Hasselt Univ, Hasselt, BELGIUM, pp. 625-+.
View/Download from: Publisher's site
MERIGÓ, JM 1970, 'ON THE UNIFICATION BETWEEN THE PROBABILITY, THE WEIGHTED AVERAGE AND THE OWA OPERATOR', Intelligent Decision Making Systems, Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering, WORLD SCIENTIFIC, Hasselt Univ, Hasselt, BELGIUM, pp. 375-+.
View/Download from: Publisher's site
Merigó, JM 1970, 'Probabilistic decision making with the OWA operator and its application in investment management', 2009 International Fuzzy Systems Association World Congress and 2009 European Society for Fuzzy Logic and Technology Conference, IFSA-EUSFLAT 2009 - Proceedings, Joint World Congress of International-Fuzzy-Systems-Association (IFSA)/European Conference of European-Society-for-Fuzzy-Logic-and-Technology (EUSFLAT), EUROPEAN SOC FUZZY LOGIC & TECHNOLOGY, Lisbon, PORTUGAL, pp. 1364-1369.
View description>>
We develop a new model for decision making under risk environment and under uncertainty. We introduce a new aggregation operator that unifies the probabilities and the ordered weighted averaging (OWA) operator in the same formulation. We call it the probabilistic ordered weighted averaging (POWA) operator. This aggregation operator provides a more complete representation of the decision problem because it is able to consider probabilistic information and the attitudinal character of the decision maker. We study different properties and families of the POWA operator. We also develop an illustrative example of the new approach in a decision making problem about selection of investments.
Merigó, JM 1970, 'The Fuzzy Probabilistic Weighted Averaging Operator and its Application in Decision Making', 2009 Ninth International Conference on Intelligent Systems Design and Applications, 2009 Ninth International Conference on Intelligent Systems Design and Applications, IEEE, Univ Pisa, Pisa, ITALY, pp. 485-490.
View/Download from: Publisher's site
MERIGÓ, JM & CASANOVAS, M 1970, 'USING DISTANCE MEASURES IN HEAVY AGGREGATION OPERATORS', Intelligent Decision Making Systems, Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering, WORLD SCIENTIFIC, Hasselt Univ, Hasselt, BELGIUM, pp. 589-594.
View/Download from: Publisher's site
Merigo, JM & Gil-Lafuente, AM 1970, 'An Overview of Fuzzy Research in the ISI Web of Knowledge', WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, World Congress on Engineering 2009, INT ASSOC ENGINEERS-IAENG, Imperial Coll London, London, ENGLAND, pp. 43-48.
Merigó, JM & Gil-Lafuente, AM 1970, 'Some Basic Results of Fuzzy Research in the ISI Web of Knowledge', 2009 Ninth International Conference on Intelligent Systems Design and Applications, 2009 Ninth International Conference on Intelligent Systems Design and Applications, IEEE, Univ Pisa, Pisa, ITALY, pp. 1215-1220.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 1970, 'The fuzzy induced generalized OWA operator and its application in business decision making', 2009 International Fuzzy Systems Association World Congress and 2009 European Society for Fuzzy Logic and Technology Conference, IFSA-EUSFLAT 2009 - Proceedings, Joint World Congress of International-Fuzzy-Systems-Association (IFSA)/European Conference of European-Society-for-Fuzzy-Logic-and-Technology (EUSFLAT), EUROPEAN SOC FUZZY LOGIC & TECHNOLOGY, Lisbon, PORTUGAL, pp. 1661-1666.
View description>>
We present the fuzzy induced generalized OWA (FIGOWA) operator. It is an aggregation operator that uses the main characteristics of the fuzzy OWA (FOWA) operator, the induced OWA (IOWA) operator and the generalized OWA (GOWA) operator. Therefore, it uses uncertain information represented in the form of fuzzy numbers, generalized means and order inducing variables. The main advantage of this operator is that it includes a wide range of mean operators in the same formulation such as the FOWA, the IOWA, the GOWA, the induced GOWA, the fuzzy IOWA, the fuzzy generalized mean, etc. We study some of its main properties. A further generalization by using quasi-arithmetic means is also presented. This operator is called Quasi-FIOWA operator. We also develop an application of the new approach in a strategic decision making problem.
Merigo, JM, Gil-Lafuente, AM & Gil-Aluja, J 1970, 'Induced Aggregation Operators in the Generalized Adequacy Coefficient', WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, World Congress on Engineering 2009, INT ASSOC ENGINEERS-IAENG, Imperial Coll London, London, ENGLAND, pp. 7-11.
