Azadeh, A, Aramoon, M & Saberi, M 2009, 'An integrated GA-time series algorithm for forecasting oil production estimation: USA, Russia, India, and Brazil', International Journal of Industrial and Systems Engineering, vol. 4, no. 4, pp. 368-368.
View/Download from: Publisher's site
View description>>
This study presents an integrated algorithm for forecasting oil production based on a Genetic Algorithm (GA) with variable parameters using stochastic procedures, time series and Analysis of Variance (ANOVA). The significance of the proposed algorithm is two fold. First, it is flexible and identifies the best model based on the results of ANOVA and MAPE, whereas previous studies consider the best fitted GA model based on Minimum Absolute Percentage Error (MAPE) or relative error results. Second, the proposed algorithm may identify conventional time series as the best model for future oil production forecasting because of its dynamic structure, whereas previous studies assume that GA always provides the best solutions and estimation. To show the applicability and superiority of the proposed algorithm, the data for oil production in USA, Russia, India and Brazil from 2001 to 2006 are used and applied to the proposed algorithm. Copyright © 2009, Inderscience Publishers.
Azadeh, A, Ardalani, N & Saberi, M 2009, 'Improved estimation of sir in mobile Cdma systems by integration of artificial neural network and time series technique', Australian Journal of Basic and Applied Sciences, vol. 3, no. 3, pp. 2955-2962.
View description>>
This study presents an integrated Artificial Neural Network (ANN) and time series framework to estimate and predict Signal to Interference Ratio (SIR) in Direct Sequence Code Division Multiple Access (DS/CDMA) systems. It is difficult to model uncertain behavior of SIR with only conventional ANN or time series and the integrated algorithm could be an ideal substitute for such cases. Artificial Neural Network (ANN) approach based on supervised multi layer perceptron (MLP) network are used in the proposed algorithm. All type of ANN-MLP are examined in present study. At last, Coefficient of Determination (R2) is used for selecting preferred model from different constructed MLP-ANN. One of unique feature of the proposed algorithm is utilization of Autocorrelation Function (ACF) to define input variables whereas conventional methods which use trial and error method. This is the first study that integrates ANN and time series for improved estimation of SIR in mobile CDMA systems. © 2009, INSInet Publication.
Azadeh, A, Khakestani, M & Saberi, M 2009, 'A flexible fuzzy regression algorithm for forecasting oil consumption estimation', Energy Policy, vol. 37, no. 12, pp. 5567-5579.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Anvari, M & Izadbakhsh, HR 2009, 'A Meta heuristic approach for performance assessment of production units', Expert Systems with Applications, vol. 36, no. 3, pp. 6559-6569.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Gitiforouz, A & Saberi, Z 2009, 'A hybrid simulation-adaptive network based fuzzy inference system for improvement of electricity consumption estimation', Expert Systems with Applications, vol. 36, no. 8, pp. 11108-11117.
View/Download from: Publisher's site
Azadeh, A, Sharifi, S & Saberi, M 2009, 'Design and implementation of a human centered expert system for improvement of strategic planning in a manufacturer of construction products', Australian Journal of Basic and Applied Sciences, vol. 3, no. 3, pp. 2447-2458.
View description>>
This paper introduces a human centered expert system for design and improvement of strategic planning in a manufacturer of construction products. The development process of the expert system is facilitated through knowledge base, learning module, inference engine, description tools and usability testing and inspection. To achieve the above objective, all indigenous and exogenous factors affecting strategic planning are categorized and translated into rules in the expert system. Moreover, general strategies and their decision circumstances or criteria are given to the system. The humancentered expert system is designed and tested for a medium-sized manufacturer of construction products. The s uperiority and applicability of the expert system was designed and tested for a manufacturer of construction products. This is the first study that introduces a human-centered expert system for improvement of strategic planning. © 2009, INSInet Publication.
Beydoun, G 2009, 'Formal concept analysis for an e-learning semantic web', EXPERT SYSTEMS WITH APPLICATIONS, vol. 36, no. 8, pp. 10952-10961.
View/Download from: Publisher's site
Beydoun, G, Low, G, Henderson-Sellers, B, Mouratidis, H, Gomez-Sanz, JJ, Pavon, J & Gonzalez-Perez, C 2009, 'FAML: A Generic Metamodel for MAS Development', IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, vol. 35, no. 6, pp. 841-863.
View/Download from: Publisher's site
View description>>
AbstractIn some areas of software engineering research, there are several metamodels claiming to capture the main issues. Though it is profitable to have variety at the beginning of a research field, after some time, the diversity of metamodels becomes an obstacle, for instance to the sharing of results between research groups. To reach consensus and unification of existing metamodels, metamodel-driven software language engineering can be applied. This paper illustrates an application of software language engineering in the agent-oriented software engineering research domain. Here, we introduce a relatively generic agent-oriented metamodel whose suitability for supporting modeling language development is demonstrated by evaluating it with respect to several existing methodology-specific metamodels. First, the metamodel is constructed by a combination of bottom-up and top-down analysis and best practice. The concepts thus obtained and their relationships are then evaluated by mapping to two agent-oriented metamodels: TAO and Islander. We then refine the metamodel by extending the comparisons with the metamodels implicit or explicit within five more extant agent-oriented approaches: Adelfe, PASSI, Gaia, INGENIAS, and Tropos. The resultant FAML metamodel is a potential candidate for future standardization as an important component for engineering an agent modeling language.
Beydoun, G, Low, G, Mouratidis, H & Henderson-Sellers, B 2009, 'A security-aware metamodel for multi-agent systems (MAS)', INFORMATION AND SOFTWARE TECHNOLOGY, vol. 51, no. 5, pp. 832-845.
View/Download from: Publisher's site
View description>>
This paper adopts a model-based security (MBS) approach to identify security requirements during the early stages of multi-agent system development. Our adopted MBS approach is underpinned by a metamodel independent of any specific methodology. It allows for security considerations to be embedded within any situated agent methodology which then prescribes security considerations within its work products. Using a standard model-driven engineering (MDE) approach, these work products are initially constructed as high abstraction models and then transformed into more precise models until code-specific models can be produced. A multi-agent system case study is used to illustrate the applicability of the proposed security-aware metamodel.
Bremner, MJ, Mora, C & Winter, A 2009, 'Are Random Pure States Useful for Quantum Computation?', PHYSICAL REVIEW LETTERS, vol. 102, no. 19.
View/Download from: Publisher's site
View description>>
We show the following: a randomly chosen pure state as a resource for measurement-based quantum computation iswith overwhelming probabilityof no greater help to a polynomially bounded classical control computer, than a string of random bits. Thus, unlike the familiar ``cluster states, the computing power of a classical control device is not increased from P to BQP (bounded-error, quantum polynomial time), but only to BPP (bounded-error, probabilistic polynomial time). The same holds if the task is to sample from a distribution rather than to perform a bounded-error computation. Furthermore, we show that our results can be extended to states with significantly less entanglement than random states.
Budka, M & Gabrys, B 2009, 'Electrostatic Field Classifier for Deficient Data', Advances in Intelligent and Soft Computing, vol. 57, pp. 311-318.
View/Download from: Publisher's site
View description>>
This paper investigates the suitability of recently developed models based on the physical field phenomena for classification of incomplete datasets. An original approach to exploiting incomplete training data with missing features and labels, involving extensive use of electrostatic charge analogy has been proposed. Classification of incomplete patterns has been investigated using a local dimensionality reduction technique, which aims at exploiting all available information rather than trying to estimate the missing values. The performance of all proposed methods has been tested on a number of benchmark datasets for a wide range of missing data scenarios and compared to the performance of some standard techniques.
Cardwell, H, Voinov, A & Starler, N 2009, 'The Energy‐Water Nexus: Potential Roles for the U.S. Army Corps of Engineers', Journal of Contemporary Water Research & Education, vol. 143, no. 1, pp. 42-48.
View/Download from: Publisher's site
Cetindamar, D, Phaal, R & Probert, D 2009, 'Understanding technology management as a dynamic capability: A framework for technology management activities', Technovation, vol. 29, no. 4, pp. 237-246.
View/Download from: Publisher's site
Cetindamar, D, Wasti, SN, Ansal, H & Beyhan, B 2009, 'Does technology management research diverge or converge in developing and developed countries?', Technovation, vol. 29, no. 1, pp. 45-58.
View/Download from: Publisher's site
Chen, G, Ying, M & Liu, Y 2009, 'Dealing with Uncertainty and Fuzziness in Intelligent Systems', INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, vol. 24, no. 3, pp. 223-225.
View/Download from: Publisher's site
View description>>
NA
Cheng-Hung Chen, Cheng-Jian Lin & Chin-Teng Lin 2009, 'Nonlinear System Control Using Adaptive Neural Fuzzy Networks Based on a Modified Differential Evolution', IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 39, no. 4, pp. 459-473.
View/Download from: Publisher's site
Cheng-Hung Chen, Cheng-Jian Lin & Chin-Teng Lin 2009, 'Using an Efficient Immune Symbiotic Evolution Learning for Compensatory Neuro-Fuzzy Controller', IEEE Transactions on Fuzzy Systems, vol. 17, no. 3, pp. 668-682.
View/Download from: Publisher's site
Cheng-Jian Lin, Cheng-Hung Chen & Chin-Teng Lin 2009, 'A Hybrid of Cooperative Particle Swarm Optimization and Cultural Algorithm for Neural Fuzzy Networks and Its Prediction Applications', IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 39, no. 1, pp. 55-68.
View/Download from: Publisher's site
Chin-Teng Lin, Chao-Ting Hong & Chien-Ting Yang 2009, 'Real-Time Digital Image Stabilization System Using Modified Proportional Integrated Controller', IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 3, pp. 427-431.
View/Download from: Publisher's site
Devitt, SJ, Fowler, AG, Tilma, T, Munro, WJ & Nemoto, K 2009, 'Classical Processing Requirements for a Topological Quantum Computing System', International Journal of Quantum Information, vol. 8, no. 1-2, pp. 121-147.
View/Download from: Publisher's site
View description>>
Dedicated research into the design and construction of a large scale QuantumInformation Processing (QIP) system is a complicated task. The design of anexperimentally feasible quantum processor must draw upon results in multiplefields; from experimental efforts in system control and fabrication through tofar more abstract areas such as quantum algorithms and error correction.Recently, the adaptation of topological coding models to physical systems inoptics has illustrated a possible long term pathway to truly large scale QIP.As the topological model has well defined protocols for Quantum ErrorCorrection (QEC) built in as part of its construction, a more grounded analysisof the {\em classical} processing requirements is possible. In this paper weanalyze the requirements for a classical processing system, designedspecifically for the topological cluster state model. We demonstrate that viaextensive parallelization, the construction of a classical 'front-end' systemcapable of processing error correction data for a large topological computer ispossible today.
Devitt, SJ, Nemoto, K & Munro, WJ 2009, 'Quantum Error Correction for Beginners', Rep. Prog. Phys., vol. 76, no. 7, p. 076001.
View/Download from: Publisher's site
View description>>
Quantum error correction (QEC) and fault-tolerant quantum computationrepresent one of the most vital theoretical aspect of quantum informationprocessing. It was well known from the early developments of this excitingfield that the fragility of coherent quantum systems would be a catastrophicobstacle to the development of large scale quantum computers. The introductionof quantum error correction in 1995 showed that active techniques could beemployed to mitigate this fatal problem. However, quantum error correction andfault-tolerant computation is now a much larger field and many new codes,techniques, and methodologies have been developed to implement error correctionfor large scale quantum algorithms. In response, we have attempted to summarizethe basic aspects of quantum error correction and fault-tolerance, not as adetailed guide, but rather as a basic introduction. This development in thisarea has been so pronounced that many in the field of quantum information,specifically researchers who are new to quantum information or people focusedon the many other important issues in quantum computation, have found itdifficult to keep up with the general formalisms and methodologies employed inthis area. Rather than introducing these concepts from a rigorous mathematicaland computer science framework, we instead examine error correction andfault-tolerance largely through detailed examples, which are more relevant toexperimentalists today and in the near future.
Dong, D, Lam, J & Tarn, TJ 2009, 'Rapid incoherent control of quantum systems based on continuous measurements and reference model', IET Control Theory & Applications, vol. 3, no. 2, pp. 161-169.
View/Download from: Publisher's site
Dong, H, Hussain, FK & Chang, E 2009, 'A QoS-based service retrieval methodology for digital ecosystems', INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, vol. 5, no. 3, pp. 261-283.
View/Download from: Publisher's site
View description>>
The emergence of the World Wide Web and its influence on the fields of industry, commerce, healthcare and so on, has led to an innovative, dynamic, open, collaborative and interactive environment - the digital ecosystem. Whereas service plays an importan
Dong, Y, Xu, Y & Yu, S 2009, 'Linguistic multiperson decision making based on the use of multiple preference relations', Fuzzy Sets and Systems, vol. 160, no. 5, pp. 603-623.
View/Download from: Publisher's site
Doss, R, Li, G, Mak, V, Yu, S & Chowdhury, M 2009, 'Improving the QoS for information discovery in autonomic wireless sensor networks', Pervasive and Mobile Computing, vol. 5, no. 4, pp. 334-349.
View/Download from: Publisher's site
Dovey, K 2009, 'The role of trust in innovation', The Learning Organization, vol. 16, no. 4, pp. 311-325.
View/Download from: Publisher's site
View description>>
PurposeThe purpose of this paper is to explore the role of trust in the collaborative learning processes that underpin innovation as a competitive strategy in organizations.Design/methodology/approachAs a conceptual paper, the argument is framed by academic perspectives, drawn from the academic literature on the topic and by professional and life experience.FindingsThe collaborative learning practices that underpin idea generation and realization in organizations are strongly dependent for their effectiveness upon the availability, within and beyond stakeholder networks, of trust and other key social capital resources.Practical implicationsIf innovation is dependent upon social capital resources, such as trust, then leadership endeavour needs to be much more focused upon the creation of a social environment that nurtures rich stakeholder and other relevant network, relationships. New forms of governance and power management, and more appropriate and aligned organizational structures, are required in organizations that are attempting to compete through innovation.Originality/valueThe paper's explication of the role of social capital resources, like trust, in organizational innovation offers new insights into this complex but increasingly vital form of competitive strategy.
Duan, R, Feng, Y & Ying, M 2009, 'Perfect Distinguishability of Quantum Operations', PHYSICAL REVIEW LETTERS, vol. 103, no. 21.
View/Download from: Publisher's site
Duan, R, Feng, Y, Xin, Y & Ying, M 2009, 'Distinguishability of Quantum States by Separable Operations', IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 55, no. 3, pp. 1320-1330.
View/Download from: Publisher's site
View description>>
In this paper, we study the distinguishability of multipartite quantum states by separable operations. We first present a necessary and sufficient condition for a finite set of orthogonal quantum states to be distinguishable by separable operations. An analytical version of this condition is derived for the case of (D - 1) pure states, where D is the total dimension of the state space under consideration. A number of interesting consequences of this result are then carefully investigated. Remarkably, we show there exists a large class of 2 ⊗ 2 separable operations not being realizable by local operations and classical communication. Before our work, only a class of 3⊗ 3 nonlocal separable operations was known [Bennett et al, Phys. Rev. A 59, 1070 (1999)]. We also show that any basis of the orthogonal complement of a multipartite pure state is indistinguishable by separable operations if and only if this state cannot be a superposition of one or two orthogonal product states, i.e., has an orthogonal Schmidt number not less than three, thus generalize the recent work about indistinguishable bipartite subspaces [Watrous, Phys. Rev. Lett. 95, 080505 (2005)]. Notably, we obtain an explicit construction of indistinguishable subspaces of dimension 7 (or 6) by considering a composite quantum system consisting of two qutrits (resp., three qubits), which is slightly better than the previously known indistinguishable bipartite subspace with dimension 8. © 2009 IEEE.
Dunwell, TL, Dickinson, RE, Stankovic, T, Dallol, A, Weston, V, Austen, B, Catchpoole, D, Maher, ER & Latif, F 2009, 'Frequent epigenetic inactivation of the SLIT2 gene in chronic and acute lymphocytic leukemia', Epigenetics, vol. 4, no. 4, pp. 265-269.
View/Download from: Publisher's site
View description>>
Recently a mouse model of T/natural killer acute lymphoblastic leukemia was used to assess global promoter methylation across the mouse genome using the restriction landmark genomic scanning technique. One of the methylated mouse genes identified in this way was Slit2. There are three mammalian SLIT genes (SLIT1, SLIT2, SLIT3), that belong to a highly conserved family of axon guidance molecules. We have previously demonstrated that SLIT2 is frequently inactivated in lung, breast, colorectal and glioma tumors by hypermethylation of a CpG island in its promoter region, whilst inactivating somatic mutations are rare. Furthermore, we demonstrated that SLIT2 acts as a tumor suppressor gene in breast and colorectal cancer cells. In this report we determined the methylation status of the SLIT2 gene in leukemias (CLL and ALL). SLIT2 was methylated in all ten leukemia cell lines analyzed (eight completely and two partially methylated). SLIT2 expression was restored after treating ALL lines with 5-aza-2dC. In primary ALL and CLL samples, SLIT2 was also frequently methylated, 58% (30/52) B-ALL; 83% (10/12) T-ALL and in 80% (24/30) CLL. Whilst DNA from peripheral blood and bone marrow from healthy control samples showed no SLIT2 methylation. Methylation results in leukemia cell lines and ALL and CLL primary samples were confirmed by direct sequencing of bisulfite modified DNA. Our results demonstrate that methylation of the SLIT2 5′ CpG island is conserved between mice and humans, and therefore is likely to be of functional importance. © 2009 Landes Bioscience.
Dunwell, TL, Hesson, LB, Pavlova, TV, Zabarovska, V, Kashuba, VI, Catchpoole, D, Chiaramonte, R, Brini, AT, Griffiths, M, Maher, ER, Zabarovsky, ER & Latif, F 2009, 'Epigenetic analysis of childhood acute lymphoblastic leukemia', Epigenetics, vol. 4, no. 3, pp. 185-193.
View/Download from: Publisher's site
View description>>
We used a chromosome 3 wide NotI microarray for identification of epigenetically inactivated genes in childhood acute lymphoblastic leukemia (ALL). Three novel genes demonstrated frequent methylation in childhood ALL. PPP2R3A (protein phosphatase 2, regulatory subunit B", α) was frequently methylated in T (69%) and B (82%)-ALL. Whilst FBLN2 (fibulin 2) and THRB (thyroid hormone receptor, β) showed frequent methylation in B-ALL (58%; 56% respectively), but were less frequently methylated in T-ALL (17% for both genes). Recently it was demonstrated that BNC1 (Basonuclin 1) and MSX1 (msh homeobox 1) were frequently methylated across common epithelial cancers. In our series of childhood ALL BNC1 was frequently methylated in both T (77%) and B-ALL (79%), whilst MSX1 showed T-ALL (25%) specific methylation. The methylation of the above five genes was cancer specific and expression of the genes could be restored in methylated leukemia cell lines treated with 5-aza-2′-deoxycytidine. This is the first report demonstrating frequent epigenetic inactivation of PPP2R3A, FBLN2, THRB, BNC1 and MSX1 in leukemia. The identification of frequently methylated genes showing cancer specific methylation will be useful in developing early cancer detection screens and for targeted epigenetic therapies. © 2009 Landes Bioscience.
Dyson, LE, Litchfield, A, Lawrence, E, Raban, R & Leijdekkers, P 2009, 'Advancing the m-learning research agenda for active, experiential learning: Four case studies', AUSTRALASIAN JOURNAL OF EDUCATIONAL TECHNOLOGY, vol. 25, no. 2, pp. 250-267.
View description>>
This article reports on an m-learning research agenda instituted at our university in order to explore how mobile technology can enhance active, experiential learning. Details of the implementation and results of four areas of m-learning are presented: mobile supported fieldwork, fostering interactivity in large lectures with mobile technology, using mobile devices to learn about mobile technology and, finally, podcasting. These directions are informed by a concern for achieving m-learning practices consistent with sound educational theory and the needs of the contemporary, technologically aware student body. All four implementations have been successfully embedded in mainstream subjects on a continuing basis. Therefore they represent a departure from the project based approach of much m-learning reported in the literature. This outcome was achieved through a focus on the economic sustainability and feasibility of each case. An evaluation focusing on how well each case assisted students' learning found that, with the exception of lecture podcasting, all supported high quality experiential learning.
Dyson, LE, Raban, R, Litchfield, A & Lawrence, E 2009, 'Addressing the cost barriers to mobile learning in higher education', International Journal of Mobile Learning and Organisation, vol. 3, no. 4, pp. 381-381.
View/Download from: Publisher's site
View description>>
This paper addresses one of the main barriers to the widespread adoption of mobile learning in higher education, that of cost. Usage charges billed by telecommunications providers and the cost of mobile hardware are identified as the key cost issues. However, opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. The authors describe two experiments in low-cost mobile learning: one that uses packet technology (mobile WAP/WML) to build low-cost interactivity in the classroom and the second that involves mobile-supported fieldwork using several cost-saving strategies. © 2009 Inderscience Enterprises Ltd.
Eklund, JM & McGregor, C 2009, 'Standards for physiological data transmission and archiving for the support of the service of critical care', ACM SIGBED Review, vol. 6, no. 2, pp. 1-6.