Merigó, JM, Gil-Lafuente, AM & Martorell, O 1970, 'On the Use of the Uncertain Induced OWA Operator and the Uncertain Weighted Average and its Application in Tourism Management', 2009 Ninth International Conference on Intelligent Systems Design and Applications, 2009 Ninth International Conference on Intelligent Systems Design and Applications, IEEE, Univ Pisa, Pisa, ITALY, pp. 856-+.
View/Download from: Publisher's site
Miliszewska, I & Sztendur, EM 1970, 'Girls from low socio-economic backgrounds: Factors influencing their interest in ICT study and career', 15th Americas Conference on Information Systems 2009, AMCIS 2009, pp. 3335-3347.
View description>>
The under-representation of women in information and communication technology (ICT) fields of study and occupations has attracted considerable attention of researchers in higher education. This paper discusses findings of a preliminary investigation aimed to investigate further study and career preferences of female students in one of Melbourne's all-female secondary schools and determine factors that might influence their decisions. The investigation focused on female students from schools in the Western suburbs of Melbourne, Australia, home to families with low socio-economic status and students exposed to 'educational disadvantage'. © (2009) by the AIS/ICIS Administrative Office All rights reserved.
Mohamed Mowjoon, D, Agbinya, JI & Chaczko, ZC 1970, 'Replicating Cytokines in Modelling Signal Exchange between Nodes in Wireless Mesh Networks', The International MultiConference of Engineers and Computer Scientists 2009, IAENG International Conference on Communication Systems and Applications, Newswood Limited, International Association of Engineers, Regal Kowloon Hotel, Kowloon, Hong Kong, pp. 315-318.
View description>>
In recent years wireless mesh network (WMN) technologies and their applications have been actively researched and developed as the promising solution for future wireless mobile networks. Conversely security of WMN is often a secondary reflection in development. In our previous work we proposed Artificial Immune System model to employ in secure routing in WMN. This paper proposes an emerging perception to model danger signal exchange between nodes in WMN by emulating the function of Cytokines in Human Immune System (HIS).
Musial, K & Juszczyszyn, K 1970, 'Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social Network', 2009 First Asian Conference on Intelligent Information and Database Systems, 2009 First Asian Conference on Intelligent Information and Database Systems, ACIIDS, IEEE, Dong Hoi, VIETNAM, pp. 34-39.
View/Download from: Publisher's site
Musiał, K & Juszczyszyn, K 1970, 'Properties of Bridge Nodes in Social Networks', COMPUTATIONAL COLLECTIVE INTELLIGENCE: SEMANTIC WEB, SOCIAL NETWORKS AND MULTIAGENT SYSTEMS, 1st International Conference on Computational Collective Intelligence, Springer Berlin Heidelberg, Wroclaw, POLAND, pp. 357-364.
View/Download from: Publisher's site
Musial, K, Juszczyszyn, K, Gabrys, B & Kazienko, P 1970, 'Patterns of Interactions in Complex Social Networks Based on Coloured Motifs Analysis', ADVANCES IN NEURO-INFORMATION PROCESSING, PT II, 15th International Conference on Neuro-Information Processing, Springer Berlin Heidelberg, Auckland, NEW ZEALAND, pp. 607-614.
View/Download from: Publisher's site
Musiał, K, Kazienko, P & Bródka, P 1970, 'User position measures in social networks', Proceedings of the 3rd Workshop on Social Network Mining and Analysis, KDD09: The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM.
View/Download from: Publisher's site
View description>>
Network analysis offers many centrality measures that are successfully utilized in the process of investigating the social network profile. The most important and representative measures are presented in the paper. It includes indegree centrality, proximity prestige, rank prestige, node position, outdegree centrality, eccentrality, closeness centrality, and betweenes centrality. Both feature analysis and experimental comparative studies revealed the general profile of selected measures.
Nadimi, V, Azadeh, A, Saberi, M, Fattahi, S, Danesh, B & Tajvidi, A 1970, 'An artificial neural network algorithm and time series for improved forecasting of oil estimation: A case study of south korea and united kingdom (2001-2008)', 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. 739-744.