View/Download from: Publisher's site
View description>>
Physiological data is monitored and displayed on medical devices around the world every day, and the volume of this data is steadily increasing and newer monitoring devices enter the clinical setting. However, the vast majority of this data is lost since it is most often displayed once as it is recorded, perhaps replayed one or more times while it exists in the device's volatile memory. What little data that is permanently recorded is most commonly saved through hand written annotations, in paper records and in some limited samples stored on hospital clinical information systems. Meanwhile, current methods of data analysis provide opportunities to utilize this data for improved care of these same critical care patients. A major inhibitor to this becoming reality is the lack of standards for the representation, transmission and storage of physiological data. HL7, for example, does not include definitions for time series data. Research into the use of these data will soon be reaching the clinical setting and the need for such standards to be defined is becoming urgent.
Feng, Y, Duan, R & Ying, M 2009, 'LOCALLY UNDETERMINED STATES, GENERALIZED SCHMIDT DECOMPOSITION, AND APPLICATION IN DEISTRIBUTED COMUTING', QUANTUM INFORMATION & COMPUTATION, vol. 9, no. 11-12, pp. 997-1012.
View description>>
Multipartite quantum states that cannot be uniquely determined by their reduced states of all proper subsets of the parties exhibit some inherit `high-order' correlation. This paper elaborates this issue by giving necessary and sufficient conditions for a pure multipartite state to be locally undetermined, and moreover, characterizing precisely all the pure states sharing the same set of reduced states with it. Interestingly, local determinability of pure states is closely related to a generalized notion of Schmidt decomposition. Furthermore, we find that locally undetermined states have some applications to the well-known consensus problem in distributed computation. To be specific, given some physically separated agents, when communication between them, either classical or quantum, is unreliable and they are not allowed to use local ancillary quantum systems, then there exists a totally correct and completely fault-tolerant protocol for them to reach a consensus if and only if they share a priori a locally undetermined quantum state
Gabrys, B & Anguita, D 2009, 'Nature-inspired learning and adaptive systems', Natural Computing, vol. 8, no. 2, pp. 197-198.
View/Download from: Publisher's site
GAO, YA, ZHANG, G & LU, JIE 2009, 'A FUZZY MULTI-OBJECTIVE BILEVEL DECISION SUPPORT SYSTEM', International Journal of Information Technology & Decision Making, vol. 08, no. 01, pp. 93-108.
View/Download from: Publisher's site
View description>>
In a bilevel decision problem, both the leader and the follower may have multiple objectives, and the coefficients involved in these objective functions or constraints may be described by some uncertain values. To express such a situation, a fuzzy multi-objective bilevel (FMOBL) programming model and related solution methods are introduced. This research develops a FMOBL decision support system through implementing the proposed FMOBL methods.
Gui, L, Li, Q, Liu, B, Zhang, W & Zheng, C 2009, 'Low complexity channel estimation method for TDS-OFDM based Chinese DTTB system', IEEE Transactions on Consumer Electronics, vol. 55, no. 3, pp. 1135-1140.
View/Download from: Publisher's site
Gutierrez, F & Dyson, LE 2009, 'Confucian or Fusion?', The International Journal of Learning: Annual Review, vol. 16, no. 5, pp. 373-384.
View/Download from: Publisher's site
View description>>
This research aims to uncover the perceptions of first-year Confucian-heritage students towards their lived experience of university study in Australia. Data was gathered from the students via interviews and analyzed using a phenomenological approach. From the students perspective, prior experience of western-style pedagogy was found to be helpful in giving students an idea of what the Australian learning environment would entail, although many students still had difficulty with classroom interaction due to persistent cultural conditioning. In terms of teacher behaviour, important factors include the lecturer demonstrating an understanding of the students culture, using humour in teaching, being a role model, developing a good relationship with the student and demonstrating a commitment to their learning. Issues included the students lack of understanding of the true significance of assignments and lecturers misunderstanding of the valuable role of memorization in Confucian-heritage students learning. The findings of this work allow academics an insight into the lived educational experiences of the student participants. They may also be tentatively offered as a means of informing future course design and delivery, with the goal of improving the quality of student learning and, therefore, academic success.
Hesson, LB, Dunwell, TL, Cooper, WN, Catchpoole, D, Brini, AT, Chiaramonte, R, Griffiths, M, Chalmers, AD, Maher, ER & Latif, F 2009, 'The novel RASSF6 and RASSF10 candidate tumour suppressor genes are frequently epigenetically inactivated in childhood leukaemias', Molecular Cancer, vol. 8, no. 1.
View/Download from: Publisher's site
View description>>
Abstract Background The Ras-assocation family (RASSF) of tumour suppressor genes (TSGs) contains 10 members that encode proteins containing Ras-assocation (RA) domains. Several members of the RASSF family are frequently epigenetically inactivated in cancer, however, their role in leukaemia has remained largely uninvestigated. Also, RASSF10 is a predicted gene yet to be experimentally verified. Here we cloned, characterised and demonstrated expression of RASSF10 in normal human bone marrow. We also determined the methylation status of CpG islands associated with RASSF1–10 in a series of childhood acute lymphocytic leukaemias (ALL) and normal blood and bone marrow samples. Results COBRA and bisulphite sequencing revealed RASSF6 and RASSF10 were the only RASSF members with a high frequency of leukaemia-specific methylation. RASSF6 was methylated in 94% (48/51) B-ALL and 41% (12/29) T-ALL, whilst RASSF10 was methylated in 16% (8/51) B-ALL and 88% (23/26) T-ALL. RASSF6 and RASSF10 expression inversely correlated with methylation which was restored by treatment with 5-aza-2'deoxycytidine (5azaDC). Conclusion This study shows the hypermethylation profile of RASSF genes in leukaemias is distinct from that of solid tumours and represents the first report of inactivation of RASSF6 or RASSF10 in cancer. These data show epigenetic inactivation of the candidat...
Izadbakhsh, H, Hour Ali, M, Amirkhani, A, Montazeri, A & Saberi, M 2009, 'Performance assessment and optimization of the after-sale networks', World Academy of Science Engineering and Technology, vol. 37, pp. 910-914.
View description>>
The after-sales activities are nowadays acknowledged as a relevant source of revenue, profit and competitive advantage in most manufacturing industries. Top and middle management, therefore, should focus on the definition of a structured business performance measurement system for the after-sales business. The paper aims at filling this gap, and presents an integrated methodology for the after-sales network performance measurement, and provides an empirical application to automotive case companies and their official service network. This is the first study that presents an integrated multivariate approach for total assessment and improvement of after-sale services. © 2009 WASET.ORG.
Jakeman, AJ, Rizzoli, AE & Voinov, AA 2009, 'Outstanding reviewers for environmental modelling and software in 2008', Environmental Modelling & Software, vol. 24, no. 10, pp. 1137-1138.
View/Download from: Publisher's site
Juszczyszyn, K, Musiał, K, Kazienko, P & Gabrys, B 2009, 'Temporal changes in local topology of an email-based social network', Computing and Informatics, vol. 28, no. 6, pp. 763-779.
View description>>
The dynamics of complex social networks has become one of the research areas of growing importance. The knowledge about temporal changes of the network topology and characteristics is crucial in networked communication systems in which accurate predictions are important. The local network topology can be described by the means of network motifs which are small subgraphs - usually containing from 3 to 7 nodes. They were shown to be useful for creating profiles that reveal several properties of the network. In this paper, the time-varying characteristics of social networks, such as the number of nodes and edges as well as clustering coefficients and different centrality measures are investigated. At the same time, the analysis of three-node motifs (triads) was used to track the temporal changes in the structure of a large social network derived from e-mail communication between university employees. We have shown that temporal changes in local connection patterns of the social network are indeed correlated with the changes in the clustering coefficient as well as various centrality measures values and are detectable by means of motifs analysis. Together with robust sampling network motifs can provide an appealing way to monitor and assess temporal changes in large social networks.
Kadlec, P & Gabrys, B 2009, 'Architecture for development of adaptive on-line prediction models', Memetic Computing, vol. 1, no. 4, pp. 241-269.
View/Download from: Publisher's site
View description>>
This work presents an architecture for the development of on-line prediction models. The architecture defines unified modular environment based on three concepts from machine learning, these are: (i) ensemble methods, (ii) local learning, and (iii) meta learning. The three concepts are organised in a three layer hierarchy within the architecture. For the actual prediction making any data-driven predictive method such as artificial neural network, support vector machines, etc. can be implemented and plugged in. In addition to the predictive methods, data pre-processing methods can also be implemented as plug-ins. Models developed according to the architecture can be trained and operated in different modes. With regard to the training, the architecture supports the building of initial models based on a batch of training data, but if this data is not available the models can also be trained in incremental mode. In a scenario where correct target values are (occasionally) available during the run-time, the architecture supports life-long learning by providing several adaptation mechanisms across the three hierarchical levels. In order to demonstrate its practicality, we show how the issues of current soft sensor development and maintenance can be effectively dealt with by using the architecture as a construction plan for the development of adaptive soft sensing algorithms. © Springer-Verlag 2009.
Kadlec, P, Gabrys, B & Strandt, S 2009, 'Data-driven Soft Sensors in the process industry', Computers & Chemical Engineering, vol. 33, no. 4, pp. 795-814.
View/Download from: Publisher's site
Kadupitige, SR, Leung, KC, Sellmeier, J, Sivieng, J, Catchpoole, DR, Bain, ME & Gaëta, BA 2009, 'MINER: exploratory analysis of gene interaction networks by machine learning from expression data', BMC Genomics, vol. 10, no. S3.
View/Download from: Publisher's site
View description>>
Abstract Background The reconstruction of gene regulatory networks from high-throughput 'omics' data has become a major goal in the modelling of living systems. Numerous approaches have been proposed, most of which attempt only 'one-shot' reconstruction of the whole network with no intervention from the user, or offer only simple correlation analysis to infer gene dependencies. Results We have developed MINER (Microarray Interactive Network Exploration and Representation), an application that combines multivariate non-linear tree learning of individual gene regulatory dependencies, visualisation of these dependencies as both trees and networks, and representation of known biological relationships based on common Gene Ontology annotations. MINER allows biologists to explore the dependencies influencing the expression of individual genes in a gene expression data set in the form of decision, model or regression trees, using their domain knowledge to guide the exploration and formulate hypotheses. Multiple trees can then be summarised in the form of a gene network diagram. MINER is being adopted by several of our collaborators and has already led to the discovery of a new significant regulatory relationship with subsequent experimental validation. Conclusion Unlike most gene regulatory network inference methods, MINER allows the user to start from genes of interest and build the network gene-by-gene, incorporating domain expertise in the process. This approach has been used successfully with RNA microarray data but is applicable to other quantitative data produced by high-throughput technologies such as proteomics and 'next generation' DNA s...
Ken-Li Lin, Chin-Teng Lin, Pal, NR & Ojha, S 2009, 'Structural building blocks', IEEE Engineering in Medicine and Biology Magazine, vol. 28, no. 4, pp. 38-44.
View/Download from: Publisher's site
Li, J & Hao, P 2009, 'Finding representative landmarks of data on manifolds', Pattern Recognition, vol. 42, no. 11, pp. 2335-2352.
View/Download from: Publisher's site
Li, K, Zhou, W & Yu, S 2009, 'Effective metric for detecting distributed denial-of-service attacks based on information divergence', IET Communications, vol. 3, no. 12, pp. 1851-1860.
View/Download from: Publisher's site
Lin, C-T, Huang, T-Y, Liang, W-C, Chiu, T-T, Chao, C-F, Hsu, S-H & Ko, L-W 2009, 'Assessing Effectiveness of Various Auditory Warning Signals in Maintaining Drivers' Attention in Virtual Reality-Based Driving Environments', Perceptual and Motor Skills, vol. 108, no. 3, pp. 825-835.
View/Download from: Publisher's site
View description>>
Drivers' fatigue contributes to traffic accidents, so drivers must maintain adequate alertness. The effectiveness of audio alarms in maintaining driving performance and characteristics of alarms was studied in a virtural reality-based driving environment. Response time to the car's drifting was measured under seven conditions: with no warnings and with continuous warning tones (500 Hz, 1750 Hz, and 3000 Hz), and with tone bursts at 500 Hz, 1750 Hz, and 3000 Hz. Analyses showed the audio warning signals significantly improved driving. Further, the tones' spectral characteristics significantly influenced the effectiveness of the warning.
Lin, C-T, Ko, L-W & Shen, T-K 2009, 'Computational intelligent brain computer interaction and its applications on driving cognition', IEEE Computational Intelligence Magazine, vol. 4, no. 4, pp. 32-46.
View/Download from: Publisher's site
Lindahl, M, José, M, Jurado, L, Pilar, M, Ramos, G & Carmen, M 2009, 'A decision making method for educational management based on distance measures', Revista de Metodos Cuantitativos para la Economia y la Empresa, vol. 8, pp. 29-49.
View description>>
We develop a new approach for decision making in educational management based on the use of distance measures. We focus on the selection of a studies plan from the perspective of an academic institution. We try to develop this approach showing the benefits of establishing an ideal plan that we compare with the available alternatives. We use the Minkowski distance, the ordered weighted averaging (OWA) operator and the interval numbers. The use of the Minkowski distance allows to make comparisons between the ideal plan and the available ones in the market. The OWA operator is an aggregation operator that provides a parameterized family of aggregation operators that includes the maximum, the minimum and the average criteria, among oth- ers. And the interval numbers is a very useful technique to represent the information when the environment is very complex, because it gives all the possible results from the minimum to the maximum. We introduce a new aggregation operator called the uncertain generalized ordered weighted aver- aging distance (UGOWAD) operator. It is a distance aggregation operator that uses the main characteristics of the Minkowski distance, the OWA op- erator and the interval numbers. We develop an illustrative example where we can see the usefulness of the UGOWAD operator to select a studies plan in education management. The main advantage of using the UGOWAD is that we can consider a wide range of distance aggregation methods in the decision problem. Then, the decision maker gets a more complete view of the decision problem, being able to select the alternative that better fits the interests.
Lister, R 2009, 'CS research', ACM SIGCSE Bulletin, vol. 41, no. 2, pp. 72-74.
View/Download from: Publisher's site
View description>>
This is a regular invited column I write for this journal.
Lister, R, Fidge, C & Teague, D 2009, 'Further evidence of a relationship between explaining, tracing and writing skills in introductory programming', ACM SIGCSE Bulletin, vol. 41, no. 3, pp. 161-165.
View/Download from: Publisher's site
View description>>
This paper reports on a replication of earlier studies into a possible hierarchy of programming skills. In this study, the students from whom data was collected were at a university that had not provided data for earlier studies. Also, the students were taught the programming language 'Python', which had not been used in earlier studies. Thus this study serves as a test of whether the findings in the earlier studies were specific to certain institutions, student cohorts, and programming languages. Also, we used a non-parametric approach to the analysis, rather than the linear approach of earlier studies. Our results are consistent with the earlier studies. We found that students who cannot trace code usually cannot explain code, and also that students who tend to perform reasonably well at code writing tasks have also usually acquired the ability to both trace code and explain code.
Lu, J, Bai, C & Zhang, G 2009, 'Cost-benefit factor analysis in e-services using bayesian networks', EXPERT SYSTEMS WITH APPLICATIONS, vol. 36, no. 3, pp. 4617-4625.
View/Download from: Publisher's site
View description>>
This study applies Bayesian network techniques to analyze and verify the relationships among cost factors and benefit factors in e-service systems. This study first establishes a Bayesian network for e-service cost-benefit factor relationships based on our previous study [Lu, J. & Zhang, G. Q. (2003). Cost benefit factor analysis in e-services. International Journal of Service Industry Management (IJSIM), 14(5), 570-595]. It then calculates conditional probability distributions among these factors shown in the Bayesian network. Finally it runs a Junction-tree algorithm to conduct inference for verifying these cost-benefit factor relationships, and the data collected through a survey is as evidences in the inference process. Through the above application of Bayesian network techniques a set of useful findings is obtained for the costs involved in e-service developments against the benefits received by adopting these e-service systems. The case of 'increased investments in maintaining e-services' would significantly contribute to 'enhancing perceived company image', and the case of 'increased investments in security of e-service systems' would bring high benefits in 'building customer relationships' and 'improving cooperation between companies'. These findings have great potential to improve the strategic planning of businesses by determining more effective investments items and adopting more suitable development activities in e-service systems and applications. © 2008 Elsevier Ltd. All rights reserved.
Lu, J, Zhu, Y, Zeng, X, Koehl, L, Ma, J & Zhang, G 2009, 'A linguistic multi-criteria group decision support system for fabric hand evaluation', FUZZY OPTIMIZATION AND DECISION MAKING, vol. 8, no. 4, pp. 395-413.
View/Download from: Publisher's site
View description>>
Fabric hand evaluation (FHE) is the main measure in textile material selection for fashion design and development. Fabric hand evaluation requires considering multiple evaluation aspects/criteria by a group of evaluators. Some fabric features can also be measured using instruments. The evaluation often uses linguistic terms in the weights of criteria, and the weights and judgments of evaluators. To support a FHE-based material selection, this study first develops a fabric hand-based textile material evaluation model. It then proposes a human-machine measure integrated fuzzy multi-criteria group decision-making method. A software tool is also developed, which implements the proposed method and is applied in fabric hand-based textile material evaluation. © 2009 Springer Science+Business Media, LLC.
Lu, Q-Y, Zhang, Y, Wang, Y, Wang, D, Lee, R-P, Gao, K, Byrns, R & Heber, D 2009, 'California Hass Avocado: Profiling of Carotenoids, Tocopherol, Fatty Acid, and Fat Content during Maturation and from Different Growing Areas', Journal of Agricultural and Food Chemistry, vol. 57, no. 21, pp. 10408-10413.
View/Download from: Publisher's site
Ma, J, Lu, J & Zhang, G 2009, 'Information inconsistencies detection using a rule-map technique', EXPERT SYSTEMS WITH APPLICATIONS, vol. 36, no. 10, pp. 12510-12519.
View/Download from: Publisher's site
View description>>
Timely detecting information inconsistencies (anomalies) in real-time information provides strong support for decision-making in a dynamic decision-making situation. Existing techniques for information inconsistencies detection mainly focus on stored information by using a single structured-fixed descriptive model which always requires support from sufficient prior knowledge. The aim of this study is to develop a method for information inconsistencies detection for real-time information in dynamic decision-making situation where prior knowledge is insufficient by using multiple descriptive models. First, a rule-map technique is presented. A rule-map is a hierarchical directed graph, whose vertexes are selected descriptive models and whose arcs represent the covering relationship between descriptive models. A rule-map provides a strategy for selecting detecting descriptive models by means of the covering relationship and its structure is adjustable with the change in a situation. Then, a real-time information inconsistencies detection method, named RMDID, is developed based on the rule-map technique, which can take full advantage of multiple descriptive models. Finally, the proposed RMDID method is tested through two real cases. Experiments indicate that the proposed rule-map technique can trace the changes of a dynamic decision-making situation and the developed RMDID method can efficiently detect potential anomalies in real-time information.
Mazalek, A & Van Den Hoven, E 2009, 'Framing tangible interaction frameworks', AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, vol. 23, no. 3, pp. 225-235.
View/Download from: Publisher's site
View description>>
Tangible interaction is a growing area of human-computer interaction research that has become popular in recent years. Yet designers and researchers are still trying to comprehend and clarify its nature, characteristics, and implications. One approach has been to create frameworks that help us look back at and categorize past tangible interaction systems, and look forward at the possibilities and opportunities for developing new systems. To date, a number of different frameworks have been proposed that each provide different perspectives on the tangible interaction design space, and which can guide designers of new systems in different ways. In this paper, we map the space of tangible interaction frameworks.We order existing frameworks by their general type, and by the facets of tangible interaction design they address. One of our main conclusions is that most frameworks focus predominantly on the conceptual design of tangible systems, whereas fewer frameworks abstract the knowledge gained from previous systems, and hardly any framework provides concrete steps or tools for building new tangible systems. In addition, the facets most represented in existing frameworks are those that address the interactions with or the physicality of the designed systems. Other facets, such as domain-specific technology and experience, are rare. This focus on design, interaction, and physicality is interesting, as the origins of the field are rooted in engineering methods and have only recently started to incorporate more design-inspired approaches. As such, we expected more frameworks to focus on technologies and to provide concrete building suggestions for new tangible interaction systems.
McGregor, C & Maeder, A 2009, 'eHealth and services computing in healthcare', Journal of Theoretical and Applied Electronic Commerce Research, vol. 4, no. 2.
Medelyan, O, Milne, D, Legg, C & Witten, IH 2009, 'Mining meaning from Wikipedia', International Journal of Human-Computer Studies, vol. 67, no. 9, pp. 716-754.
View/Download from: Publisher's site
MERIGO, J & GILLAFUENTE, A 2009, 'The induced generalized OWA operator', Information Sciences, vol. 179, no. 6, pp. 729-741.
View/Download from: Publisher's site
Merigó, JM & Casanovas, M 2009, 'Geometric operators in decision making with minimization of regret', World Academy of Science Engineering and Technology, vol. 39, pp. 514-521.
View description>>
We study different types of aggregation operators and the decision making process with minimization of regret. We analyze the original work developed by Savage and the recent work developed by Yager that generalizes the MMR method creating a parameterized family of minimal regret methods by using the ordered weighted averaging (OWA) operator. We suggest a new method that uses different types of geometric operators such as the weighted geometric mean or the ordered weighted geometric operator (OWG) to generalize the MMR method obtaining a new parameterized family of minimal regret methods. The main result obtained in this method is that it allows to aggregate negative numbers in the OWG operator. Finally, we give an illustrative example.