View/Download from: Publisher's site
View description>>
This paper presents an Artificial Neural Network (ANN) algorithm to improve oil production forecasting. ANN algorithm is developed by different data preprocessing methods and considering different training algorithms and transfer functions in ANN models. Bayesian regularization backpropagation (BR), Levenberg-Marquardt back propagation (LM) and Gradient descent with momentum and adaptive learning rate backpropagation (GDX) are used as training algorithms. Also, log sigmoid and Hyperbolic tangent sigmoid are used as transfer functions. 240 ANN in 6 groups are examined with one to forthy neuron in hidden layer. The efficiency of constructed ANN models is examined in South Korea via mean absolute percentage error (MAPE). One of feature of the proposed algorithm is utilization of Autocorrelation Function (ACF) to define input variables whereas conventional methods use trial and error method. Monthly oil production in South Korea January 2001 to July 2008 is considered as the case of this study. ©2009 IEEE.
Petrelli, D, van den Hoven, E & Whittaker, S 1970, 'Making History: Intentional Capture of Future Memories', CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, CHI 2009 - Digital Life New World, ACM, Boston, USA, pp. 1723-1732.
View/Download from: Publisher's site
View description>>
'Lifelogging' technology makes it possible to amass digital data about every aspect of our everyday lives. Instead of focusing on such technical possibilities, here we investigate the way people compose long-term mnemonic representations of their lives. We asked 10 families to create a time capsule, a collection of objects used to trigger remembering in the distant future. Our results show that contrary to the lifelogging view, people are less interested in exhaustively digitally recording their past than in reconstructing it from carefully selected cues that are often physical objects. Time capsules were highly expressive and personal, many objects were made explicitly for inclusion, however with little object annotation. We use these findings to propose principles for designing technology that supports the active reconstruction of our future past.
Pileggi, SF 1970, 'A multi-domain framework for Wireless Vehicular Sensor Network', 2009 International Conference on Ultra Modern Telecommunications & Workshops, Workshops (ICUMT), IEEE.
View/Download from: Publisher's site
View description>>
Proposed solution is an extendible multi-domain core framework for Wireless Vehicular Sensor Network (WVSN). The key idea is providing a lightweight architecture as alternative to the typical vertical concept of domain specific ad-hoc solution: the more flexible horizontal approach assumes a core framework that can be particularized in function of considered application. Modern wireless sensor platforms are flexible smart nodes that provide relatively limited computation, storage, communication and sensing resource, ad-hoc designed for advanced networking. WVSN assumes nodes mounted on vehicles. Because limited resource that commonly characterizes WSN, protocols stacks and mechanisms are designed in accordance with a soft-state model in order to assure high-performance and robustness for time-critical messages in both vehicle-to-vehicle and vehicle-to-roadside interaction. ©2009 IEEE.
Pileggi, SF, Molina, B, Palau, CE & Esteve, M 1970, 'Move for all (M4All): Alive J2ME content exchange facility for mobile environments', 2009 IEEE International Conference on Multimedia and Expo, 2009 IEEE International Conference on Multimedia and Expo (ICME), IEEE, pp. 1780-1783.
View/Download from: Publisher's site
View description>>
Context-aware and live multimedia content production and delivery can be considered as key issues for enabling dynamic sharing among members of living social networks. The proposed cross-platform environment, deployed on J2ME technology, enables mobile users with a suitable tool for content production, dynamic context and metadata integration and content publication directly from smart devices. Multimedia content is provided with an extensible semantic and functional data model that makes shared content easily to be catalogued, classified and managed within large scale communities. Moreover, an advanced context management model provides users with multiple options for effective content publication. Support for live streaming and potential interaction with multiple social communities makes the platform really flexible within different domains and application fields. ©2009 IEEE.
Qumer, A & Henderson-Sellers, B 1970, 'Agile Software Solution Framework: An Analysis of Practitioners' Perspectives', INFORMATION SYSTEMS: MODELING, DEVELOPMENT, AND INTEGRATION, Information Systems: Modeling, Development, and Integration, Springer-Verlag, Campbelltown, NSW, pp. 41-52.
View/Download from: Publisher's site
View description>>
We have developed an agile software solution framework (ASSF) to create and tailor situation-specific agile methods by using a method engineering approach. Here, we report on a questionnaire-based survey with thirty-three experts in order to determine the relevance and importance of the aspects or elements of agile software development methodology specified in ASSF. We have analysed the relevance and importance that each respondent places on the identified elements of the ASSF. © 2009 Springer Berlin Heidelberg.
Sood, SC, Kattiyapornpong, U, Miller, K & Woodside, A 1970, 'Assessing perceived destination image and brand equity through web 2.0', Travel and Tourism Research Association Conference Proceedings, 40th Travel and Tourism Research Association Conference, Travel and Tourism Research Association, Honolulu, Hawaii.
Tajvidi, A, Azadeh, A, Saberi, M, Izadbakhsh, H, Danesh, B & Gitiforouz, A 1970, 'An Integrated Simulated-Based Fuzzy Regression Algorithm and Time Series for Energy Consumption Estimation with Non-Stationary Data and case studies', 2009 3RD IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 3rd IEEE International Conference on Digital Ecosystems and Technologies, IEEE, TURKEY, Istanbul, pp. 670-+.
Tajvidi, A, Azadeh, A, Saberi, M, Izadbakhsh, H, Danesh, B & Gitiforouz, A 1970, 'An integrated simulated-based fuzzy regression algorithm and time series for energy consumption estimation with non-stationary data and case studies', 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. 139-143.
View/Download from: Publisher's site
View description>>
This study presents an integrated fuzzy regression, computer simulation and time series framework to estimate and predict electricity demand for seasonal and monthly changes in electricity consumption especially in developing countries such as China and Iran with non-stationary data. Furthermore, it is difficult to model uncertain behavior of energy consumption with only conventional fuzzy regression or time series and the integrated algorithm could be an ideal substitute for such cases. After reviewing various fuzzy regression models and studying their advantages and shortcomings, the preferred model is selected for estimation by the proposed algorithm. Computer simulation is developed to generate random variables for monthly electricity consumption. Truly, fuzzy regression is run with Computer simulation output too. Preferred Time series model is selected from linear or nonlinear models. For this, after selecting preferred ARIMA model, Mcleod-Li test is applied to determine nonlinearity condition. When, nonlinearity condition is satisfied, the preferred nonlinear model is selected and defined as preferred time series model. At last, preferred model from fuzzy regression and time series model is selected by Granger-Newbold. Also, the impact of data preprocessing and post processing on the fuzzy regression performance is considered by the proposed algorithm. In addition, another unique feature of the proposed algorithm is utilization of Autocorrelation Function (ACF) to define input variables whereas conventional methods use trial and error method. Monthly electricity consumption of Iran from March 1994 to February 2005 is considered as the case of this study. The MAPE estimation of Genetic Algorithm (GA), Artificial Neural Network (ANN) versus the proposed algorithm shows the appropriateness of the proposed algorithm. ©2009 IEEE.
Tavoukjian, A & Johnston, AJ 1970, 'Neural Networks and Evolutionary Algorithms in Music Composition', Proceedings of the Australasian Computer Music Conference, Australasian Computer Music Conference, Australasian Computer Music Association, Queensland University of Technology, Brisbane, Australia, pp. 72-78.
View description>>
In this paper we describe a system developed to generate short musical phrases in the same style as a set of training melodies. The system uses an ensemble of neural networks to rate the similarity of a generated musical phrase to a set of human composed phrases. Given this rating a genetic algorithm is used to effectively 'search' for other similar phrases. Preliminary evaluations indicate that the proposed approach shows promise. A limitation of the system is the relatively simple representation of musical phrases employed and the processing time required to use this technique on longer phrases.
Venables, A, Tan, G & Lister, R 1970, 'A closer look at tracing, explaining and code writing skills in the novice programmer', Proceedings of the fifth international workshop on Computing education research workshop, ICER '09: International Computing Education Research Workshop, ACM, Berkeley, CA, USA, pp. 117-128.
View/Download from: Publisher's site
View description>>
Abstract: The way in which novice programmers learn to write code is of considerable interest to computing education researchers. One research approach to understanding how beginners acquire their programming abilities has been to look at student performance in exams. Lopez et al. (2008) analyzed student responses to an end-of-first-semester exam. They found two types of questions accounted for 46% of the variance on the code writing portion of the same exam. One of those types of question required students to trace iterative code, while the other type required students to explain what a piece of code did. In this paper, we investigate whether the results by Lopez et al. may be generally indicative of something about novice programmers, or whether their results are just an artifact of their particular exam. We studied student responses to our own exam and our results are broadly consistent with Lopez et al. However, we did find that some aspects of their model are sensitive to the particular exam questions used. Specifically, we found that student performance on explaining code was hard to characterize, and the strength of the relationship between explaining and code writing is particularly sensitive to the specific questions asked. Additionally, we found Lopez et al.'s use of a Rasch model to be unnecessary, which will make it far easier for others to conduct similar research.
Wee, H-M, Lu, J, Zhang, G, Chiao, H-E & Gao, Y 1970, 'A Decision Making Model for Vendor-Buyer Inventory Systems', ROUGH SETS, FUZZY SETS, DATA MINING AND GRANULAR COMPUTING, PROCEEDINGS, International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing, Springer, Delhi, India, pp. 336-+.