Merigó, JM & Casanovas, M 2009, 'Induced aggregation operators in decision making with the Dempster-Shafer belief structure', International Journal of Intelligent Systems, vol. 24, no. 8, pp. 934-954.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 2009, 'OWA operators in generalized distances', World Academy of Science, Engineering and Technology, vol. 33, pp. 866-873.
View description>>
Different types of aggregation operators such as the ordered weighted quasi-arithmetic mean (Quasi-OWA) operator and the normalized Hamming distance are studied. We introduce the use of the OWA operator in generalized distances such as the quasiarithmetic distance. We will call these new distance aggregation the ordered weighted quasi-arithmetic distance (Quasi-OWAD) operator. We develop a general overview of this type of generalization and study some of their main properties such as the distinction between descending and ascending orders. We also consider different families of Quasi-OWAD operators such as the Minkowski ordered weighted averaging distance (MOWAD) operator, the ordered weighted averaging distance (OWAD) operator, the Euclidean ordered weighted averaging distance (EOWAD) operator, the normalized quasi-arithmetic distance, etc.
Mo, T, Wang, Z, Xu, X & Wang, X 2009, 'A Virtualization-Based Service System Development Method', Journal of Service Science and Management, vol. 02, no. 01, pp. 1-9.
View/Download from: Publisher's site
Molina, B, Pileggi, SF, Esteve, M & Palau, CE 2009, 'A negotiation framework for content distribution in mobile transient networks', Journal of Network and Computer Applications, vol. 32, no. 5, pp. 1000-1011.
View/Download from: Publisher's site
Ngo, HH, Chuang, H, Guo, WS, Ho, DP, Pham, TTN, Johnston, A, Lim, R & Listowski, A 2009, 'Resident's strategy survey on a new end use of recycled water in Australia', DESALINATION AND WATER TREATMENT, vol. 11, no. 1-3, pp. 93-97.
View/Download from: Publisher's site
View description>>
The concept of using recycled water for washing machine was introduced as a new end use. As there is a noticeable lack social research in understanding the general public perceptions of this application, the resident's strategy survey was carried out at some selective suburbs in Sydney with demographically based significant differences of general, gender, age, education, and property style and ownership. The survey indicates that the majority in the community considers the use of recycled water for washing machine is indispensable in view of continuing drought and the associated water shortages. Given safety assurance and demonstration, recycled water for washing machine has a considerable proportion within the responses. The general level of knowledge in community clearly understand that recycled water is more environmentally friendly option, whereas from cleanness and public health point of view, higher quality water is required to be reused in washing machine. Moreover, the residents reckon to have a small unit for pre-treatment (point of use) before recycled water entering washing machines might assure the quality and safety. The survey also shows the major concerns for a resident to use recycled water for washing machine are public health, water cleanness and washing machine durability. © 2009 Desalination Publications.
Percival, J, Catley, C, McGregor, C & James, A 2009, 'A Design for Modelling the Impact of Information and Communication Technologies on Patient Journeys in Neonatal Intensive Care Units', Studies in Computational Intelligence, vol. 189, pp. 147-169.
View/Download from: Publisher's site
View description>>
This paper presents the conceptual model of a survey and knowledge translation methodology to enable the assessment of the implementation of technology in neonatal intensive care units (NICUs) in order to determine the impact of information technology (IT) on information flows and patient care. Survey data, will be completed by healthcare practitioners from multiple roles, for various patient care scenarios, levels of care, and hospitals, and will then be translated using a structured data modelling approach into patient journey models. The data model is defined such that users can develop queries to generate patient journey models based on a pre-defined Patient Journey Model Architecture (PaJMa). PaJMa models will then be analyzed to build a visual representation of information flows and the use of IT in the NICU. The models will offer a sophisticated view of health informatics usage, providing not only details of what IT solutions a hospital utilizes, but also the impact that the IT solutions have when integrated into the patient journey, how they support the patient information flow, and why they improve the patient journey. © 2009 Springer-Verlag Berlin Heidelberg.
Pietroni, N, Ganovelli, F, Cignoni, P & Scopigno, R 2009, 'Splitting cubes: a fast and robust technique for virtual cutting.', Vis. Comput., vol. 25, pp. 227-239.
View/Download from: Publisher's site
Riedel, S & Gabrys, B 2009, 'Pooling for Combination of Multilevel Forecasts', IEEE Transactions on Knowledge and Data Engineering, vol. 21, no. 12, pp. 1753-1766.
View/Download from: Publisher's site
Roska, T, Arena, P, Lin, C & Tetzlaff, R 2009, 'Special issue on cellular wave computing architectures, Part II', International Journal of Circuit Theory and Applications, vol. 37, no. 4, pp. 503-504.
View/Download from: Publisher's site
Ruta, D & Gabrys, B 2009, 'A framework for machine learning based on dynamic physical fields', Natural Computing, vol. 8, no. 2, pp. 219-237.
View/Download from: Publisher's site
View description>>
Despite recent successes and advancements in artificial intelligence and machine learning, this domain remains under continuous challenge and guidance from phenomena and processes observed in natural world. Humans remain unsurpassed in their efficiency of dealing and learning from uncertain information coming in a variety of forms, whereas more and more robust learning and optimisation algorithms have their analytical engine built on the basis of some nature-inspired phenomena. Excellence of neural networks and kernel-based learning methods, an emergence of particle-, swarms-, and social behaviour-based optimisation methods are just few of many facts indicating a trend towards greater exploitation of nature inspired models and systems. This work intends to demonstrate how a simple concept of a physical field can be adopted to build a complete framework for supervised and unsupervised learning methodology. An inspiration for artificial learning has been found in the mechanics of physical fields found on both micro and macro scales. Exploiting the analogies between data and charged particles subjected to gravity, electrostatic and gas particle fields, a family of new algorithms has been developed and applied to classification, clustering and data condensation while properties of the field were further used in a unique visualisation of classification and classifier fusion models. The paper covers extensive pictorial examples and visual interpretations of the presented techniques along with some comparative testing over well-known real and artificial datasets. © Springer Science+Business Media B.V. 2007.
Saito, S, Tilma, T, Devitt, SJ, Nemoto, K & Semba, K 2009, 'Experimentally realizable controlled NOT gate in a flux qubit/resonator system', Physical Review B, vol. 80, no. 22.
View/Download from: Publisher's site
Shepherd, D & Bremner, MJ 2009, 'Temporally unstructured quantum computation', PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, vol. 465, no. 2105, pp. 1413-1439.
View/Download from: Publisher's site
View description>>
We examine theoretic architectures and an abstract model for a restricted class of quantum computation, called here temporally unstructured ('instantaneous') quantum computation because it allows for essentially no temporal structure within the quantum dynamics. Using the theory of binary matroids, we argue that the paradigm is rich enough to enable sampling from probability distributions that cannot, classically, be sampled efficiently and accurately. This paradigm also admits simple interactive proof games that may convince a sceptic of the existence of truly quantum effects. Furthermore, these effects can be created using significantly fewer qubits than are required for running Shor's algorithm. This journal is © 2009 The Royal Society.
Taylor, JG, Cheuk, AT, Tsang, PS, Chung, J-Y, Song, YK, Desai, K, Yu, Y, Chen, Q-R, Shah, K, Youngblood, V, Fang, J, Kim, SY, Yeung, C, Helman, LJ, Mendoza, A, Ngo, V, Staudt, LM, Wei, JS, Khanna, C, Catchpoole, D, Qualman, SJ, Hewitt, SM, Merlino, G, Chanock, SJ & Khan, J 2009, 'Identification of FGFR4-activating mutations in human rhabdomyosarcomas that promote metastasis in xenotransplanted models', JOURNAL OF CLINICAL INVESTIGATION, vol. 119, no. 11, pp. 3395-3407.
View/Download from: Publisher's site
View description>>
Rhabdomyosarcoma (RMS) is a childhood cancer originating from skeletal muscle, and patient survival is poor in the presence of metastatic disease. Few determinants that regulate metastasis development have been identified. The receptor tyrosine kinase FGFR4 is highly expressed in RMS tissue, suggesting a role in tumorigenesis, although its functional importance has not been defined. Here, we report the identification of mutations in FGFR4 in human RMS tumors that lead to its activation and present evidence that it functions as an oncogene in RMS. Higher FGFR4 expression in RMS tumors was associated with advanced-stage cancer and poor survival, while FGFR4 knockdown in a human RMS cell line reduced tumor growth and experimental lung metastases when the cells were transplanted into mice. Moreover, 6 FGFR4 tyrosine kinase domain mutations were found among 7 of 94 (7.5%) primary human RMS tumors. The mutants K535 and E550 increased autophosphorylation, Stat3 signaling, tumor proliferation, and metastatic potential when expressed in a murine RMS cell line. These mutants also transformed NIH 3T3 cells and led to an enhanced metastatic phenotype. Finally, murine RMS cell lines expressing the K535 and E550 FGFR4 mutants were substantially more susceptible to apoptosis in the presence of a pharmacologic FGFR inhibitor than the control cell lines expressing the empty vector or wild-type FGFR4. Together, our results demonstrate that mutationally activated FGFR4 acts as an oncogene, and these are what we believe to be the first known mutations in a receptor tyrosine kinase in RMS. These findings support the potential therapeutic targeting of FGFR4 in RMS.
Thongkam, J, Xu, G, Zhang, Y & Huang, F 2009, 'Toward breast cancer survivability prediction models through improving training space', Expert Systems with Applications, vol. 36, no. 10, pp. 12200-12209.
View/Download from: Publisher's site
View description>>
Due to the difficulties of outlier and skewed data, the prediction of breast cancer survivability has presented many challenges in the field of data mining and pattern precognition, especially in medical research. To solve these problems, we have proposed a hybrid approach to generating higher quality data sets in the creation of improved breast cancer survival prediction models. This approach comprises two main steps: (1) utilization of an outlier filtering approach based on C-Support Vector Classification (C-SVC) to identify and eliminate outlier instances; and (2) application of an over-sampling approach using over-sampling with replacement to increase the number of instances in the minority class. In order to assess the capability and effectiveness of the proposed approach, several measurement methods including basic performance (e.g., accuracy, sensitivity, and specificity), Area Under the receiver operating characteristic Curve (AUC) and F-measure were utilized. Moreover, a 10-fold cross-validation method was used to reduce the bias and variance of the results of breast cancer survivability prediction models. Results have indicated that the proposed approach leads to improving the performance of breast cancer survivability prediction models by up to 28.34% due to the improved training data space.
Vilariño, DL, Ferrer, DC, Sánchez, VMB, Tetzlaff, R & Lin, C-T 2009, 'CNN Technology for Spatiotemporal Signal Processing', EURASIP Journal on Advances in Signal Processing, vol. 2009, no. 1.
View/Download from: Publisher's site
Voinov, A & Cardwell, H 2009, 'The Energy‐Water Nexus: Why Should We Care?', Journal of Contemporary Water Research & Education, vol. 143, no. 1, pp. 17-29.
View/Download from: Publisher's site
Wang, C, Lu, J & Zhang, G 2009, 'Web ontology data matching for integration: method and framework', International Journal of Web Information Systems, vol. 5, no. 2, pp. 220-238.
View/Download from: Publisher's site
View description>>
PurposeMatching relevant ontology data for integration is vitally important as the amount of ontology data increases along with the evolving Semantic web, in which data are published from different individuals or organizations in a decentralized environment. For any domain that has developed a suitable ontology, its ontology annotated data (or simply ontology data) from different sources often overlaps and needs to be integrated. The purpose of this paper is to develop intelligent web ontology data matching method and framework for data integration.Design/methodology/approachThis paper develops an intelligent matching method to solve the issue of ontology data matching. Based on the matching method, it also proposes a flexible peer‐to‐peer framework to address the issue of ontology data integration in a distributed Semantic web environment.FindingsThe proposed matching method is different from existing data matching or merging methods applied to data warehouse in that it employs a machine learning approach and more similarity measurements by exploring ontology features.Research limitations/implicationsThe proposed method and framework will be further tested for some more complicated real cases in the future.Originality/valueThe experiments show that this proposed intelligent matching method increases ontology data matching accuracy.
Wolf, SJ, Wakelin, LPG, He, Z, Stewart, BW & Catchpoole, DR 2009, 'In vitro assessment of novel transcription inhibitors and topoisomerase poisons in rhabdomyosarcoma cell lines', Cancer Chemotherapy and Pharmacology, vol. 64, no. 6, pp. 1059-1069.
View/Download from: Publisher's site
View description>>
Purpose: Rhabdomyosarcoma (RMS) is the most common soft tissue sarcoma in children. Current chemotherapy regimes include the topoisomerase II poison etoposide and the transcription inhibitor actinomycin D. Poor clinical response necessitate identification of new agents to improve patient outcomes. Methods: We assessed the in vitro cytotoxicity (MTT assay) of DNA intercalating agents in five established human RMS cell lines. These include novel classes of transcription inhibitors and topoisomerase poisons, previously shown to have potential as anti-cancer agents. Results: Amongst the former agents, bisintercalating bis(9-aminoacridine-4-carboxamides) linked through the 9-position, and bis(phenazine-1-carboxamides) linked via their side chains, are compared with established transcription inhibitors. Amongst the latter, monofunctional acridine-4-carboxamides related to N-[2-(dimethylamino)ethyl] acridine-4-carboxamide, DACA, are compared with established topoisomerase poisons. Conclusions: Our findings specifically highlight the topoisomerase poison 9-amino-DACA, its 5-methylsulphone derivative, AS-DACA, and the bis(phenazine-1-carboxamide) transcription inhibitor MLN944/XR5944, currently in phase I trial, as candidates for further research into new agents for the treatment of RMS. © 2009 Springer-Verlag.
Ying, M & Feng, Y 2009, 'An Algebraic Language for Distributed Quantum Computing', IEEE TRANSACTIONS ON COMPUTERS, vol. 58, no. 6, pp. 728-743.
View/Download from: Publisher's site
View description>>
A classical circuit can be represented by a circuit graph or equivalently by a Boolean expression. The advantage of a circuit graph is that it can help us to obtain an intuitive understanding of the circuit under consideration, whereas the advantage of a Boolean expression is that it is suited to various algebraic manipulations. In the literature, however, quantum circuits are mainly drawn as circuit graphs, and a formal language for quantum circuits that has a function similar to that of Boolean expressions for classical circuits is still missing. Certainly, quantum circuit graphs will become unmanageable when complicated quantum computing problems are encountered, and in particular, when they have to be solved by employing the distributed paradigm where complex quantum communication networks are involved. In this paper, we design an algebraic language for formally specifying quantum circuits in distributed quantum computing. Using this language, quantum circuits can be represented in a convenient and compact way, similar to the way in which we use Boolean expressions in dealing with classical circuits. Moreover, some fundamental algebraic laws for quantum circuits expressed in this language are established. These laws form a basis of rigorously reasoning about distributed quantum computing and quantum communication protocols. © 2009 IEEE.
Ying, M, Feng, Y, Duan, R & Ji, Z 2009, 'An Algebra of Quantum Processes', ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, vol. 10, no. 3, pp. 1-36.
View/Download from: Publisher's site
View description>>
We introduce an algebra qCCS of pure quantum processes in which communications by moving quantum states physically are allowed and computations are modeled by super-operators, but no classical data is explicitly involved. An operational semantics of qCCS is presented in terms of (nonprobabilistic) labeled transition systems. Strong bisimulation between processes modeled in qCCS is defined, and its fundamental algebraic properties are established, including uniqueness of the solutions of recursive equations. To model sequential computation in qCCS, a reduction relation between processes is defined. By combining reduction relation and strong bisimulation we introduce the notion of strong reduction-bisimulation, which is a device for observing interaction of computation and communication in quantum systems. Finally, a notion of strong approximate bisimulation (equivalently, strong bisimulation distance) and its reduction counterpart are introduced. It is proved that both approximate bisimilarity and approximate reduction-bisimilarity are preserved by various constructors of quantum processes. This provides us with a formal tool for observing robustness of quantum processes against inaccuracy in the implementation of its elementary gates. © 2009 ACM.
Yucheng Dong, Yinfeng Xu & Shui Yu 2009, 'Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model', IEEE Transactions on Fuzzy Systems, vol. 17, no. 6, pp. 1366-1378.
View/Download from: Publisher's site
Zandieh, M, Azadeh, A, Hadadi, B & Saberi, M 2009, 'Application of Artificial Neural Networks for Airline Number of Passenger Estimation in Time Series State', Journal of Applied Sciences, vol. 9, no. 6, pp. 1001-1013.
View/Download from: Publisher's site
View description>>
This study presents an integrated Artificial Neural Networks (ANN) to estimate and predict airline number of passenger in Iran. All type of ANN-Multi Layer Perceptron (MLP) is examined to this estimation. The ANN models are implemented on MATLAB software. Auto-Correlation Function (ACF) is utilized to define input variables. Finally, the best type of ANN-MLP is determined with Data Envelopment Analysis (DEA). Kruskal-Wallis test is used for asses the impact of raw data, preprocessed data and post process method on ANN performance. Monthly airline number of passenger of Iran airline from 1993 to 2005 is considered as the case of this study. © 2009 Asian Network for Scientific Information.
Zhang, G & Lu, J 2009, 'A linguistic intelligent user guide for method selection in multi-objective decision support systems', INFORMATION SCIENCES, vol. 179, no. 14, pp. 2299-2308.
View/Download from: Publisher's site
View description>>
Some multi-objective decision-making (MODM) methods are more effective than others for particular decision problems and/or particular decision makers. It is therefore necessary to provide a set of MODM methods in a multi-objective decision support system (MODSS) to support a wide range of problem solving. However, it is always difficult for decision makers to select the most suitable method for individual cases because MODM methods involve a deep knowledge of mathematics. To handle this difficulty, this study develops a MODM method selection guide supported by a fuzzy matching optimization method. In this paper, we first present the modelling process for the knowledge of characteristics of the main MODM methods. We then present related matching techniques between the characteristics of a real-world decision-making situation and a set of predefined situation descriptions (characteristics of a MODM method) where the elements of the two sets may be expressed by linguistic terms. Based on this process, a fuzzy matching optimization-based MODM method selection approach is proposed. The approach applies general fuzzy numbers, fuzzy distance, fuzzy multi-criteria decision-making concepts, and rule-based inference techniques to recommend the most suitable method from a MODM method-base. The approach is adopted in a linguistic intelligent user guide within a MODSS. Experiments have shown that the development of the linguistic intelligent user guide can increase the ability of the MODSS to support decision makers in arriving at a satisfactory solution in a most effective way. © 2009 Elsevier Inc. All rights reserved.
Zhang, G, Dillon, TS, Cai, K-Y, Ma, J & Lu, J 2009, 'Operation properties and delta-equalities of complex fuzzy sets', INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, vol. 50, no. 8, pp. 1227-1249.
View/Download from: Publisher's site
View description>>
A complex fuzzy set is a fuzzy set whose membership function takes values in the unit circle in the complex plane. This paper investigates various operation properties and proposes a distance measure for complex fuzzy sets. The distance of two complex fuzzy sets measures the difference between the grades of two complex fuzzy sets as well as that between the phases of the two complex fuzzy sets. This distance measure is then used to define δ-equalities of complex fuzzy sets which coincide with those of fuzzy sets already defined in the literature if complex fuzzy sets reduce to real-valued fuzzy sets. Two complex fuzzy sets are said to be δ-equal if the distance between them is less than 1 - δ. This paper shows how various operations between complex fuzzy sets affect given δ-equalities of complex fuzzy sets. An example application of signal detection demonstrates the utility of the concept of δ-equalities of complex fuzzy sets in practice. © 2009 Elsevier Inc. All rights reserved.
Zhang, G, Ma, J & Lu, J 2009, 'Emergency management evaluation by a fuzzy multi-criteria group decision support system', STOCHASTIC ENVIRONMENTAL RESEARCH AND RISK ASSESSMENT, vol. 23, no. 4, pp. 517-527.
View/Download from: Publisher's site
View description>>
Emergency risk management (ERM) is a process which involves dealing with risks to the community arising from emergency events. Emergency management evaluation as one of the important parts of ERM aims assessing and improving social preparedness and organizational ability in identifying, analyzing, and treating emergency risks. This study first develops an emergency management evaluation model. It then proposes an extended fuzzy multi-criteria group evaluation method, which can deal with both subjective and objective criteria under multi-levels by a group of evaluators, for emergency management evaluation. A fuzzy multi-criteria group decision support system (FMCGDSS) is then developed to implement the proposed method for the case of emergency operating center/system evaluation. © Springer-Verlag 2008.
Zhang, Y & Xu, G 2009, 'On web communities mining and recommendation', Concurrency and Computation: Practice and Experience, vol. 21, no. 5, pp. 561-582.
View/Download from: Publisher's site
View description>>
AbstractBecause of the lack of a uniform schema for web documents and the sheer amount and dynamics of web data, both the effectiveness and the efficiency of information management and retrieval of web data are often unsatisfactory when using conventional data management and searching techniques. To address this issue, we have adopted web mining and web community analysis approaches. On the basis of the analysis of web document contents, hyperlinks analysis, user access logs and semantic analysis, we have developed various approaches or algorithms to construct and analyze web communities, and to make recommendations. This paper will introduce and discuss several approaches on web community mining and recommendation. Copyright © 2009 John Wiley & Sons, Ltd.