View/Download from: Publisher's site
View description>>
In a vendor-buyer supply chain, the buyer's economic order quantity and the vendor's optimal number of deliveries are derived either independently or collaboratively. In this paper, we establish a two-stage vendor-buyer inventory system decision model by using bi-level decision making approach. The experimental result shows that the proposed bi-level decision model can effectively handle two-stage vendor-buyer inventory problems and obtain better results than the existing methods.
Wenjun Zhang, Lin Gui, Bo Liu, Jian Xiong & Dingxiang Lin 1970, 'Services and trial test of CMMB system', 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE, Bilbao, SPAIN, pp. 1-+.
View/Download from: Publisher's site
Whalley, JL & Lister, R 1970, 'The BRACElet 2009.1 (Wellington) Specification', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Wellington, New Zealand, pp. 9-18.
View description>>
BRACElet is a multi-institutional computer education research study of novice programmers. The project is open to new members. The purpose of this paper is to: (1) provide potential new members with an overview of BRACElet, and (2) specify the common core for the next data collection cycle. In this paper, BRACElet is taking the unusual step of making its study design public before data is collected. We invite anyone to run their own study using our study design, and publish their findings, irrespective of whether they formally join BRACElet. We look forward to reading their paper. © 2009, Australian Computer Society, Inc.
Ye, D, Bai, Q, Zhang, M, Win, KT & Shen, Z 1970, 'An Efficient Task Allocation Protocol for P2P Multi-agent Systems', 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE, Chengdu, PEOPLES R CHINA, pp. 11-18.
View/Download from: Publisher's site
Ye, Z, Shi, W & Ye, D 1970, 'DDoS Defense Using TCP_IP Header Analysis and Proactive Tests', 2009 International Conference on Information Technology and Computer Science, 2009 International Conference on Information Technology and Computer Science (ITCS 2009), IEEE, Kiev, UKRAINE, pp. 548-+.
View/Download from: Publisher's site
Yu, S, Thapngam, T, Liu, J, Wei, S & Zhou, W 1970, 'Discriminating DDoS Flows from Flash Crowds Using Information Distance', 2009 Third International Conference on Network and System Security, 2009 Third International Conference on Network and System Security, IEEE, Surfers Paradise, AUSTRALIA, pp. 351-356.
View/Download from: Publisher's site
Zhang, G, Zhang, G, Gao, Y & Lu, J 1970, 'A Fuzzy Bilevel Model and a PSO-Based Algorithm for Day-Ahead Electricity Market Strategy Making', KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II, PROCEEDINGS, International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, IOS Press, Santiago, Chile, pp. 736-744.
View/Download from: Publisher's site
View description>>
This paper applies bilevel optimization techniques and fuzzy set theory to model and support bidding strategy making in electricity markets. By analyzing the strategic bidding behavior of generating companies, we build up a fuzzy bilevel optimization model for day-ahead electricity market strategy making. In this model, each generating company chooses the bids to maximize the individual profit. A market operator solves an optimization problem based on the minimization purchase electricity fare to determine the output power for each unit and uniform marginal price. Then, a particle swarm optimization (PSO)-based algorithm is developed for solving problems defined by this model.
Zhang, G, Zhang, G, Gao, Y, Lu, J & IEEE 1970, 'A Bilevel Optimization Model and a PSO-based Algorithm in Day-ahead Electricity Markets', 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, IEEE Conference on Systems, Man and Cybernetics, IEEE, Texas, USA, pp. 611-616.
View/Download from: Publisher's site
View description>>
Strategic bidding problems are becoming key issues in competitive electricity markets. This paper applies bilevel optimization theory to deal with this issue. We first analyze generating company strategic bidding behaviors and build a bilevel optimization model for a day-ahead electricity market. In this bilevel optimization model, each generating company will choose their bids in order to maximize their individual profits. A market operator will determine the output power for each unit and uniform marginal price based on the minimization purchase electricity fare. For solving this competitive strategic bidding problem described by the bilevel optimization model, a particle swarm optimization (PSO)-based algorithm is. Experiment results have demonstrated the validity of the PSO-based algorithm in solving the competitive strategic bidding problems for a day-ahead electricity market. ©2009 IEEE.