Zhang, Y, Wang, D, Lee, R-P, Henning, SM & Heber, D 2009, 'Absence of Pomegranate Ellagitannins in the Majority of Commercial Pomegranate Extracts: Implications for Standardization and Quality Control', Journal of Agricultural and Food Chemistry, vol. 57, no. 16, pp. 7395-7400.
View/Download from: Publisher's site
Zheng, Z, Lu, J, Zhang, G & He, Q 2009, 'Rule sets based bilevel decision model and algorithm', EXPERT SYSTEMS WITH APPLICATIONS, vol. 36, no. 1, pp. 18-26.
View/Download from: Publisher's site
View description>>
Bilevel decision addresses the problem in which two levels of decision makers, each tries to optimize their individual objectives under certain constraints, act and react in an uncooperative, sequential manner. As bilevel decision making often involves many uncertain factors in real world problems, it is hard to formulate the objective functions and constraints of the leader and the follower in modelling a real bilevel decision problem. This study explores a new approach that uses rule sets to formulate a bilevel decision problem. It first develops related theories to prove the feasibility to model a bilevel decision problem by rule sets. It then proposes an algorithm to describe the modelling process. A case study is discussed to illustrate the functions and effectiveness of the proposed rule sets based bilevel decision modelling algorithm. © 2007 Elsevier Ltd. All rights reserved.
Zihlif, M, Catchpoole, DR, Stewart, BW & Wakelin, LPG 2009, 'Effects of DNA threading bis(9-aminoacridine-4-carboxamides) on global gene expression.', Cancer Genomics Proteomics, vol. 6, no. 6, pp. 317-323.
View description>>
The capacity of series of DNA-threading bis(9-aminoacridine-4-carboxamides) comprising ethylmorpholino, ethylpiperidine and N-methylpiperidin-4-yl sidechains joined by different linkers, to modulate gene expression in human leukaemia cells was investigated. The chosen compounds provided the opportunity for probing the relationships between the structure ligand structure and the drug effects on transcription, information that might lead to a greater understanding of their potential as antitumour agents. As revealed by DNA microarray analysis of 6000 genes, at equitoxic doses, 5xIC(50) values for growth inhibition, all of the drugs perturb transcription, resulting in both up- and down-regulation of many hundreds of genes, 24 h after drug exposure. Under these conditions, the capacity to inhibit transcription decreases in the order C3NC3 morpholino > C2pipC2 morpholino > C8 piperidine > C8NMP > C2pipC2 piperidine. Cluster analysis segregated the examined agents into two groups: the first included C2pipC2 morpholino and C3NC3 morpholino and the second C2pipC2 piperidine, C8 piperidine and C8NMP. This classification agreed with the ontological analysis for the markedly up-regulated genes that showed a relatively specific profile for each group. Interestingly, the general up-regulation responses for the first group (C3NC3 morpholino and C2pipC2 morpholino) indicated marked up-regulation amongst the transcription gene set, which suggests that the transcription machinery is the main target for the members of this group. While in the second group (C2pipC2 piperidine, C8 piperidine, C8NMP), the general up-regulation responses for the three agents are dominated by the protein modification process ontological class, implying at least involvement of topoisomerase poisoning in their mode of action.
Ab Aziz, R, Zowghi, D & McBride, T 1970, 'Towards a classification of requirements relationships', Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, International Conference on Software Engineering and Knowledge Engineering, Knowledge Systems Institute Graduate School, Boston, Massachusetts, pp. 26-32.
View description>>
Requirements are related to and affect each other in many different ways. Developing a comprehensive knowledge of these relationships is an important part of understanding requirements. This paper proposes a classification of requirements relationships from several perspectives such as Feature Oriented, Aspect Oriented and Goal Oriented Approaches. We compare and contrast these relationship classifications and provide examples of each to increase our understanding of this complex phenomenon. This paper aims at integrating requirements relationship classifications from major bodies of work in requirements engineering and to improve awareness on the role they play in software testing practices.
Ab Aziz, R, Zowghi, D & McBride, TM 1970, 'Towards a Classification of Requirements Relationships', Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE 2009), International Conference on Software Engineering and Knowledge Engineering, Knowledge Systems Institute Graduate School, Boston, Massachusetts, USA, pp. 26-32.
View description>>
Requirements are related to and affect each other in many different ways. Developing a comprehensive knowledge of these relationships is an important part of understanding requirements. This paper proposes a classification of requirements relationships from several perspectives such as Feature Oriented, Aspect Oriented and Goal Oriented Approaches. We compare and contrast these relationship classifications and provide examples of each to increase our understanding of this complex phenomenon. This paper aims at integrating requirements relationship classifications from major bodies of work in requirements engineering and to improve awareness on the role they play in software testing practices.
Al-hassan, M, Lu, H & Lu, J 1970, 'A framework for delivering personalized e-government services from a citizen-centric approach', Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, iiWAS '09: 11th International Conference on Information Integration and Web-based Applications & Services, ACM, Kuala Lumpur, Malaysia, pp. 436-440.
View/Download from: Publisher's site
View description>>
E-government is becoming more attentive towards providing intelligent personalized online services to citizens so that citizens can receive better services with less time and effort. This paper proposes a new conceptual framework for delivering personalized e-government services to citizens from a citizen-centric approach, called Pe-Gov service framework. This framework outlines the main components and their interconnections. Detailed explanations about these components are given and the special features of this framework are highlighted. This framework has the potential to outperform the existing e-Gov service systems as illustrated by two real life examples.
Antle, AN, Corness, G, Bakker, S, Droumeva, M, van den Hoven, E, Bevans, A & ACM 1970, 'Designing to Support Reasoned Imagination through Embodied Metaphor', C & C 09: PROCEEDINGS OF THE 2009 ACM SIGCHI CONFERENCE ON CREATIVITY AND COGNITION, C&C' 09, ACM, Berkeley, CA, USA, pp. 275-284.
View/Download from: Publisher's site
View description>>
Supporting users' reasoned imagination in sense making during interaction with tangible and embedded computation involves supporting the application of their existing mental schemata in understanding new forms of interaction. Recent studies that include an embodied metaphor in the interaction model, which relates action-based inputs to digital outputs, have provided evidence that this approach is beneficial. Yet the design of such systems has been difficult and full of setbacks. Wide spread adoption of this approach requires a better understanding of how to design such embodied metaphor-based interactional models. We analyze three recent design-based research studies in which we have been involved in order to derive design knowledge that may inform others. Following a case study methodology we identify kernels or points in the design process where discontinuities between predicted and actual interaction highlight important design knowledge.
Ashamalla, AN, Beydoun, G & Low, G 1970, 'Towards Agent-Oriented Approach to a Call Management System.', ISD, International Conference on Information Systems Development, Springer, Nanchang, China, pp. 345-356.
View/Download from: Publisher's site
View description>>
There is more chance of a completed sale if the end customers and
relationship managers are suitably matched. This in turn can reduce the number
of calls made by a call centre reducing operational costs such as working time and
phone bills. This chapter is part of ongoing research aimed at helping a CMC to
make better use of its personnel and equipment while maximizing the value of the
service it offers to its client companies and end customers. This is accomplished by
ensuring the optimal use of resources with appropriate real-time scheduling and load
balancing and matching the end customers to appropriate relationship managers. In
a globalized market, this may mean taking into account the cultural environment of
the customer, as well as the appropriate profile and/or skill of the relationship manager
to communicate effectively with the end customer. The chapter evaluates the
suitability of a MAS to a call management system and illustrates the requirement
analysis phase using i∗ models.
Bakker, S, Antle, AN & van den Hoven, E 1970, 'Identifying embodied metaphors in children's sound-action mappings', Proceedings of the 8th International Conference on Interaction Design and Children, IDC '09: The 8th International Conference on Interactive Design and Children, ACM, Como, Italy, pp. 140-149.
View/Download from: Publisher's site
View description>>
Physical activity and manipulating physical objects can be beneficial for learning. Earlier studies [2] have shown that interaction models that rely on unconscious and embodied knowledge (based on embodied metaphors) can benefit the learning process. However, more than one embodied metaphor might be applicable. In this paper, we present the results of a user study (n=65) designed to identify embodied metaphors seven to nine year old children use when enacting abstract concepts related to musical sound. The results provide evidence that multiple different embodied metaphors can unconsciously be used to structure the understanding of these concepts. In addition, we have identified and categorized commonly used metaphors based on the children's enactments of changing sound concepts.
Barzinpour, F, Izadbakhsh, HR, Azadeh, A & Saberi, M 1970, 'A Genetic Algorithm for Total Assessment of Telecommunication Sectors', 2009 3RD IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 3rd IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Istanbul, TURKEY, pp. 242-+.
Barzmpour, F, Izadbakhsh, HR, Azadeh, A & Saben, M 1970, 'A genetic algorithm for total assessment of telecommunication sectors', 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. 97-102.
View/Download from: Publisher's site
View description>>
This paper presents a genetic algorithm (GA) to assessment the decision making units (DMU). The Telecommunication sectors based on standards indicators identified by international telecommunication union (ITU) are considered for total assessment by the proposed approach. The indicators are categorized as telephone network size, other services, quality of service, traffic, tariffs, staff, demography, economy, information technology, broadcasting and mobile services. To present the applicability of the proposed approach, data for the year 2003 of 62 developed and developing countries are used. A total of 9 indicators are considered, out of which 4 are inputs and 5 are outputs respectively. The results of GA are verified by Principle Component Analysis (PCA) approach. The results show weak and strong points of each sector and identify the most efficient inputs or outputs, which can aid management in overall assessment. The proposed approach of this study may be easily used for assessment of other sectors. ©2009 IEEE.
Beilharz, KA & Ferguson, S 1970, 'An Interface and Framework Design for interactive Aesthetic Sonification', Proceedings of the 15th International Conference on Auditory Display, International Conference on Auditory Display, Re:New Digital Arts Forum, Copenhagen, Denmark, pp. 1-8.
View description>>
This paper describes the interface design of our AeSon (Aesthetic Sonification) Toolkit motivated by user-centred customisation of the aesthetic representation and scope of the data. The interface design is developed from 3 premises that distinguish our approach from more ubiquitous sonification methodologies. Firstly, we prioritise interaction both from the perspective of changing scale, scope and presentation of the data and the user's ability to reconfigure spatial panning, modality, pitch distribution, critical thresholds and granularity of data examined. The user, for the majority of parameters, determines their own listening experience for real-time data sonification, even to the extent that the interface can be used for live data-driven performance, as well as traditional information analysis and examination. Secondly, we have explored the theories of Tufte, Fry and other visualization and information design experts to find ways in which principles that are successful in the field of information visualization may be translated to the domain of sonification. Thirdly, we prioritise aesthetic variables and controls in the interface, derived from musical practice, aesthetics in information design and responses to experimental user evaluations to inform the design of the sounds and display. In addition to using notions of meter, beat, key or modality and emphasis drawn from music, we draw on our experiments that evaluated the effects of spatial separation in multivariate data presentations.
Beydoun, G 1970, 'Using Formal Concept Analysis towards Cooperative E-Learning', KNOWLEDGE ACQUISITION: APPROACHES, ALGORITHMS AND APPLICATIONS, 10th Pacific Rim International Conference on Artificial Intelligence (PRICAI 2008), SPRINGER-VERLAG BERLIN, Hanoi, VIETNAM, pp. 109-117.
Beydoun, G, Krishna, AK, Ghose, A & Low, GC 1970, 'Towards Ontology-Based MAS Methodologies: Ontology-Based Early Requirements', INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2, 16th International Conference on Information Systems Development, SPRINGER, Natl Univ Ireland, Cairnes Grad Sch Business, Galway, IRELAND, pp. 923-935.
View/Download from: Publisher's site
Bogdanov, A & Qiao, Y 1970, 'On the Security of Goldreich’s One-Way Function', APPROXIMATION, RANDOMIZATION, AND COMBINATORIAL OPTIMIZATION, 12th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems/13th International Workshop on Randomization and Computation, Springer Berlin Heidelberg, Berkeley, CA, pp. 392-405.
View/Download from: Publisher's site
Bogg, P, Beydoun, G & Low, G 1970, 'Problem-Solving Methods in Agent-Oriented Software Engineering.', ISD, International Conference on Information Systems Development, Springer, Nanchang, China, pp. 243-254.
View/Download from: Publisher's site
View description>>
Problem-solving methods (PSM) are abstract structures that describe specific reasoning processes employed to solve a set of similar problems. We envisage that off-the-shelf PSMs can assist in the development of agent-oriented solutions, not only as reusable and extensible components that software engineers employ for designing agent architecture solutions, but just as importantly as a set of runtime capabilities that agents themselves dynamically employ in order to solve problems. This chapter describes PSMs for agent-oriented software engineering (AOSE) that address interaction-dependent problem-solving such as negotiation or cooperation. An extension to an AOSE methodology MOBMAS is proposed whereby PSMs are integrated in the software development phases of MAS Organization Design, Internal Design, and Interaction Design. In this way, knowledge engineering drives the development of agent-oriented systems. © Springer Science+Business Media, LLC 2011.
Bogg, P, Beydoun, G & Low, G 1970, 'TOWARDS PROBLEM SOLVING METHODS IN MULTI-AGENT SYSTEMS', ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 4th International Conference on Software and Data Technologies, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Sofia, BULGARIA, pp. 308-313.
Bor-Chen Kuo, Chun-Hsiang Chuang, Cheng-Hsuan Li & Chin-Teng Lin 1970, 'Subspace selection based multiple classifier systems for hyperspectral image classification', 2009 First Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2009 First Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS), IEEE, Grenoble, FRANCE, pp. 1-4.
View/Download from: Publisher's site
Bremner, MJ 1970, 'Are random pure states useful for quantum computation?', Institute of Mathematics and its Applications Conference on Quantum Computing and Complexity of Quantum Simulation, London.
View description>>
Quantum computing represents the prodigiously fertile union of quantum physics with the theory of computation and especially issues of computational complexity. It is known that quantum processes can offer solutions to some information processing tasks that are exponentially more efficient than any known classical methods. Perhaps the most celebrated example is Shor's 1994 quantum algorithm for integer factorisation. In recent years there has been a surge of activity in our understanding of quantum computational power and its prospective applicability and limitations. A variety of problems in diverse areas of mathematics, has been identified (so-called BQP-complete problems) that have efficient quantum algorithms and also embody the full power of efficient quantum computation. In quantum many body physics (including study of quantum circuits, of local hamiltonians, and of further formalisms such as measurement based computing) some problems have been shown, surprisingly, to admit efficient classical solution while others (e.g. certain ground state properties of local hamiltonians) are likely to be computationally intractible, having been shown to be so-called QMA-complete. Quantum entanglement is often regarded as an essential ingredient in these considerations and there has been considerable development in understanding its scaling behaviour in many body systems. This conference is devoted to recent theoretical developments in these areas and related issues. Invited speakers will be requested to include overview material (in addition to recent research) with the aim of making the essential ideas of these important developments accessible to a broader audience of QIP researchers.
Bremner, MJ 1970, 'Instantaneous quantum computation', Institute of Mathematics and its Applications Conference on Quantum Computing and Complexity of Quantum Simulation, London.
View description>>
Quantum computing represents the prodigiously fertile union of quantum physics with the theory of computation and especially issues of computational complexity. It is known that quantum processes can offer solutions to some information processing tasks that are exponentially more efficient than any known classical methods. Perhaps the most celebrated example is Shor's 1994 quantum algorithm for integer factorisation. In recent years there has been a surge of activity in our understanding of quantum computational power and its prospective applicability and limitations. A variety of problems in diverse areas of mathematics, has been identified (so-called BQP-complete problems) that have efficient quantum algorithms and also embody the full power of efficient quantum computation. In quantum many body physics (including study of quantum circuits, of local hamiltonians, and of further formalisms such as measurement based computing) some problems have been shown, surprisingly, to admit efficient classical solution while others (e.g. certain ground state properties of local hamiltonians) are likely to be computationally intractible, having been shown to be so-called QMA-complete. Quantum entanglement is often regarded as an essential ingredient in these considerations and there has been considerable development in understanding its scaling behaviour in many body systems. This conference is devoted to recent theoretical developments in these areas and related issues. Invited speakers will be requested to include overview material (in addition to recent research) with the aim of making the essential ideas of these important developments accessible to a broader audience of QIP researchers.
Bremner, MJ 1970, 'Instantaneous quantum computation', Twelth Workshop on Quantum Information Processing, Santa Fe, New Mexico, USA.
View description>>
Fifteen years ago, Shor's efficient quantum algorithms for factoring integers and evaluating discrete logarithms launched the field of quantum information processing (QIP) into the public consciousness. QIP is now one of the most active and fastest-growing research areas in computer science and physics, spanning topics such as quantum computation, quantum communication, and quantum cryptography. QIP 2009 is the twelfth in a series of international workshops dedicated to disseminating recent theoretical advances in this field.
Bremner, MJ 1970, 'Most quantum states are useless for measurement-based quantum computation', Twelth Workshop on Quantum Information Processing, Santa Fe, New Mexico, USA.
View description>>
Fifteen years ago, Shor's efficient quantum algorithms for factoring integers and evaluating discrete logarithms launched the field of quantum information processing (QIP) into the public consciousness. QIP is now one of the most active and fastest-growing research areas in computer science and physics, spanning topics such as quantum computation, quantum communication, and quantum cryptography. QIP 2009 is the twelfth in a series of international workshops dedicated to disseminating recent theoretical advances in this field.
Catley, C, Smith, K, McGregor, C & Tracy, M 1970, 'Extending CRISP-DM to incorporate temporal data mining of multidimensional medical data streams: A neonatal intensive care unit case study', 2009 22nd IEEE International Symposium on Computer-Based Medical Systems, 2009 22nd IEEE International Symposium on Computer-Based Medical Systems (CBMS), IEEE, pp. 1-5.
View/Download from: Publisher's site
View description>>
Using a Neonatal Intensive Care Unit (NICU) case study, this work investigates the current CRoss Industry Standard Process for Data Mining (CRISP-DM) approach for modeling Intelligent Data Analysis (IDA)-based systems that perform temporal data mining (TDM). The case study highlights the need for an extended CRISP-DM approach when modeling clinical systems applying Data Mining (DM) and Temporal Abstraction (TA). As the number of such integrated TA/DM systems continues to grow, this limitation becomes significant and motivated our proposal of an extended CRISP-DM methodology to support TDM, known as CRISP-TDM. This approach supports clinical investigations on multi-dimensional time series data. This research paper has three key objectives: 1) Present a summary of the extended CRISP-TDM methodology; 2) Demonstrate the applicability of the proposed model to the NICU data, focusing on the challenges associated with multi-dimensional time series data; and 3) Describe the proposed IDA architecture for applying integrated TDM. ©2009 IEEE.
Catley, C, Smith, K, McGregor, C & Tracy, M 1970, 'Extending CRISP-DM to Incorporate Temporal Data Mining of Multidimensional Medical Data Streams: A Neonatal Intensive Care Unit Case Study', 2009 22ND IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 22nd IEEE International Symposium on Computer-Based Medical Systems, IEEE, NM, Albuquerque, pp. 418-+.
Chen, C, Rigatos, GG, Dong, D & Lam, J 1970, 'Partial feedback control of quantum systems using probabilistic fuzzy estimator', Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, 2009 Joint 48th IEEE Conference on Decision and Control (CDC) and 28th Chinese Control Conference (CCC), IEEE, pp. 3805-3810.
View/Download from: Publisher's site
Chen, P-Y, Van, L-D, Reddy, HC & Lin, C-T 1970, 'A new VLSI 2-D fourfold-rotational-symmetry filter architecture design', 2009 IEEE International Symposium on Circuits and Systems, 2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009, IEEE, Taipei, TAIWAN, pp. 93-96.
View/Download from: Publisher's site
Chen, Y-C, Duann, J-R, Lin, C-L, Chuang, S-W, Jung, T-P & Lin, C-T 1970, 'Motion-Sickness Related Brain Areas and EEG Power Activates', FOUNDATIONS OF AUGMENTED COGNITION, PROCEEDINGS, 5th International Conference on Foundation of Augmented Cognition, Springer Berlin Heidelberg, San Diego, CA, pp. 348-354.
View/Download from: Publisher's site
Chen-Yu Lee, Chin-Teng Lin & Chao-Ting Hong 1970, 'Spatio-temporal analysis in smoke detection', 2009 IEEE International Conference on Signal and Image Processing Applications, 2009 IEEE International Conference on Signal and Image Processing Applications, IEEE, pp. 80-83.
View/Download from: Publisher's site
View description>>
Smoke detection in video surveillance images has been studied for years. However, given an image in open or large spaces with typical smoke and the disturbance of commonly moving objects such as pedestrians or vehicles, robust and efficient smoke detection is still a challenging problem. In this paper, we present a novel and reliable framework for automatic smoke detection. It exploits three features: edge blurring, the gradual change of energy and the gradual change of chromatic configuration. In order to gain proper generalization ability with respect to sparse training samples, the three features are combined using a support vector machine based classifier. This system has been run more than 6 hours in various conditions to verify the reliability of fire safety in the real world.
Cheuk, A, Taylor, J, Tsang, P, Chung, J-Y, Song, Y, Desai, K, Yu, Y, Chen, Q-R, Shah, K, Mendoza, A, Wei, J, Khanna, C, Catchpoole, D, Qualman, S, Hewitt, S, Merlino, G, Chanock, S & Khan, J 1970, 'Identification and characterization of activating mutations in the fibroblast growth factor receptor 4 in rhabdomyosarcoma', CANCER RESEARCH, AMER ASSOC CANCER RESEARCH.
Chuang, S-W, Huang, R-S, Ko, L-W, Jeng, J-L, Duann, J-R, Jung, T-P & Lin, C-T 1970, 'Independent modulators mediate spectra of multiple brain processes in a VR-based driving experiment', SPIE Proceedings, SPIE Defense, Security, and Sensing, SPIE, pp. 73431C-73431C.
View/Download from: Publisher's site
View description>>
This study explores the use of Independent Component Analysis (ICA) applied to normalized logarithmic spectral changes in the activities of brain processes separated by spatial filters learned from electroencephalogram (EEG) data using a temporal ICA. EEG data were collected during 1-2 hour virtual-reality based driving experiments, in which subjects were instructed to maintain their cruising position and compensate for randomly induced drifts using the steering wheel. ICA was first applied to 30-channel EEG data to separate the recorded signals into a sum of maximally temporally independent components (ICs) for each of 15 subjects. Logarithmic spectra of IC activities were then submitted to PCA-ICA to find spectrally fixed and temporally independent modulator (IM) processes. The second ICA detected and modeled independent co-modulatory systems that multiplicatively affect the activities of spatially distinct IC processes. Across subjects, we found two consistent temporally independent modulators: theta-beta and alpha modulators that mediate spectral activations of the distinct cortical areas when the participants experience waves of alternating alertness and drowsiness during long hour simulated driving. Furthermore, the time courses of the theta-beta modulator were highly correlated with concurrent changes in subject driving error (a behavioral index of drowsiness). © 2009 SPIE.
Clancy, M, Caspersen, M & Lister, R 1970, 'ICER'09 - Proceedings of the 2009 ACM Workshop on International Computing Education Research: Foreword', Icer 09 Proceedings of the 2009 ACM Workshop on International Computing Education Research.
Clancy, M, Caspersen, ME & Lister, RF 1970, 'Proceeding of the fifth International workshop on Computing education research', Fifth International Computing Education Research Workshop, International Computing Education Research Workshop, Association for Computing Machinery, Berkeley, CA, USA, pp. 1-165.
View description>>
The fifth International workshop on Computing education research workshop attracted 24 submissions. All papers were double-blind peer-reviewed by members of the international program committee. After the reviewing, 13 papers (54%) were accepted for inclusion in the conference, written by authors across nine countries: Australia, Finland, Germany, Israel, New Zealand, Sweden, the Philippines, the United Kingdom, and the United States of America. The papers spanned a wide variety of topics, including tools and tool use; conceptions, preconceptions, and misconceptions; attitudes; collaborative learning; research categorization; teacher adaptation to new paradigms; and broad-scale adoption of CS innovation.
Dong, H, Hussain, FK & Chang, E 1970, 'A Hybrid Concept Similarity Measure Model for Ontology Environment', ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, On the Move Confederated International Conference and Workshops, Springer-verlag Berlin, Vilamoura, PORTUGAL, pp. 848-857.
View description>>
In this paper, we present a hybrid concept similarity measure model for the ontology environment. Whilst to date many similar technologies have been developed for semantic networks, few of them can be directly applied to the semantic-rich ontology enviro
Dong, H, Hussain, FK & Chang, E 1970, 'Paradox in Applications of Semantic Similarity Models in Information Retrieval', IT REVOLUTIONS, pp. 60-68.
View/Download from: Publisher's site
View description>>
Semantic similarity models are a series of mathematical models for computing semantic similarity values among nodes in a semantic net. In this paper we reveal the paradox in the applications of these semantic similarity models in the field of information retrieval, which is that these models rely on a common prerequisite - the words of a user query must correspond to the nodes of a semantic net. In certain situations, this sort of correspondence can not be carried out, which invalidates the further working of these semantic similarity models. By means of two case studies, we analyze these issues. In addition, we discuss some possible solutions in order to address these issues. Conclusion and future works are drawn in the final section. © 2009 ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
Dong, H, Hussain, FK & Chang, E 1970, 'Semantic Service Search, Service Evaluation and Ranking in Service Oriented Environment', IT REVOLUTIONS, pp. 111-117.
View/Download from: Publisher's site
View description>>
The theory of Service Oriented Environment (SOE) emerges with advanced connectivity of the Internet technologies, openness of business environment and prosperousness of business activities. Service, as a critical object impenetrating every corner of SOE, is a hot research topic in many research domains. Software Engineering (SE), as a subject in engineering field, its researchers pay more attention to supporting advanced technologies for promoting service activities in SOE. In this paper, we draw the position in the research field of semantic service search, service evaluation and ranking in SOE. By means of the case study and literature review research approach, we discover the research motivations and research issues in this field. © 2009 ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
Dong, H, Hussain, FK & Chang, E 1970, 'State of the Art in Semantic Focused Crawlers', COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, International Conference on Computational Science and Its Applications, Springer-verlag Berlin, Seoul, SOUTH KOREA, pp. 910-924.
View description>>
Nowadays, the research of focused crawler approaches the field of semantic web, along with the appearance of increasing semantic web documents and the rapid development of ontology mark-up languages. Semantic focused crawlers are a series of focused craw
Dong, H, Hussain, FK, Chang, E & IEEE 1970, 'A Hybrid Service Metadata Clustering Methodology in the Digital Ecosystem Environment', 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, International Conference on Advanced Information Networking and Applications, IEEE, Bradford, ENGLAND, pp. 238-243.
View/Download from: Publisher's site
View description>>
Digital Ecosystem is defined as 'an open, loosely coupled, domain clustered, demand-driven, self-organizing and agent-based environment, in which each species is proactive and responsive for its own benefit and profit' [1]. Species in the Digital Ecosyst
Dong, H, Hussain, FK, Chang, E & IEEE 1970, 'An Ontology-based Webpage Classification Approach for the Knowledge Grid Environment', 2009 FIFTH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRID (SKG 2009), International Conference on Semantics, Knowledge and Grid, IEEE, Zhuhai, PEOPLES R CHINA, pp. 120-127.
View/Download from: Publisher's site
View description>>
With the rapid growth of the amount of information available in the Web, webpage classification technologies are widely employed by many search engines in order to formulate user queries and make users' search tasks easier. Knowledge Grid is a new form o
Duann, J-R, Chen, P-C, Ko, L-W, Huang, R-S, Jung, T-P & Lin, C-T 1970, 'Detecting Frontal EEG Activities with Forehead Electrodes', FOUNDATIONS OF AUGMENTED COGNITION, PROCEEDINGS, 5th International Conference on Foundation of Augmented Cognition, Springer Berlin Heidelberg, San Diego, CA, pp. 373-379.
View/Download from: Publisher's site
Dunlu Peng, Chen Li & Huan Huo 1970, 'An extended UsernameToken-based approach for REST-style Web Service Security Authentication', 2009 2nd IEEE International Conference on Computer Science and Information Technology, 2009 2nd IEEE International Conference on Computer Science and Information Technology, IEEE, pp. 582-586.
View/Download from: Publisher's site
Dunwell, T, Hesson, L, Catchpoole, D, Maher, E & Latif, F 1970, 'The novel RASSF6 and RASSF10 candidate tumor suppressor genes are frequently epigenetically inactivated in childhood leukemias', CANCER RESEARCH, AMER ASSOC CANCER RESEARCH.
Dunwell, T, Hesson, L, Pavlova, T, Zabarovska, V, Catchpoole, D, Griffiths, M, Maher, E, Zabarovsky, E & Latif, F 1970, 'Epigenetic analysis of childhood acute lymphoblastic leukemia', CANCER RESEARCH, AMER ASSOC CANCER RESEARCH.
Dyson, L, Litchfield, A, Raban, R & Tyler, J 1970, 'mInteract: Online tool for sustainable active experiential mobile learning', Ascilite 2009 the Australasian Society for Computers in Learning in Tertiary Education, pp. 230-232.
View description>>
The rapid evolution and ubiquitous use of mobile devices is an historical opportunity to improve experiential interactivity in education practices to support 'deep' learning. A major barrier to the widespread adoption of mobile learning in higher education is that of cost. Opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. mInteract™ is an online system which uses packet technology to build no-to-low cost interactivity into learning spaces. mInteract supports sustainable active experiential learning transactions for both student and teacher. © 2009 Laurel Dyson, Andrew Litchfield Ryszard Raban and Jon Tyler.
Dyson, LE & Brady, F 1970, 'Mobile Phone Adoption and Use in Lockhart River Aboriginal Community', EIGHTH INTERNATIONAL CONFERENCE ON MOBILE BUSINESS, PROCEEDINGS, 8th International Conference on Mobile Business, IEEE COMPUTER SOC, Dalian, PEOPLES R CHINA, pp. 37-37.
Dyson, LE & Brady, F 1970, 'Mobile Phone Adoption and Use in Lockhart River Aboriginal Community', 2009 Eighth International Conference on Mobile Business, 2009 Eighth International Conference on Mobile Business, IEEE, Dalian, Liaoning, China, pp. 170-175.
View/Download from: Publisher's site
View description>>
This paper reports on an ethnographic study of mobile phone adoption and use in a remote Aboriginal community in Cape York, Australia. The researchers found that, within nine months of the introduction of the 3G network, 58% of the Indigenous people interviewed had acquired a mobile phone, a much higher rate of adoption than any other ICT. The phones were employed for communication, with multimedia uses (music, games, videos, photos) also very popular. Issues included the cost, robustness and usability of the devices, although most people managed costs well by purchasing pre-paid phones. The findings suggest a number of possible initiatives that government, service providers and business could consider to leverage mobile phone usage and develop capacity in the community.
Dyson, LE & Litchfield, AJ 1970, 'The mPortal: Supporting Collaboration to Develop mLearning Strategies for Educational Transformation', 8th World Conference on Mobile and Contextural Learning, World Conference on Mobile and Contextural Learning, University of Florida, Florida USA, pp. 112-118.
View description>>
This paper proposes the establishment of an online portal to influence and support best practice in mLearning. With the growing interest in mLearning to address the learning styles of a generation of students who have grown up with digital technology, and the adoption of mobile technology by Indigenous peoples and in developing countries, there is a need for an accessible body of knowledge of mLearning principles, teaching strategies and case-studies. An mPortal would foster collaboration between researchers and educators and inform emerging national and international approaches to using mobile technologies at all levels of the education sector and across all disciplines.
Dyson, LE, Litchfield, A, Raban, R & Tyler, J 1970, 'Interactive classroom mLearning and the experiential transactions between students and lecturer', ASCILITE Publications, Australasian Society for Computers in Learning in Tertiary Education, pp. 233-242.
View/Download from: Publisher's site
View description>>
This paper seeks to address a major deficit in understandings of mobile learning, that is, its lack of a solid theoretical foundation. An overview of existing theoretical concepts of mobile learning is presented, followed by an analysis of interactive classroom systems and the learning that they provide. The implementation of a specific interactive system mInteract in the lectures of a large accounting subject is described. mInteract is a Web- based system using no-to-low cost data-packet technology and provides for interactions from students’ own Internet-enabled mobile devices. The paper examines, by means of reflections from the lecturer and students, the learning which took place during the implementation. The analysis demonstrates that interactive mobile learning can be interpreted using experiential learning theory, and that both students and lecturers engage in experiential learning. Furthermore, they enter into transactions of knowledge which are facilitated by the mobile learning system.
Dyson, LE, Litchfield, AJ, Raban, R & Tyler, JV 1970, 'Reflections on interactive classroom mLearning and the experiential transactions between students and lecturer', Same places, different spaces. Proceedings ascilite Auckland 2009, Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education, The University of Auckland, Auckland University of Technology, and Australasian Society for Computer, Auckland, New Zealand, pp. 232-242.
View description>>
This paper seeks to address a major deficit in understandings of mobile learning, that is, its lack of a solid theoretical foundation. An overview of existing theoretical concepts of mobile learning is presented, followed by an analysis of interactive classroom systems and the learning that they provide. The implementation of a specific interactive system mInteract in the lectures of a large accounting subject is described. mInteract is a Webbased system using no-to-low cost data-packet technology and provides for interactions from students own Internet-enabled mobile devices. The paper examines, by means of reflections from the lecturer and students, the learning which took place during the implementation. The analysis demonstrates that interactive mobile learning can be interpreted using experiential learning theory, and that both students and lecturers engage in experiential learning. Furthermore, they enter into transactions of knowledge which are facilitated by the mobile learning system.
Eastwood, M & Gabrys, B 1970, 'A Non-sequential Representation of Sequential Data for Churn Prediction', KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT I, PROCEEDINGS, 13th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Univ Chile, Fac Phys Sci & Math, Santiago, CHILE, pp. 209-218.
View/Download from: Publisher's site
Fachrunnisa, O, Hussain, FK & Chang, E 1970, 'Current research trends and directions for future research in trust maintenance for virtual environments', Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, iiWAS '09: 11th International Conference on Information Integration and Web-based Applications & Services, ACM, pp. 718-724.
View/Download from: Publisher's site
View description>>
Trust is widely acknowledged as being important for the efficient and effective operation of business in virtual environments. This is because trust functions like a glue that holds and links virtual agents together as they relate and collaborate remotely. In virtual environments, trust needs to be established swiftly as there is little time to build it gradually in the absence of face-to-face meetings. However, the manner in which trust develops and is maintained is a critical factor in relationships, both physically and virtually. In virtual environments, trust needs to be managed including network connection as well as social aspects of interaction. Maintaining trust in virtual environments is defined as an effort to maximize the benefits of such virtual relationship and to prevent the level of trust from decreasing. In this paper, we undertake a general survey of the current situation of trust maintenance in virtual environments. We review several researches from the perspective of terminology, strategies presented, and types of strategies. We describe the benefits and shortcomings of each strategy, conduct an integrative review of these strategic approaches, and make suggestions for future research. © 2010 ACM.
Fan, J, Zhou, W, Han, Y & Zhang, G 1970, 'Efficient Algorithms to Embed Hamiltonian Paths and Cycles in Faulty Crossed Cubes', ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 4th International Conference on Computer Science and Education, IEEE, PEOPLES R CHINA, Nanning, pp. 1837-1842.
Ferguson, S & Beilharz, K 1970, 'An interface for live interactive sonification', Proceedings of the International Conference on New Interfaces for Musical Expression, New Interfaces for Musical Expression, NIME, Pittsburgh PA, pp. 35-36.
View description>>
Sonification is generally considered in a statistical data analysis context. This research discusses the development of an interface for live control of sonification – for controlling and altering sonifications over the course of their playback. This is designed primarily with real-time sources in mind, rather than with static datasets, and is intended as a performative, live data-art creative activity. The interface enables the performer to use the interface as an instrument for iterative interpretations and variations of sonifications of multiple datastreams. Using the interface, the performer can alter the scale, granularity, timbre, hierarchy of elements, spatialisation, spectral filtering, key/modality, rhythmic distribution and register ‘on-the-fly’ to both perform data-generated music, and investigate data in a live exploratory, interactive manner.
Ferguson, S & Cabrera, D 1970, 'Auditory spectral summarisation for audio signals with musical applications', Proceedings of the 10th International Society for Music Information Retrieval Conference Ismir 2009, International Symposium for Music Information Retrieval, International Society on Music Information Retrieval, Kobe, Japan, pp. 567-572.
View description>>
Methods for spectral analysis of audio signals and their graphical display are widespread. However, assessing music and audio in the visual domain involves a number of challenges in the translation between auditory images into mental or symbolically represented concepts. This paper presents a spectral analysis method that exists entirely in the auditory domain, and results in an auditory presentation of a spectrum. It aims to strip a segment of audio signal of its temporal content, resulting in a quasi-stationary signal that possesses a similar spectrum to the original signal. The method is extended and applied for the purpose of music summarisation. © 2009 International Society for Music Information Retrieval.
Fis, AM & Cetindamar, D 1970, 'Unlocking the relationship between corporate entrepreneurship and performance', PICMET '09 - 2009 Portland International Conference on Management of Engineering & Technology, Technology, IEEE, pp. 1819-1830.
View/Download from: Publisher's site
View description>>
Corporate entrepreneurship is the implementation of a value creation process in an organizational setting. Consistent with the Schumpeterian understanding of entrepreneurship, a "new combination" that should directly affect the performance of the firm is formed; and the process of forming this new combination manifests itself as an outcome of a complex social mechanism affected by internal and external factors. However, in spite of the biasing anecdotal evidence, conventional wisdom, and tendency in favor of entrepreneurship, a "black box" between firm-level entrepreneurship and performance has pervaded the relationship. Nevertheless, the model proposed in this study brings a new and distinguishing line of sight into the firm-level entrepreneurship literature: rather than being an equivalent, the entrepreneurial orientation construct is treated as an antecedent of corporate entrepreneurship; moreover the behavioral construct of corporate entrepreneurship is placed in between this strategic posture and performance, to complete "the missing" link between firm-level entrepreneurship and performance. It is proposed that this formulation of roles and meanings attached to both terms, leads to a solid, conclusive, and systematic direct positive relationship between firm level entrepreneurship and performance. Empirical findings confirm this proposal, making this formulation the most important contribution of this study to the firm level entrepreneurship literature. © 2009 PICMET.
Gabrys, B 1970, 'Learning with Missing or Incomplete Data', IMAGE ANALYSIS AND PROCESSING - ICIAP 2009, PROCEEDINGS, 15th International Conference on Image Analysis and Processing (ICIAP 2009), Springer Berlin Heidelberg, Vietri sul Mare, ITALY, pp. 1-4.
View/Download from: Publisher's site
Gao, Y, Zhang, G & Lu, J 1970, 'A particle swarm optimization based algorithm for fuzzy bilevel decision making with constraints-shared followers', Proceedings of the 2009 ACM symposium on Applied Computing, SAC09: The 2009 ACM Symposium on Applied Computing, ACM, Hawaii, USA, pp. 1075-1079.
View/Download from: Publisher's site
View description>>
In a bilevel decision problem, decision making may involve multiple followers and fuzzy demands. This research focuses on the problem of fuzzy linear bilevel decision making with multiple followers who share common constraints (FBCSF). Based on the ranking relationship among fuzzy sets defined by cut set and satisfactory degree α, a FBCSF model is presented and a particle swarm optimization based algorithm is developed. The experiments reveal that solutions obtained by this algorithm are reasonable and stable. Copyright 2009 ACM.
Gao, Y, Zhang, G, Lu, J & Wee, H-M 1970, 'A Fuzzy Bi-level Pricing Model and a PSO Based Algorithm in Supply Chains', NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, International Conference on Neural Information Processing, Springer, Bangkok, Thailand, pp. 226-233.
View/Download from: Publisher's site
View description>>
Due to rapid technological innovation and severe competition, the upstream component price and the downstream product cost in hi-tech industries usually decline significantly with time. In building a pricing supply chain model, some coefficients are generally obtained from experiments and cannot be defined as crisp numbers. Thus, an effective fuzzy pricing supply chain model becomes crucial. This paper establishes a fuzzy bi-level pricing model for buyers and vendors in supply chains. Then, a particle swarm optimization (PSO) based algorithm is developed to solve problems defined by this model. Experiments show that this PSO-based algorithm can solve fuzzy bi-level pricing problems effectively.
Goyal, ML & Zhang, G 1970, 'Using attribute and attitude assessment for bidding in automated auctions.', iiWAS, ACM, pp. 380-384.
View/Download from: Publisher's site
View description>>
An automated auction is an efficient market institution for real-world trading of commodities. This paper presents a novel fuzzy bidding strategy (FAA-Bid), which employs assessments of multiple attributes of items as well as agents' attitude on bidding item to procure an item in automated auction. The assessment of attributes adapts the fuzzy sets technique to handle uncertainty of the bidding process as well use heuristic rules to determine attitude of bidding agents in simulated auctions to procure goods. The overall assessment is used to determine a price range based on current bid, which finally selects the best one as the new bid. © 2010 ACM.
Guo, Y, Xu, W, Zhu, J, Lu, H, Wang, Y & Jin, J 1970, 'Design and analysis of a linear induction motor for a prototype HTS maglev transportation system', 2009 International Conference on Applied Superconductivity and Electromagnetic Devices, 2009 International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD), IEEE, Chengdu, China, pp. 81-84.
View/Download from: Publisher's site
View description>>
This paper investigates the design and analysis of a linear induction motor (LIM) drive for a prototype transportation system, which is levitated by the interaction force between high temperature superconducting (HTS) bulks placed on the ground and permanent magnets (PMs) mounted on the bottom of the vehicle, while the driving force is provided by a linear induction motor system on the side of the prototype vehicle. An equivalent electrical circuit is applied to predict the motor characteristics and the computation results show that the proposed LIM drive system is appropriate for driving the HTS maglev transportation prototype.
Guo, Y, Zhu, J, Dorrell, D, Lu, H, Wang, Y & IEEE 1970, 'Development of a Claw Pole Permanent Magnet Motor with a Molded Low-Density Soft Magnetic Composite Stator Core', 2009 IEEE ENERGY CONVERSION CONGRESS AND EXPOSITION, VOLS 1-6, IEEE Energy Conversion Congress and Exposition, IEEE, San Jose, CA, pp. 703-710.
Guo, Y, Zhu, J, Lu, H, Wang, Y & Jin, J 1970, 'Design and analysis of a permanent magnet motor with SMC core for driving dishwasher pump', 2009 International Conference on Applied Superconductivity and Electromagnetic Devices, 2009 International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD), IEEE, 138, pp. 138-141.