Zhang, J, Lu, J, Zhang, G & IEEE 1970, 'A Hybrid Knowledge-based Prediction Method for Avian Influenza Early Warning', 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, IEEE Conference on Systems, Man and Cybernetics, IEEE, San Antonio, Texas, USA, pp. 617-622.
View/Download from: Publisher's site
View description>>
High pathogenic avian influenza remains rampant and the epidemic size has been growing in the world. The early warning system (EWS) for avian influenza becomes increasingly essential to militating against the risk of outbreak crisis. An EWS can generate timely early warnings to support decision makers in identifying underlying vulnerabilities and implementing relevant strategies. This paper addresses this crucial issue and focuses on how to make full use of previous events to perform comprehensive forecasting and generate reliable warning signals. It proposes a hybrid knowledge-based prediction (HKBP) method which combines case-based reasoning (CBR) with the fuzzy logic technique. The method can improve the prediction accuracy for avian influenza in a specific region at a specific time. An example is presented to illustrate the capabilities and procedures of the HKBP method.
Zheng, L, Jin, J, Guo, Y, Lu, H & Zhu, J 1970, 'Design and electromagnetic analysis of a HTS linear synchronous motor', 2009 International Conference on Applied Superconductivity and Electromagnetic Devices, 2009 International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD), IEEE, Chengdu, China, pp. 5-10.
View/Download from: Publisher's site
View description>>
High temperature superconducting (HTS) linear synchronous motor (LSM) integrated with HTS magnetic levitation system, can realize self-levitation and self-guidance without any sliding friction, which will have important applications in many fields such as electromagnetic aircraft launch system, maglev transportation. This paper presents the design and electromagnetic analysis of a HTS LSM, which is levitated by a magnetic levitation system consisting of HTS bulkspermanent magnet (PM) guideways. Numerical analysis and magnetic field finite element analysis (FEA) methods are applied to analyze the thrust, levitation and guidance force characteristics, and the electromagnetic performance of HTS LSM under no-load and load situations are studied with the analysis results are given. Finally, the primary motor running testing results are provided.
Zhou, Q, Xu, G & Zong, Y 1970, 'Web Co-clustering of Usage Network Using Tensor Decomposition', 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, IEEE, pp. 311-314.
View/Download from: Publisher's site
View description>>
Web clustering is an approach to aggregate web objects into various categories according to underlying relationships among them. Finding co-clusters of web objects is an emerging topic in the context of web usage mining. In this paper we will present an algorithm using tensor decomposition to co-cluster web objects based on analysis of user navigational tasks. The usage data of users visiting web sites is collected as experimental data to construct the usage network and validate the presented method. Experimental results have demonstrated the proposed method can clearly reveal the aggregations of web objects as a result of different navigational tasks. © 2009 IEEE.
Zowghi, D 1970, 'Requirements Engineering Education and Training: Key Challenges and Practical Solutions', 2009 17th IEEE International Requirements Engineering Conference, 2009 17th IEEE International Requirements Engineering Conference (RE), IEEE, pp. 358-358.
View/Download from: Publisher's site
View description>>
Academics and practitioners alike have long recognized the key challenges of requirements engineering education and training. This panel attempts to discuss these key challenges in details and provide an opportunity for a meaningful dialogue between academics and practitioners for identifying effective pedagogical paradigms, practical techniques and tools for teaching and learning requirements engineering principles. © 2009 IEEE.
Zowghi, D 1970, 'Teaching Requirements Engineering to the Baháí Students in Iran who are Denied of Higher Education', 2009 Fourth International Workshop on Requirements Engineering Education and Training, 2009 Fourth International Workshop on Requirements Engineering Education and Training (REET 2009), IEEE, pp. 38-48.
View/Download from: Publisher's site
View description>>
The increasing interest in Requirements Engineering (RE) in recent years has motivated many academics to provide students with a broad knowledge of the fundamental principles of RE. In RE Education and Training (REET), it is imperative to cover a wide range of topics and teach a variety of skills. Major challenges of REET have already been well recognised and documented in the literature. Moreover, wide spread use of web-based education has caused an explosion of published literature related to distance education. When students are not collocated with the instructor and they themselves are geographically dispersed clearly exacerbates some of the well-known challenges of REET. In this paper I share the experiences gained in teaching an online postgraduate RE subject for the first time to students located in Iran. These students have been denied of basic human rights, specifically access to University education. I used role playing as a pedagogical tool to give students a greater appreciation of issues and problems associated with RE in quasi-real settings. This paper describes some of the challenges encountered and the lessons learnt with some suggestions on how to address, among other issues, the problem of distance between students and the instructor.