View/Download from: Publisher's site
View description>>
This paper presents the development of a permanent magnet motor with soft magnetic composite (SMC) stator core for driving a dishwasher pump. The unique properties of the SMC, such as 3D magnetic isotropy and molding production technique, have been taken into account in the design. 3D magnetic field finite element analysis is carried out to accurately compute the motor parameters and an equivalent electrical circuit is derived to predict the motor performance. Analysis results show that the developed motor is appropriate.
Gutierrez, F & Dyson, LE 1970, 'Managing Employee Expectations of Organizational Change: A Case Study of IT Outsourcing at an Australian Bank', KNOWLEDGE MANAGEMENT AND INNOVATION IN ADVANCING ECONOMIES-ANALYSES & SOLUTIONS, VOLS 1-3, IBIMA (International Business Information Management Association), Marrakech, pp. 1158-1165.
View description>>
NA
Hitchens, M & Lister, R 1970, 'A focus group study of student attitudes to lectures', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Wellington, New Zealand, pp. 93-100.
View description>>
This paper reports on the findings from focus groups, conducted at Macquarie University, on the attitudes of computing students to lectures. Students felt that two things were vital for a good lecture: (1) that the lecturer goes beyond what is written in the lecture notes; (2) that the lecture is interactive, by which students meant that the lecturer asks if students understand concepts and adjusts the delivery accordingly, and also the lecturer answers the students' questions. The students in the focus groups also discussed what makes for a bad lectures: (1) lecturers reading straight from slides; (2) lecturers who 'blame the students', by saying that students don't work hard enough and are too lazy to turn up to lectures; and (3) lecturers who cover the material too slowly or too quickly. The most prominent reason given for not attending lectures was the timetabling of lectures in such a way that students had too few classes in one day to make the sojourn to university worthwhile. Any university seeking to improve attendance at lectures should perhaps look as much to improving its timetabling practices as it does to improving the practices of its individual lecturers. © 2009, Australian Computer Society, Inc.
Homayounfard, H & Kennedy, PJ 1970, 'HDAX: Historical symbolic modelling of delay time series in a communications network', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, Australian Computer Society, Melbourne, Australia, pp. 129-137.
View description>>
There are certain performance parameters like packet delay, delay variation (jitter) and loss, which are decision factors for online quality of service (QoS) traffic routing. Although considerable efforts have been placed on the Internet to assure QoS, the dominant TCP/IP - like the best-effort communications policy - does not provide sufficient guarantee without abrupt change in the protocols. Estimation and forecasting end-to-end delay and its variations are essential tasks in network routing management for detecting anomalies. A large amount of research has been done to provide foreknowledge of network anomalies by characterizing and forecasting delay with numerical forecasting methods. However, the methods are time consuming and not efficient for real-time application when dealing with large online datasets. Application is more difficult when the data is missing or not available during online forecasting. Moreover, the time cost in statistical methods for trivial forecasting accuracy is prohibitive. Consequently, many researchers suggest a transition from computing with numbers to the manipulation of perceptions in the form of fuzzy linguistic variables. The current work addresses the issue of defining a delay approximation model for packet switching in communications networks. In particular, we focus on decision-making for smart routing management, which is based on the knowledge provided by data mining (informed) agents. We propose a historical symbolic delay approximation model (HDAX) for delay forecasting. Preliminary experiments with the model show good accuracy in forecasting the delay time-series as well as a reduction in the time cost of the forecasting method. HDAX compares favourably with the competing Autoregressive Moving Average (ARMA) algorithm in terms of execution time and accuracy. © 2009, Australian Computer Society, Inc.
Huang, A, Milne, D, Frank, E & Witten, IH 1970, 'Clustering Documents Using a Wikipedia-Based Concept Representation', ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer Berlin Heidelberg, Bangkok, THAILAND, pp. 628-636.
View/Download from: Publisher's site
Huang, H-S, Pal, NR, Ko, L-W & Lin, C-T 1970, 'Automatic Identification of Useful Independent Components with a View to Removing Artifacts from EEG Signal', IJCNN: 2009 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1- 6, International Joint Conference on Neural Networks, IEEE, GA, Atlanta, pp. 2646-+.
Huang, H-S, Pal, NR, Ko, L-W & Lin, C-T 1970, 'Automatic identification of useful independent components with a view to removing artifacts from eeg signal', 2009 International Joint Conference on Neural Networks, 2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta), IEEE, pp. 1267-1271.
View/Download from: Publisher's site
View description>>
Removal of artifacts is an important step in any research in/application of electroencephalogram (EEG). The artifacts may contain eye-blinking, muscle noise, heart signal, line noise, and environmental effect. Such noises often make the raw EEG signals not very useful for extraction/identification of physiological phenomena from EEG. The independent component analysis (ICA) is a popular technique for artifact removal in brain research and some reports demonstrate that ICA can remove the artifacts with lower (acceptable) loss of information. But, these reports select useful independent components manually, primarily by looking at the scalp-plots. This is of great inconvenience and is a barrier for BCI or real-time applications of EEG. In this paper, we demonstrate that machine learning methods could be quite effective to discriminate useful independent components from artifacts and our findings suggests the possibility of developing a 'universal" machine for artifact removal in EEG. © 2009 IEEE.
Huang, ML, Liang, J & Nguyen, QV 1970, 'A Visualization Approach for Frauds Detection in Financial Market', 2009 13th International Conference Information Visualisation, 2009 13th International Conference Information Visualisation, IV, IEEE, Barcelona, Spain, pp. 197-202.
View/Download from: Publisher's site
View description>>
The traditional solutions to the stock market security are not sufficient in identifying attackers and further attack plans from the analysis of existing events. Therefore, it is difficult for analysts to prevent future unexpected events or frauds by only monitoring the realtime trading information. The event-driven fraud detection in financial market could not help analysts to find attack plans and the further intention of attackers. This paper proposed a new framework of visual analytics for stock market security. The proposed solution consists of two stages: 1) Visual Surveillance of Market Performance, and 2) Behavior-Driven Visual Analysis of Trading Networks. In the first stage, we use a 3D treemap to monitor the realtime stock market performance and to identify a particular stock that produced an unusual trading pattern. We then move to the next stage: social network visualization to conduct behavior-driven visual analysis of suspected pattern. Through the visual analysis of social (or trading) network, analysts may finally identify the attackers (the sources of the fraud), and further attack plans. © 2009 IEEE.
Huo, H, Chen, Q, Wang, G & Peng, D 1970, 'Keyword Search on Streaming XML Fragments', 2009 First International Conference on Information Science and Engineering, 2009 First International Conference on Information Science and Engineering, IEEE, pp. 4919-4922.
View/Download from: Publisher's site
Hussain, O, Dillon, T, Chang, E & Hussain, F 1970, 'A Fuzzy Inference Model for Risk based Informed Decision-Making in e-Business', 2009 International Conference on Network-Based Information Systems, 2009 International Conference on Network-Based Information Systems (NBIS), IEEE, Indianapolis, ID, pp. 519-524.
View/Download from: Publisher's site
View description>>
Since its invention, the web has considerably advanced and it now provides its users with sophisticated technologies and processes for facilitating interactions. This has enabled users to complete their tasks by efficient ways and in turn increase their
Hussain, O, Dillon, T, Chang, E & Hussain, F 1970, 'A Methodology for Transactional Risk Assessment and Decision Making in e-Business Interactions', 2009 IEEE International Conference on e-Business Engineering, 2009 IEEE International Conference on e-Business Engineering, IEEE, Macau, PEOPLES R CHINA, pp. 157-164.
View/Download from: Publisher's site
View description>>
The development and advancement of technologies have enabled users to complete their tasks efficiently. They have also provided them with various options and alternatives to complete and achieve their tasks. In such an environment, it is imperative for a
Hussain, O, Dillon, T, Chang, E & Hussain, F 1970, 'Determining the Net Financial Risk for Decision Making in Business Interactions', 2009 International Conference on Advanced Information Networking and Applications, 2009 International Conference on Advanced Information Networking and Applications, IEEE, Bradford, ENGLAND, pp. 822-829.
View/Download from: Publisher's site
View description>>
In a business interaction, transactional risk highlights the uncertainty associated in not achieving the desired outcomes. The assessment of transactional risk gives the interacting user the different levels of failure in achieving its desired outcomes a
I-Hung Khoo, Reddy, HC, Van, L-D & Lin, C-T 1970, '2-D digital filter architectures without global broadcast and some symmetry applications', 2009 IEEE International Symposium on Circuits and Systems, 2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009, IEEE, Taipei, TAIWAN, pp. 952-955.
View/Download from: Publisher's site
Jeng, JJ, McGregor, C & Schiefer, J 1970, 'RTSOAA 2009 Message', 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009 33rd Annual IEEE International Computer Software and Applications Conference, IEEE, pp. xviii-xviii.
View/Download from: Publisher's site
Jin, Z, Chen, X & Zowghi, D 1970, 'Performing Projection in Problem Frames Using Scenarios', APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, Asia-Pacific Software Engineering Conference, IEEE, Batu Ferringhi, Penang, Malaysia, pp. 249-256.
View/Download from: Publisher's site
View description>>
In the Problem Frames (PF) approach there are five basic problem frames and some variants to them. When a problem is being analysed, it is initially matched against these frames. If the problem does not fit into the basic problem frames or their variants, then problem analysis is performed. It has been recognised that ‘projection’ is an effective technique for analysing problems. That is, each sub-problem is considered as a projection of the main problem concerned only with the phenomena relevant to that sub-problem. The PF approach lacks a precise definition of problem projection and does not provide specific instructions on how to perform this projection. In this paper, we use the concept of projection from relational algebra and combine it with concepts from the PF and scenario-based approaches to present a conceptual model for conducting problem projection in requirements engineering. This model and ontology extend problem description at scenario level and support systematic derivation of sub-problems from scenarios. We also provide a detailed process description for performing projection for problem analysis and present the utility of our approach with a case study.
Johnston, A, Candy, L & Edmonds, E 1970, 'Designing for conversational interaction', Proceedings of the International Conference on New Interfaces for Musical Expression, New Interfaces for Musical Expression, Carnegie Mellon University, Pittsburgh, USA, pp. 207-212.
View description>>
In this paper we describe an interaction framework which classifies musicians’ interactions with virtual musical instruments into three modes: instrumental, ornamental and conversational. We argue that conversational interactions are the most difficult to design for, but also the most interesting. To illustrate our approach to designing for conversational interactions we describe the performance work Partial Reflections 3 for two clarinets and interactive software. This software uses simulated physical models to create a virtual sound sculpture which both responds to and produces sounds and visuals.
Jutao, H, Qingkui, C, Huan, H & JingJing, Z 1970, 'An Adaptive Load Balanced on Demand Routing Protocol', 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), IEEE, pp. 86-89.
View/Download from: Publisher's site
Kadlec, P & Gabrys, B 1970, 'Evolving on-line prediction model dealing with industrial data sets', 2009 IEEE Workshop on Evolving and Self-Developing Intelligent Systems, 2009 IEEE Workshop on Evolving and Self-Developing Intelligent Systems (ESDIS), IEEE, Nashville, TN, pp. 24-31.
View/Download from: Publisher's site
Kadlec, P & Gabrys, B 1970, 'Soft Sensor Based on Adaptive Local Learning', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 1172-1179.
View/Download from: Publisher's site
View description>>
When it comes to application of computational learning techniques in practical scenarios, like for example adaptive inferential control, it is often difficult to apply the state-of-the-art techniques in a straight forward manner and usually some effort has to be dedicated to tuning either the data, in a form of data pre-processing, or the modelling techniques, in form of optimal parameter search or modification of the training algorithm. In this work we present a robust approach to on-line predictive modelling which is focusing on dealing with challenges like noisy data, data outliers and in particular drifting data which are often present in industrial data sets. The approach is based on the local learning approach, where models of limited complexity focus on partitions of the input space and on an ensemble building technique which combines the predictions of the particular local models into the final predicted value. Furthermore, the technique provides the means for on-line adaptation and can thus be deployed in a dynamic environment which is demonstrated in this work in terms of an application of the presented approach to a raw industrial data set exhibiting drifting data, outliers, missing values and measurement noise. © 2009 Springer Berlin Heidelberg.
Kadlec, P & Gabrys, B 1970, 'Soft sensors: where are we and what are the current and future challenges?', IFAC Proceedings Volumes, Elsevier BV, pp. 572-577.
View/Download from: Publisher's site
View description>>
In this work we present a summary of the review on data-driven soft sensors published in [1] together with a proposal of how to deal with the identified issues and challenges. We discuss the most common approaches for the development of soft sensors followed by a critical analysis of the main issues in the current soft sensor development. Currently, these are the time which has to be spent on the model development including data pre-processing and model building together with the effort which needs to be spent on periodical performance assessment and re-training of the model. Based on the identified problems we propose a solution based on a model development architecture which can accommodate different data preprocessing techniques, predictive modelling methods as well as approaches for model adaptation. The architecture is based on a structure which unifies several concepts from machine learning such as ensemble methods, local learning, meta learning and concept drift handling. Using the above mechanisms it provides means for automated data pre-processing, model validation, selection and adaptation which can be used to significantly simplify the soft sensor building and maintenance process. Copyright © 2007 International Federation of Automatic Control.
Kamaleswaran, R, McGregor, C & Percival, J 1970, 'Service oriented architecture for the integration of clinical and physiological data for real-time event stream processing', 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Minneapolis, MN, pp. 1667-1670.
View/Download from: Publisher's site
Kasisopha, N, Wongthongtham, P & Hussain, FK 1970, 'Semantic Wild as a Basis for Software Engineering Ontology Evolution', ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, On the Move Confederated International Conference and Workshops, Springer-verlag Berlin, Vilamoura, PORTUGAL, pp. 858-865.
View description>>
Ontology plays a vital role in sharing a common understanding of the domain among groups of people and provides terminology interpretable by machines. Recently, ontology has grown and continued to evolve constantly, but there are not many tools to provid
Kennard, R, Edmonds, E & Leaney, J 1970, 'Separation anxiety: Stresses of developing a modern day separable User Interface', 2009 2nd Conference on Human System Interactions, 2009 2nd Conference on Human System Interactions (HSI), IEEE, Catania, Italy, pp. 228-235.
View/Download from: Publisher's site
View description>>
The evolution of user interface (UI) tools has generally regarded the UI as separable from the underlying application it represents. This viewpoint leaves the UI having to restate invariants already specified in other subsystems of an application, and any discrepancy between the versions in the UI and those in the subsystems leads to errors. This paper explores a sample of real world subsystems in use by enterprise applications today, and underscores the problem of duplication between them and the UI. It then surveys the prevalence of this issue within mainstream software development.
Kennard, R, Edmonds, E, Leaney, J & IEEE 1970, 'Separation Anxiety: stresses of developing a modern day Separable User Interface', HSI: 2009 2ND CONFERENCE ON HUMAN SYSTEM INTERACTIONS, 2nd Conference on Human System Interactions, IEEE, Catania, ITALY, pp. 225-232.
Kennedy, PJ, Ong, K & Christen, P 1970, 'Data Mining and Analytics', Data Mining and Analytics 2009 (AusDM'09), Australian Data Mining Conference, Australian Computer Society, Melbourne, Australia, pp. 1-218.
Kennedy, PJ, Ong, KL & Christen, P 1970, 'Preface', Conferences in Research and Practice in Information Technology Series.
Khan, A, Saqib, M & Kaleem, Z 1970, 'Functional unit level parallelism in RISC architecture', Proceedings of the 7th International Conference on Frontiers of Information Technology, FIT '09: 7th International Conference on Frontiers of Information Technology, ACM, pp. 1-4.
View/Download from: Publisher's site
View description>>
This paper presents the design and implementation of RISC processor having five stages pipelined architecture. Functional unit parallelism is exploited through the implementation of pipelining in five stages of RISC processor. The hazards which come to life due to parallelism are data, structural, and control hazards .In order to achieve the true benefits of the parallelism through pipelining; these hazards must be properly handled. The data hazards are solved using bypassing in which we forward the required value of the operand to the succeeding instruction. Structural hazards are solved by implementing three port register file so that two operand reading and one register writing can be performed in parallel without degrading the performance. Control hazards arise from Branch, Jump and Call instructions. To solve these problems, we insert automated NOP in stage2, stage3 and stage4. The processor designed is a fully functional processor which can execute any program including jump statements, switch statements, loops and subroutines which are the basic ingredients of any computer program. Copyright 2009 ACM.
Ko, L-W, Tsai, I-L, Yang, F-S, Chung, J-F, Lu, S-W, Jung, T-P & Lin, C-T 1970, 'Real-Time Embedded EEG-Based Brain-Computer Interface', ADVANCES IN NEURO-INFORMATION PROCESSING, PT II, 15th International Conference on Neuro-Information Processing, Springer Berlin Heidelberg, Auckland, NEW ZEALAND, pp. 1038-1045.
View/Download from: Publisher's site
Lemke, C, Riedel, S & Gabrys, B 1970, 'Dynamic combination of forecasts generated by diversification procedures applied to forecasting of airline cancellations', 2009 IEEE Symposium on Computational Intelligence for Financial Engineering, 2009 IEEE Symposium on Computational Intelligence for Financial Engineering (CIFEr), IEEE, pp. 85-91.
View/Download from: Publisher's site
View description>>
The combination of forecasts is a well established procedure for improving forecast performance and decreasing the risk of selecting an inferior model out of an existing pool of models. Work in this area mainly focuses on combining several functionally different models, but some publications also deal with combining forecasts with the same functional approach. In the latter case, individual forecasts are generated by diversifying one or more model parameters or, if dealing with hierarchical data, by using forecasts from different levels. This work looks at multi-dimensional data from airline industry, with the aim of improving the forecast of cancellation rates for bookings. Three different methods are employed for the generation of individual forecasts. Forecast combinations are usually implemented in a more or less static structure, either including all available forecasts or trimming a fixed percentage of the worst performing models. For a big number of individual forecasts, this procedure can become inefficient. In this paper, a dynamic approach of pooling and trimming is applied to the generated forecasts for airline cancellation data. © 2009 IEEE.
Leong, T & Brynskov, M 1970, 'Confessions: Engaging with Values through Urban Conversations', 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design, ACM Press, Melbourne, pp. 209-216.
Leong, TW & Brynskov, M 1970, 'CO 2 nfession', Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7, OZCHI '09: Proceedings of the 21st conference of the computer-human interaction special interest group of Australia on Computer-human interaction: design, ACM, pp. 209-216.
View/Download from: Publisher's site
View description>>
It has been suggested that future directions of HCI would need to place human values at its core. One approach towards this complex endeavor is to build an understanding of these values through examining systems designed to address them. This paper focuses on an urban installation - -CO2nfession/ CO2mmitment - -that deals with one such (societal) value: environmental sustainability. Designed to solicit personal opinions about climate change, we found the 'confessional' aspect of the installation encouraged strong reflexivity amongst 'users' with regards to this value and precipitated personal considerations about future actions. More importantly this reflexivity exposes people's lived and felt experiences about this societal value, unearthing their ambivalences, hindrances but also motivations. This installation highlights an alternate approach that can complement current efforts without taking a 'big stick' approach. Instead, urban media technologies can be harnessed to engage people with this value on their own terms, through encouraging conversations and supporting reflexivity. © ACM 2009.
Li, K, Zhou, W, Yu, S & Dai, B 1970, 'Effective DDoS Attacks Detection Using Generalized Entropy Metric', ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 9th International Conference on Algorithms and Architectures for Parallel Processing, Springer Berlin Heidelberg, Natl Taiwan Univ Sci & Technol, Taipei, TAIWAN, pp. 266-280.
View/Download from: Publisher's site
Li, L, Xu, G, Zhang, Y & Kitsuregawa, M 1970, 'Enhancing Web Search by Aggregating Results of Related Web Queries', Web Information Systems Engineering - WISE 2009 Lecture Notes in Computer Science, Web Information Systems Engineering - WISE 2009, Springer Berlin Heidelberg, Poznan, Poland, pp. 203-217.
View/Download from: Publisher's site
View description>>
Currently, commercial search engines have implemented methods to suggest alternative Web queries to users, which helps them specify alternative related queries in pursuit of finding needed Web pages. In this paper, we address the Web search problem on related queries to improve retrieval quality by devising a novel search rank aggregation mechanism. Given an initial query and the suggested related queries, our search system concurrently processes their search result lists from an existing search engine and then forms a single list aggregated by all the retrieved lists. In particular we propose a generic rank aggregation framework which considers not only the number of wins that an item won in a competition, but also the quality of its competitor items in calculat- ing the ranking of Web items. The framework combines the traditional and random walk based rank aggregation methods to produce a more reasonable list to users. Experimental results show that the proposed approach can clearly improve the retrieval quality in a parallel man- ner over the traditional search strategy that serially returns result lists. Moreover, we also empirically investigate how different rank aggregation methods affect the retrieval performance.
Liang, S-F, Liu, C-S, Chang, W-L, Tsao, Y-H, Ko, L-W & Lin, C-T 1970, 'Assessment of musical training induced neuroplasticity by auditory event related potentials and neural networks', 2009 International Joint Conference on Neural Networks, 2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta), IEEE, pp. 1797-1801.
View/Download from: Publisher's site
View description>>
Music provides a tool to study numerous aspects of neuroscience from motion-skill to emotion since listening to and producing music involves many brain functions. The musician's brain is also regarded as an ideal model to investigate plasticity of the human brain. In this paper, an EEG-based neural network is proposed to assess neuroplasticity induced by musical training. A musical chord perception experiment is designed to acquire and compare the behavioral and neural responses of musicians and non-musicians. The ERPs elicited by the consonant and dissonant chords are combined together as the features of the model. The principle component analysis (PCA) is used to reduce feature dimensions and the dimension-reduced features are input to a feedforward neural network to recognize the brain potentials belong to a musician or a non-musician. The accuracy can reach 97% in average for leave-one-out cross validation of six subjects in this experiment. It demonstrates the feasibility of assessing effects of musical training by ERP signals elicited by musical chord perception. © 2009 IEEE.
Liang, S-F, Liu, C-S, Chang, W-L, Tsao, Y-H, Ko, L-W & Lin, C-T 1970, 'Assessment of Musical Training Induced Neuroplasticity by Auditory Event Related Potentials and Neural Networks', IJCNN: 2009 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1- 6, International Joint Conference on Neural Networks, IEEE, GA, Atlanta, pp. 3109-+.
Liao, L-D, Chao, PC-P, Chen, I-C, Meng, H-F, Chai, C-H, Lin, C-T & Huang, Y-P 1970, 'Achieving High Directionality and Extraction of Light Emission from Polymer Light Emitting Diodes via ITO/Organic Photonic Crystals', 2009 SID INTERNATIONAL SYMPOSIUM DIGEST OF TECHNICAL PAPERS, VOL XL, BOOKS I - III, 47th Annual Symposium of the Society-for-Information-Display, SOC INFORMATION DISPLAY, TX, San Antonio, pp. 1726-+.
Liao, L-D, Chao, PC-P, Chen, Y-H, Lin, C-T, Ko, L-W, Lin, H-H & Hsu, W-H 1970, 'A novel hybrid bioelectrode module for the zero-prep EEG measurements', 2009 IEEE Sensors, 2009 IEEE Sensors, IEEE, Christchurch, NEW ZEALAND, pp. 939-942.
View/Download from: Publisher's site
Lin, C-T, Ko, L-W, Chang, C-J, Wang, Y-T, Chung, C-H, Yang, F-S, Duann, J-R, Jung, T-P & Chiou, J-C 1970, 'Wearable and Wireless Brain-Computer Interface and Its Applications', FOUNDATIONS OF AUGMENTED COGNITION, PROCEEDINGS, 5th International Conference on Foundation of Augmented Cognition, Springer Berlin Heidelberg, San Diego, CA, pp. 741-748.
View/Download from: Publisher's site
Lin, C-T, Yang, F-S, Chiou, T-C, Ko, L-W, Duann, J-R & Gramann, K 1970, 'EEG-Based Spatial Navigation Estimation in a Virtual Reality Driving Environment', 2009 Ninth IEEE International Conference on Bioinformatics and BioEngineering, 2009 Ninth IEEE International Conference on Bioinformatics and BioEngineering (BIBE), IEEE, Taichung, TAIWAN, pp. 435-438.
View/Download from: Publisher's site
Lister, R & Box, I 1970, 'A citation analysis of the ACSC 2006 - 2008 proceedings, with reference to the CORE conference and journal rankings', Conferences in Research and Practice in Information Technology Series, Australasian Computer Science Conference, Australian Computer Society Inc., Wellington, New Zealand, pp. 7-16.
View description>>
This paper compares the CORE rankings of computing conferences and journals to the frequency of citation of those journals and conferences in the Australasian Computer Science Conference (ACSC) 2006, 2007 and 2008 proceedings. The assumption underlying this study is that there should be a positive relationship between citation rates and the CORE rankings. Our analysis shows that the CORE rankings broadly reflect the ACSC citations, but with some anomalies. While these anomalies might be minor in the larger scheme of things, anomalies need to be addressed, as the careers of individual academics may depend upon it. Rankings are probably here to stay, and this paper ends with some suggestions on how the rankings process should now evolve, so that it becomes more transparent. Copyright © 2009, Australian Computer Society, Inc.
Lister, R & Box, I 1970, 'A citation analysis of the AUIC 2006 - 2008 proceedings, with reference to the CORE conference and journal rankings', Conferences in Research and Practice in Information Technology Series, pp. 35-44.
View description>>
This paper compares the CORE rankings of computing conferences and journals to the frequency of citation of those journals and conferences in the Australasian User Interface Conference (AUIC) 2006, 2007 and 2008 proceedings. The assumption underlying this study is that there should be a positive relationship between citation rates and the CORE rankings. Our analysis shows that CORE conference and journal rankings broadly reflect the AUIC citations, but we note some anomalies. While these anomalies might be minor in the larger scheme of things, any anomalies need to be addressed, as the careers of individual academics may depend upon it. The concept of conference and journal rankings is probably here to stay, and this paper ends with some suggestions on how the rankings process should now evolve, so that it becomes more transparent. © 2009, Australian Computer Society, Inc.
Lister, R & Box, I 1970, 'A citation analysis of the ICER 2005-07 proceedings', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Wellington, New Zealand, pp. 119-128.
View description>>
This paper identifies the most commonly cited conferences, journals and books of the 43 papers within the first three ICER proceedings. A large array of conferences, journals, and books were cited. However, only a small set of journals and conferences were cited frequently, and the majority were only cited within a single paper, which is consistent with a power law distribution, as predicted by Zipf's Law. The most commonly cited books are concerned with education in general (29%) or psychology (20%), while 17% of books are concerned with computer science education and 12% with computing content. The citation results for ICER are contrasted with earlier published citation analyses of SIGCSE 2007 and ACE2005-07. © 2009, Australian Computer Society, Inc.
Lister, R, Fidge, C & Teague, D 1970, 'Further evidence of a relationship between explaining, tracing and writing skills in introductory programming', Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education, ITiCSE '09: Annual Conference on Innovation and Technology in Computer Science Education, ACM, Paris, France, pp. 161-165.
View/Download from: Publisher's site
View description>>
ABSTRACT: This paper reports on a replication of earlier studies into a possible hierarchy of programming skills. In this study, the students from whom data was collected were at a university that had not provided data for earlier studies. Also, the students were taught the programming language "Python", which had not been used in earlier studies. Thus this study serves as a test of whether the findings in the earlier studies were specific to certain institutions, student cohorts, and programming languages. Also, we used a non-parametric approach to the analysis, rather than the linear approach of earlier studies. Our results are consistent with the earlier studies. We found that students who cannot trace code usually cannot explain code, and also that students who tend to perform reasonably well at code writing tasks have also usually acquired the ability to both trace code and explain code.
Litchfield, A, Raban, R, Dyson, LE, Leigh, E, Tyler, J & IEEE 1970, 'Using Students' Devices and a No-To-Low Cost Online Tool to Support Interactive Experiential mLearning', ICALT: 2009 IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, IEEE International Conference on Advanced Learning Technologies, IEEE Computer Society, Riga latvia, pp. 674-678.
View/Download from: Publisher's site
View description>>
The rapid evolution and ubiquitous use of mobile devices is an historical opportunity to improve experiential interactivity in education practices to support deep learning. A major barrier to the widespread adoption of mLearning in higher education is that of cost. Usage charges and the cost of mobile hardware are key issues. Opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. The paper introduces mInteract, a system which uses packet technology (mobile WAP/WML) to build no-to-low cost interactivity into learning spaces. The online tool supports active experiential learning transactions for both student and teacher. In 2008 mInteract was trialled in a subject with large numbers. Focus group feedback is presented that indicates high levels of engagement with both users and non-users of the tool.
Low, G, Beydoun, G, Henderson-Sellers, B & Gonzalez-Perez, C 1970, 'Towards Method Engineering for Multi-Agent Systems: A Validation of a Generic MAS Metamodel', AGENT COMPUTING AND MULTI-AGENT SYSTEMS, Pacific Rim International Workshop on Multi-Agents, Springer-Verlag, Bangkok, pp. 255-267.
View description>>
It is a widely accepted premise that no single methodology can be suitable for all Multi-Agent System (MAS) software projects. This premise is playing a significant role in the appearance of new methodologies at an increasing pace. To effectively harness the software engineering knowledge of methodologies, method engineering is an appealing approach. It focuses on project-specific methodology construction from existing method fragments and it requires a generic product-focussed metamodel to serve as a representational infrastructure to unify existingmethodologies into a single specification.As part of its ongoing validation towards method engineering forMAS development,we present our generic metamodel and illustrate in this paper its wide applicability with respect to 10 methodologies extant agent-oriented. This validation provides further evidence to support the use of our metamodel towards the construction of situated MAS methodologies.
Lu, H & Nguyen, TTS 1970, 'Experimental Investigation of PSO Based Web User Session Clustering', 2009 International Conference of Soft Computing and Pattern Recognition, 2009 International Conference of Soft Computing and Pattern Recognition, IEEE, Malacca, Malaysia, pp. 647-652.
View/Download from: Publisher's site
View description>>
Web user session clustering is very important in web usage mining for web personalization. This paper proposes a Particle Swarm Optimization (PSO) based sequence clustering approach and presents an experimentally investigation of the PSO based sequence clustering methods, which use three original PSO variants and their corresponding variants of a hybrid PSO with real value mutation. The investigation was conducted in 45 test cases using five web user session datasets extracted from a real world web site. The experimental results of these methods are compared with the results obtained from the traditional k-means clustering method. Some interesting observations have been made. In the most of test cases under consideration, the PSO and PSO-RVM methods have better performance than the k-means method. Furthermore, the PSO-RVM methods show better performance than the corresponding PSO methods in the cases in which the similarity measure function is more complex. © 2009 IEEE.
Lu, J, Shambour, Q & Zhang, G 1970, 'Recommendation technique-based government-to-business personalized e-services', NAFIPS 2009 - 2009 Annual Meeting of the North American Fuzzy Information Processing Society, NAFIPS 2009 - 2009 Annual Meeting of the North American Fuzzy Information Processing Society, IEEE, Cincinnati, Ohio, USA, pp. 1-6.
View/Download from: Publisher's site
View description>>
One of the new directions in current e-government development is to provide personalized online services to citizens and businesses. Recommendation techniques can bring a possible solution for this issue. This study proposes a hybrid recommendation approach to provide personalized government to business (G2B) e-services. The approach integrates fuzzy setsbased semantic similarity and traditional item-based collaborative filtering methods to improve recommendation accuracy. A recommender system named Intelligent Business Partner Locator (IBPL) is designed to apply the proposed recommendation approach for supporting government agencies to recommend business partners.
Lu, N, Lu, J & Zhang, G 1970, 'An Integrated Knowledge Adaption Framework for Case-Based Reasoning Systems', KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II, PROCEEDINGS, International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer, Santiago, Chile, pp. 372-379.
View/Download from: Publisher's site
View description>>
The development of effective knowledge adaption techniques is one of the promising solutions to improve the performance of case-based reasoning (CBR) systems. Case-base maintenance becomes a powerful method to refine knowledge in CBR systems. This paper proposes an integrated knowledge adaption framework for CBR systems which contains a meta database component and a maintenance strategies component. The meta database component can help track changes of interested concepts and therefore enable a CBR system to signal a need for maintenance or to invoke adaption on its own. The maintenance strategies component can perform cross-container maintenance operations in a CBR system. This paper also illustrates how the proposed integrated knowledge adaption framework assists decision makers to build dynamic prediction and decision capabilities. © 2009 Springer Berlin Heidelberg.
Lu, N, Lu, J & Zhang, G 1970, 'Maintaining Footprint-Based Retrieval for Case Deletion', NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, International Conference on Neural Information Processing, Springer, Bangkok, Thailand, pp. 318-325.
View/Download from: Publisher's site
View description>>
The effectiveness and efficiency of case-based reasoning (CBR) systems depend largely on the success of case-based retrieval. The case-base maintenance (CBM) issues become imperative and important especially for modern societies. This paper proposes a new competence model and a new maintenance procedure for the proposed competence model. Based on the proposed competence maintenance procedure, footprint-based retrieval (FBR), a competence-based case base retrieval method, is able to preserve its own retrieval effectiveness and efficiency. © 2009 Springer-Verlag Berlin Heidelberg.
Lun-De Liao, Chao, PC-P, Jian-Ting Chen, Wei-Dar Chen, Wei-Hsuan Hsu, Chi-Wei Chiu & Chin-Teng Lin 1970, 'A Miniaturized Electromagnetic Generator With Planar Coils and Its Energy Harvest Circuit', IEEE Transactions on Magnetics, International Magnetics Conference 2009 (INTERMAG), Institute of Electrical and Electronics Engineers (IEEE), Sacramento, CA, pp. 4621-4627.
View/Download from: Publisher's site
Ma, J, Zhang, G, Lu, J & Ruan, D 1970, 'Impute Missing Assessments by Opinion Clustering in Multi-Criteria Group Decision Making Problems', PROCEEDINGS OF THE JOINT 2009 INTERNATIONAL FUZZY SYSTEMS ASSOCIATION WORLD CONGRESS AND 2009 EUROPEAN SOCIETY OF FUZZY LOGIC AND TECHNOLOGY CONFERENCE, IFSA World Congress, IFSA/EUSFLAT, Lisbon, Portugal, pp. 555-560.
View description>>
Multi-criteria group decision-making and evaluation (MCGDME) method typically aggregates information in evaluation tables. For various reasons, evaluation tables (decision matrix) often include missing data that highly affect correct decision-making and evaluation. Most existing imputation methods of missing data are based on statistical features which do not exist in an MCGDME setting. This paper proposes an imputation method of missing data (IMD) in evaluation tables. The IMD method measures the similarity betweent two evaluators' mental models. Evaluators are then classed into several groups based on their similarities by using fuzzy clustering methods. Finally, missing data are imputated under the assumption that the imputated value of missing data does not change the previous clustering results. The proposed IMD method is implemented and tested in two numerical experiments.
MacDougall, C, Percival, J & McGregor, C 1970, 'Integrating health information technology into clinical guidelines', 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Minneapolis, MN, pp. 4646-4649.
View/Download from: Publisher's site
McGregor, C & Smith, KP 1970, 'A Survey of Physiological Monitoring Data Models to Support the Service of Critical Care', 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009 33rd Annual IEEE International Computer Software and Applications Conference, IEEE, pp. 104-109.
View/Download from: Publisher's site
View description>>
Vast quantities of data is created by utilizing sensors to gather information from patients located in intensive care units worldwide through physiological monitoring. The service oriented architectural model has emerged as a mechanism to support data interchange in a structured way to support the provision of services. The nature of critical care is such that clinicians provide a service of care, often to patients that are not located within their intensive care unit, and prior to the arrangement of transport to their unit. As a result opportunities exist to utilize the service oriented approach to provide a service of critical care. This research presents a survey of how recent computing and IT research as applied to physiological collection, transmission and storage of physiological data utilizes the service of critical care concept based on a service oriented architecture approach. © 2009 IEEE.
McGregor, C & Smith, KP 1970, 'A Survey of Physiological Monitoring Data Models to support the Service of Critical Care', 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, IEEE 33rd International Computer Software and Applications Conference, IEEE, Seattle, WA, pp. 777-782.
McGregor, C, Smith, KP & Eklund, JM 1970, 'A Survey of Recent Physiological Monitoring and transmission to support the Service of Critical Care', 2009 22ND IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 22nd IEEE International Symposium on Computer-Based Medical Systems, IEEE, Albuquerque, NM, pp. 363-369.
McGregor, C, Smith, KP & Eklund, JM 1970, 'A survey of recent physiological monitoring and transmission to support the service of critical care', 2009 22nd IEEE International Symposium on Computer-Based Medical Systems, 2009 22nd IEEE International Symposium on Computer-Based Medical Systems (CBMS), IEEE, pp. 1-7.
View/Download from: Publisher's site
View description>>
Vast quantities of data is sensed from patients located in intensive care units worldwide through physiological monitoring. In recent times the service oriented architectural model has emerged as a mechanism to providing a structured computing approach to support the provision of services. The nature of critical care is such that clinicians provide a service of care, often to patients that are not located within their intensive care unit. As a result opportunities exist to utilize the service oriented approach to provide a service of critical care. This research presents a survey of recent computing research as applied to physiological collection and transmission to support intelligent patient monitoring using the service of critical care concept based on a service oriented architecture approach. ©2009 IEEE.
Mehboob, Z & Zowghi, D 1970, 'Industrial perspectives on architecture level change impact analysis in Web systems evolution', 2009 11th IEEE International Symposium on Web Systems Evolution, 2009 11th IEEE International Symposium on Web Systems Evolution (WSE), IEEE, Edmonton, Alberta, Canada, pp. 17-26.
View/Download from: Publisher's site
View description>>
Change impact analysis (CIA) approaches are mostly developed based on the understanding of both system development process and system architecture. It is thus reasonable to assume that if the development process or system architecture is fundamentally different, then CIA approaches must address these differences accordingly. This is particularly relevant in the context of Web systems, given that these systems often have a specific set of characteristics related to differences both in the architecture and the process through which they are developed. To investigate this issue we have interviewed web designers/architects and reported the industrial perspectives on using current architecture CIA approaches. The interview findings reveal a set of elicited needs that an architecture CIA approach should address to be suitably adopted during Web systems evolution. Additionally, systematic classification of these needs indicates the focus areas and their relevance in Web systems. Finally, the study findings provide guidance for the possible extension of architecture CIA approaches specifically for Web systems.
Mehboob, Z, Zowghi, D & Lowe, D 1970, 'An Approach for Comparison of Architecture Level Change Impact Analysis Methods and their relevance in Web Systems Evolution', ASWEC 2009: 20TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, Australian Software Engineering Conference, IEEE Computer Society Press, Gold Coast, Australia, pp. 162-172.
View/Download from: Publisher's site
View description>>
Change impact analysis (CIA) methods have been developed to identify the consequences of making changes to system artifacts and to support decision making with regards to that change. There is a growing body of research on CIA methods that specifically addresses changes and their impacts at a system architecture level. Most of the methods have been developed and validated on software system domain. However, there is little research consensus on: (i) the features that architectural CIA methods should comprehensively address; and (ii) which existing methods are comparatively suitable in a particular system domain such as Web systems. This paper presents a comparison approache that offer guidance on the selection of the most appropriate method for CIA activity and suitability of these methods in the context of Web systems.
Merigo, JM 1970, 'On the Use of the OWA Operator in the Weighted Average and its Application in Decision Making', WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, World Congress on Engineering 2009, INT ASSOC ENGINEERS-IAENG, Imperial Coll London, London, ENGLAND, pp. 82-87.
MERIGÓ, JM 1970, 'INDUCED GENERALIZED AGGREGATION OPERATORS IN THE WEIGHTED AVERAGE', Intelligent Decision Making Systems, Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering, WORLD SCIENTIFIC, Hasselt Univ, Hasselt, BELGIUM, pp. 625-630.
View/Download from: Publisher's site
MERIGÓ, JM 1970, 'ON THE UNIFICATION BETWEEN THE PROBABILITY, THE WEIGHTED AVERAGE AND THE OWA OPERATOR', Intelligent Decision Making Systems, Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering, WORLD SCIENTIFIC, Hasselt Univ, Hasselt, BELGIUM, pp. 375-380.
View/Download from: Publisher's site
Merigó, JM 1970, 'Probabilistic decision making with the OWA operator and its application in investment management', 2009 International Fuzzy Systems Association World Congress and 2009 European Society for Fuzzy Logic and Technology Conference, IFSA-EUSFLAT 2009 - Proceedings, Joint World Congress of International-Fuzzy-Systems-Association (IFSA)/European Conference of European-Society-for-Fuzzy-Logic-and-Technology (EUSFLAT), EUROPEAN SOC FUZZY LOGIC & TECHNOLOGY, Lisbon, PORTUGAL, pp. 1364-1369.
View description>>
We develop a new model for decision making under risk environment and under uncertainty. We introduce a new aggregation operator that unifies the probabilities and the ordered weighted averaging (OWA) operator in the same formulation. We call it the probabilistic ordered weighted averaging (POWA) operator. This aggregation operator provides a more complete representation of the decision problem because it is able to consider probabilistic information and the attitudinal character of the decision maker. We study different properties and families of the POWA operator. We also develop an illustrative example of the new approach in a decision making problem about selection of investments.
Merigó, JM 1970, 'The Fuzzy Probabilistic Weighted Averaging Operator and its Application in Decision Making', 2009 Ninth International Conference on Intelligent Systems Design and Applications, 2009 Ninth International Conference on Intelligent Systems Design and Applications, IEEE, Univ Pisa, Pisa, ITALY, pp. 485-490.
View/Download from: Publisher's site
MERIGÓ, JM & CASANOVAS, M 1970, 'USING DISTANCE MEASURES IN HEAVY AGGREGATION OPERATORS', Intelligent Decision Making Systems, Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering, WORLD SCIENTIFIC, Hasselt Univ, Hasselt, BELGIUM, pp. 589-594.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 1970, 'Some Basic Results of Fuzzy Research in the ISI Web of Knowledge', 2009 Ninth International Conference on Intelligent Systems Design and Applications, 2009 Ninth International Conference on Intelligent Systems Design and Applications, IEEE, Univ Pisa, Pisa, ITALY, pp. 1215-1220.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 1970, 'The fuzzy induced generalized OWA operator and its application in business decision making', 2009 International Fuzzy Systems Association World Congress and 2009 European Society for Fuzzy Logic and Technology Conference, IFSA-EUSFLAT 2009 - Proceedings, Joint World Congress of International-Fuzzy-Systems-Association (IFSA)/European Conference of European-Society-for-Fuzzy-Logic-and-Technology (EUSFLAT), EUROPEAN SOC FUZZY LOGIC & TECHNOLOGY, Lisbon, PORTUGAL, pp. 1661-1666.
View description>>
We present the fuzzy induced generalized OWA (FIGOWA) operator. It is an aggregation operator that uses the main characteristics of the fuzzy OWA (FOWA) operator, the induced OWA (IOWA) operator and the generalized OWA (GOWA) operator. Therefore, it uses uncertain information represented in the form of fuzzy numbers, generalized means and order inducing variables. The main advantage of this operator is that it includes a wide range of mean operators in the same formulation such as the FOWA, the IOWA, the GOWA, the induced GOWA, the fuzzy IOWA, the fuzzy generalized mean, etc. We study some of its main properties. A further generalization by using quasi-arithmetic means is also presented. This operator is called Quasi-FIOWA operator. We also develop an application of the new approach in a strategic decision making problem.
Merigo, JM, Gil-Lafuente, AM & Gil-Aluja, J 1970, 'Induced Aggregation Operators in the Generalized Adequacy Coefficient', WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, World Congress on Engineering 2009, INT ASSOC ENGINEERS-IAENG, Imperial Coll London, London, ENGLAND, pp. 7-11.
Merigó, JM, Gil-Lafuente, AM & Martorell, O 1970, 'On the Use of the Uncertain Induced OWA Operator and the Uncertain Weighted Average and its Application in Tourism Management', 2009 Ninth International Conference on Intelligent Systems Design and Applications, 2009 Ninth International Conference on Intelligent Systems Design and Applications, IEEE, Univ Pisa, Pisa, ITALY, pp. 856-861.
View/Download from: Publisher's site
Mohamed Mowjoon, D, Agbinya, JI & Chaczko, ZC 1970, 'Replicating Cytokines in Modelling Signal Exchange between Nodes in Wireless Mesh Networks', The International MultiConference of Engineers and Computer Scientists 2009, IAENG International Conference on Communication Systems and Applications, Newswood Limited, International Association of Engineers, Regal Kowloon Hotel, Kowloon, Hong Kong, pp. 315-318.
View description>>
In recent years wireless mesh network (WMN) technologies and their applications have been actively researched and developed as the promising solution for future wireless mobile networks. Conversely security of WMN is often a secondary reflection in development. In our previous work we proposed Artificial Immune System model to employ in secure routing in WMN. This paper proposes an emerging perception to model danger signal exchange between nodes in WMN by emulating the function of Cytokines in Human Immune System (HIS).
Musial, K, Juszczyszyn, K, Gabrys, B & Kazienko, P 1970, 'Patterns of Interactions in Complex Social Networks Based on Coloured Motifs Analysis', ADVANCES IN NEURO-INFORMATION PROCESSING, PT II, 15th International Conference on Neuro-Information Processing, Springer Berlin Heidelberg, Auckland, NEW ZEALAND, pp. 607-614.
View/Download from: Publisher's site
Nadimi, V, Azadeh, A, Saberi, M, Fattahi, S, Danesh, B & Tajvidi, A 1970, 'An artificial neural network algorithm and time series for improved forecasting of oil estimation: A case study of south korea and united kingdom (2001-2008)', 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. 739-744.
View/Download from: Publisher's site
View description>>
This paper presents an Artificial Neural Network (ANN) algorithm to improve oil production forecasting. ANN algorithm is developed by different data preprocessing methods and considering different training algorithms and transfer functions in ANN models. Bayesian regularization backpropagation (BR), Levenberg-Marquardt back propagation (LM) and Gradient descent with momentum and adaptive learning rate backpropagation (GDX) are used as training algorithms. Also, log sigmoid and Hyperbolic tangent sigmoid are used as transfer functions. 240 ANN in 6 groups are examined with one to forthy neuron in hidden layer. The efficiency of constructed ANN models is examined in South Korea via mean absolute percentage error (MAPE). One of feature of the proposed algorithm is utilization of Autocorrelation Function (ACF) to define input variables whereas conventional methods use trial and error method. Monthly oil production in South Korea January 2001 to July 2008 is considered as the case of this study. ©2009 IEEE.
Parvin, S, Ali, S, Singh, J, Hussain, F & Han, S 1970, 'Towards DoS attack prevention based on clustering architecture in mobile IP communication', 2009 35th Annual Conference of IEEE Industrial Electronics, IECON 2009 - 35th Annual Conference of IEEE Industrial Electronics (IECON), IEEE, Porto, Portugal, pp. 3183-3188.
View/Download from: Publisher's site
View description>>
Mobile IP communication, like wired communication and mobile ad hoc networking, is vulnerable to Denial-of-Service (DOS) attacks. In this paper, we propose using a lightweight packet filtering technique in different domains and base stations to reduce/el
Petrelli, D, van den Hoven, E & Whittaker, S 1970, 'Making History: Intentional Capture of Future Memories', CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, CHI 2009 - Digital Life New World, ACM, Boston, USA, pp. 1723-1732.
View/Download from: Publisher's site
View description>>
'Lifelogging' technology makes it possible to amass digital data about every aspect of our everyday lives. Instead of focusing on such technical possibilities, here we investigate the way people compose long-term mnemonic representations of their lives. We asked 10 families to create a time capsule, a collection of objects used to trigger remembering in the distant future. Our results show that contrary to the lifelogging view, people are less interested in exhaustively digitally recording their past than in reconstructing it from carefully selected cues that are often physical objects. Time capsules were highly expressive and personal, many objects were made explicitly for inclusion, however with little object annotation. We use these findings to propose principles for designing technology that supports the active reconstruction of our future past.
Pileggi, SF 1970, 'A multi-domain framework for Wireless Vehicular Sensor Network', 2009 International Conference on Ultra Modern Telecommunications & Workshops, Workshops (ICUMT), IEEE, pp. 1-8.
View/Download from: Publisher's site
View description>>
Proposed solution is an extendible multi-domain core framework for Wireless Vehicular Sensor Network (WVSN). The key idea is providing a lightweight architecture as alternative to the typical vertical concept of domain specific ad-hoc solution: the more flexible horizontal approach assumes a core framework that can be particularized in function of considered application. Modern wireless sensor platforms are flexible smart nodes that provide relatively limited computation, storage, communication and sensing resource, ad-hoc designed for advanced networking. WVSN assumes nodes mounted on vehicles. Because limited resource that commonly characterizes WSN, protocols stacks and mechanisms are designed in accordance with a soft-state model in order to assure high-performance and robustness for time-critical messages in both vehicle-to-vehicle and vehicle-to-roadside interaction. ©2009 IEEE.
Pileggi, SF, Molina, B, Palau, CE & Esteve, M 1970, 'Move for all (M4All): Alive J2ME content exchange facility for mobile environments', 2009 IEEE International Conference on Multimedia and Expo, 2009 IEEE International Conference on Multimedia and Expo (ICME), IEEE, pp. 1780-1783.
View/Download from: Publisher's site
View description>>
Context-aware and live multimedia content production and delivery can be considered as key issues for enabling dynamic sharing among members of living social networks. The proposed cross-platform environment, deployed on J2ME technology, enables mobile users with a suitable tool for content production, dynamic context and metadata integration and content publication directly from smart devices. Multimedia content is provided with an extensible semantic and functional data model that makes shared content easily to be catalogued, classified and managed within large scale communities. Moreover, an advanced context management model provides users with multiple options for effective content publication. Support for live streaming and potential interaction with multiple social communities makes the platform really flexible within different domains and application fields. ©2009 IEEE.
Qumer, A & Henderson-Sellers, B 1970, 'Agile Software Solution Framework: An Analysis of Practitioners' Perspectives', INFORMATION SYSTEMS: MODELING, DEVELOPMENT, AND INTEGRATION, Information Systems: Modeling, Development, and Integration, Springer-Verlag, Campbelltown, NSW, pp. 41-52.
View/Download from: Publisher's site
View description>>
We have developed an agile software solution framework (ASSF) to create and tailor situation-specific agile methods by using a method engineering approach. Here, we report on a questionnaire-based survey with thirty-three experts in order to determine the relevance and importance of the aspects or elements of agile software development methodology specified in ASSF. We have analysed the relevance and importance that each respondent places on the identified elements of the ASSF. © 2009 Springer Berlin Heidelberg.
Raza, M, Hussain, FK & Chang, E 1970, 'Quality Measures for Digital Business Ecosystems Formation', IT REVOLUTIONS, pp. 118-121.
View/Download from: Publisher's site
View description>>
To execute a complex business task, business entities may need to collaborate with each other as individually they may not have the capability or willingness to perform the task on its own. Such collaboration can be seen implemented in digital business ecosystems in the form of simple coalitions using multi-agent systems or by employing Electronic Institutions. A major challenge is choosing optimal partners who will deliver the agreed commitments, and act in the coalition's interest. Business entities are scaled according to their quality level. Determining the quality of previously unknown business entities and predicting the quality of such an entity in a dynamic environment are crucial issues in Business Ecosystems. A comprehensive quality management system grounded in the concepts of Trust and Reputation can help address these issues. © 2009 ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
Sood, SC, Kattiyapornpong, U, Miller, K & Woodside, A 1970, 'Assessing perceived destination image and brand equity through web 2.0', Travel and Tourism Research Association Conference Proceedings, 40th Travel and Tourism Research Association Conference, Travel and Tourism Research Association, Honolulu, Hawaii.
Tajvidi, A, Azadeh, A, Saberi, M, Izadbakhsh, H, Danesh, B & Gitiforouz, A 1970, 'An integrated simulated-based fuzzy regression algorithm and time series for energy consumption estimation with non-stationary data and case studies', 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, pp. 139-143.
View/Download from: Publisher's site
View description>>
This study presents an integrated fuzzy regression, computer simulation and time series framework to estimate and predict electricity demand for seasonal and monthly changes in electricity consumption especially in developing countries such as China and Iran with non-stationary data. Furthermore, it is difficult to model uncertain behavior of energy consumption with only conventional fuzzy regression or time series and the integrated algorithm could be an ideal substitute for such cases. After reviewing various fuzzy regression models and studying their advantages and shortcomings, the preferred model is selected for estimation by the proposed algorithm. Computer simulation is developed to generate random variables for monthly electricity consumption. Truly, fuzzy regression is run with Computer simulation output too. Preferred Time series model is selected from linear or nonlinear models. For this, after selecting preferred ARIMA model, Mcleod-Li test is applied to determine nonlinearity condition. When, nonlinearity condition is satisfied, the preferred nonlinear model is selected and defined as preferred time series model. At last, preferred model from fuzzy regression and time series model is selected by Granger-Newbold. Also, the impact of data preprocessing and post processing on the fuzzy regression performance is considered by the proposed algorithm. In addition, another unique feature of the proposed algorithm is utilization of Autocorrelation Function (ACF) to define input variables whereas conventional methods use trial and error method. Monthly electricity consumption of Iran from March 1994 to February 2005 is considered as the case of this study. The MAPE estimation of Genetic Algorithm (GA), Artificial Neural Network (ANN) versus the proposed algorithm shows the appropriateness of the proposed algorithm. ©2009 IEEE.
Tajvidi, A, Azadeh, A, Saberi, M, Izadbakhsh, H, Danesh, B & Gitiforouz, A 1970, 'An Integrated Simulated-Based Fuzzy Regression Algorithm and Time Series for Energy Consumption Estimation with Non-Stationary Data and case studies', 2009 3RD IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 3rd IEEE International Conference on Digital Ecosystems and Technologies, IEEE, TURKEY, Istanbul, pp. 670-+.
Tavoukjian, A & Johnston, AJ 1970, 'Neural Networks and Evolutionary Algorithms in Music Composition', Proceedings of the Australasian Computer Music Conference, Australasian Computer Music Conference, Australasian Computer Music Association, Queensland University of Technology, Brisbane, Australia, pp. 72-78.
View description>>
In this paper we describe a system developed to generate short musical phrases in the same style as a set of training melodies. The system uses an ensemble of neural networks to rate the similarity of a generated musical phrase to a set of human composed phrases. Given this rating a genetic algorithm is used to effectively 'search' for other similar phrases. Preliminary evaluations indicate that the proposed approach shows promise. A limitation of the system is the relatively simple representation of musical phrases employed and the processing time required to use this technique on longer phrases.
Tian, B, Chang, E, Dillon, TS, Han, S, Hussain, FK & IEEE 1970, 'An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings', 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, IEEE Consumer Communications and Networking Conference, IEEE, Las Vegas, NV, pp. 1061-1065.
View description>>
Self-healing key distribution mechanism can be utilized for distributing session keys over an unreliable network. A self-healing key distribution scheme using bilinear pairings is proposed in this paper. As far as we know, it is the first pairing-based a
Venables, A, Tan, G & Lister, R 1970, 'A closer look at tracing, explaining and code writing skills in the novice programmer', Proceedings of the fifth international workshop on Computing education research workshop, ICER '09: International Computing Education Research Workshop, ACM, Berkeley, CA, USA, pp. 117-128.
View/Download from: Publisher's site
View description>>
Abstract: The way in which novice programmers learn to write code is of considerable interest to computing education researchers. One research approach to understanding how beginners acquire their programming abilities has been to look at student performance in exams. Lopez et al. (2008) analyzed student responses to an end-of-first-semester exam. They found two types of questions accounted for 46% of the variance on the code writing portion of the same exam. One of those types of question required students to trace iterative code, while the other type required students to explain what a piece of code did. In this paper, we investigate whether the results by Lopez et al. may be generally indicative of something about novice programmers, or whether their results are just an artifact of their particular exam. We studied student responses to our own exam and our results are broadly consistent with Lopez et al. However, we did find that some aspects of their model are sensitive to the particular exam questions used. Specifically, we found that student performance on explaining code was hard to characterize, and the strength of the relationship between explaining and code writing is particularly sensitive to the specific questions asked. Additionally, we found Lopez et al.'s use of a Rasch model to be unnecessary, which will make it far easier for others to conduct similar research.
Wee, H-M, Lu, J, Zhang, G, Chiao, H-E & Gao, Y 1970, 'A Decision Making Model for Vendor-Buyer Inventory Systems', ROUGH SETS, FUZZY SETS, DATA MINING AND GRANULAR COMPUTING, PROCEEDINGS, International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing, Springer, Delhi, India, pp. 336-+.
View/Download from: Publisher's site
View description>>
In a vendor-buyer supply chain, the buyer's economic order quantity and the vendor's optimal number of deliveries are derived either independently or collaboratively. In this paper, we establish a two-stage vendor-buyer inventory system decision model by using bi-level decision making approach. The experimental result shows that the proposed bi-level decision model can effectively handle two-stage vendor-buyer inventory problems and obtain better results than the existing methods.
Wenjun Zhang, Lin Gui, Bo Liu, Jian Xiong & Dingxiang Lin 1970, 'Services and trial test of CMMB system', 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE, Bilbao, SPAIN, pp. 1-4.
View/Download from: Publisher's site
Whalley, JL & Lister, R 1970, 'The BRACElet 2009.1 (Wellington) Specification', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Wellington, New Zealand, pp. 9-18.
View description>>
BRACElet is a multi-institutional computer education research study of novice programmers. The project is open to new members. The purpose of this paper is to: (1) provide potential new members with an overview of BRACElet, and (2) specify the common core for the next data collection cycle. In this paper, BRACElet is taking the unusual step of making its study design public before data is collected. We invite anyone to run their own study using our study design, and publish their findings, irrespective of whether they formally join BRACElet. We look forward to reading their paper. © 2009, Australian Computer Society, Inc.
Yu, S, Thapngam, T, Liu, J, Wei, S & Zhou, W 1970, 'Discriminating DDoS Flows from Flash Crowds Using Information Distance', 2009 Third International Conference on Network and System Security, 2009 Third International Conference on Network and System Security, IEEE, Surfers Paradise, AUSTRALIA, pp. 351-356.
View/Download from: Publisher's site
Zhang, G, Rong, M & Fang, Y 1970, 'One Extension of Authentication Test Based on Strand Space Model', 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 5th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE, PEOPLES R CHINA, Beijing, pp. 4506-+.
Zhang, G, Zhang, G, Gao, Y & Lu, J 1970, 'A Fuzzy Bilevel Model and a PSO-Based Algorithm for Day-Ahead Electricity Market Strategy Making', KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II, PROCEEDINGS, International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, IOS Press, Santiago, Chile, pp. 736-744.
View/Download from: Publisher's site
View description>>
This paper applies bilevel optimization techniques and fuzzy set theory to model and support bidding strategy making in electricity markets. By analyzing the strategic bidding behavior of generating companies, we build up a fuzzy bilevel optimization model for day-ahead electricity market strategy making. In this model, each generating company chooses the bids to maximize the individual profit. A market operator solves an optimization problem based on the minimization purchase electricity fare to determine the output power for each unit and uniform marginal price. Then, a particle swarm optimization (PSO)-based algorithm is developed for solving problems defined by this model.
Zhang, G, Zhang, G, Gao, Y, Lu, J & IEEE 1970, 'A Bilevel Optimization Model and a PSO-based Algorithm in Day-ahead Electricity Markets', 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, IEEE Conference on Systems, Man and Cybernetics, IEEE, Texas, USA, pp. 611-616.
View/Download from: Publisher's site
View description>>
Strategic bidding problems are becoming key issues in competitive electricity markets. This paper applies bilevel optimization theory to deal with this issue. We first analyze generating company strategic bidding behaviors and build a bilevel optimization model for a day-ahead electricity market. In this bilevel optimization model, each generating company will choose their bids in order to maximize their individual profits. A market operator will determine the output power for each unit and uniform marginal price based on the minimization purchase electricity fare. For solving this competitive strategic bidding problem described by the bilevel optimization model, a particle swarm optimization (PSO)-based algorithm is. Experiment results have demonstrated the validity of the PSO-based algorithm in solving the competitive strategic bidding problems for a day-ahead electricity market. ©2009 IEEE.
Zhang, J, Lu, J, Zhang, G & IEEE 1970, 'A Hybrid Knowledge-based Prediction Method for Avian Influenza Early Warning', 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, IEEE Conference on Systems, Man and Cybernetics, IEEE, San Antonio, Texas, USA, pp. 617-622.
View/Download from: Publisher's site
View description>>
High pathogenic avian influenza remains rampant and the epidemic size has been growing in the world. The early warning system (EWS) for avian influenza becomes increasingly essential to militating against the risk of outbreak crisis. An EWS can generate timely early warnings to support decision makers in identifying underlying vulnerabilities and implementing relevant strategies. This paper addresses this crucial issue and focuses on how to make full use of previous events to perform comprehensive forecasting and generate reliable warning signals. It proposes a hybrid knowledge-based prediction (HKBP) method which combines case-based reasoning (CBR) with the fuzzy logic technique. The method can improve the prediction accuracy for avian influenza in a specific region at a specific time. An example is presented to illustrate the capabilities and procedures of the HKBP method.
Zhang, Z, Zhang, G, Zhang, X & Fan, J 1970, 'TAP: An Adjustable Planar Structure for Adaptive Topology Control in Wireless Ad Hoc Networks', 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, IEEE International Conference on Communications (ICC 2009), IEEE, GERMANY, Dresden, pp. 458-463.
Zheng, L, Jin, J, Guo, Y, Lu, H & Zhu, J 1970, 'Design and electromagnetic analysis of a HTS linear synchronous motor', 2009 International Conference on Applied Superconductivity and Electromagnetic Devices, 2009 International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD), IEEE, Chengdu, China, pp. 5-10.
View/Download from: Publisher's site
View description>>
High temperature superconducting (HTS) linear synchronous motor (LSM) integrated with HTS magnetic levitation system, can realize self-levitation and self-guidance without any sliding friction, which will have important applications in many fields such as electromagnetic aircraft launch system, maglev transportation. This paper presents the design and electromagnetic analysis of a HTS LSM, which is levitated by a magnetic levitation system consisting of HTS bulkspermanent magnet (PM) guideways. Numerical analysis and magnetic field finite element analysis (FEA) methods are applied to analyze the thrust, levitation and guidance force characteristics, and the electromagnetic performance of HTS LSM under no-load and load situations are studied with the analysis results are given. Finally, the primary motor running testing results are provided.
Zhou, Q, Xu, G & Zong, Y 1970, 'Web Co-clustering of Usage Network Using Tensor Decomposition', 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, IEEE, pp. 311-314.
View/Download from: Publisher's site
View description>>
Web clustering is an approach to aggregate web objects into various categories according to underlying relationships among them. Finding co-clusters of web objects is an emerging topic in the context of web usage mining. In this paper we will present an algorithm using tensor decomposition to co-cluster web objects based on analysis of user navigational tasks. The usage data of users visiting web sites is collected as experimental data to construct the usage network and validate the presented method. Experimental results have demonstrated the proposed method can clearly reveal the aggregations of web objects as a result of different navigational tasks. © 2009 IEEE.
Zowghi, D 1970, 'Requirements Engineering Education and Training: Key Challenges and Practical Solutions', 2009 17th IEEE International Requirements Engineering Conference, 2009 17th IEEE International Requirements Engineering Conference (RE), IEEE, pp. 358-358.
View/Download from: Publisher's site
View description>>
Academics and practitioners alike have long recognized the key challenges of requirements engineering education and training. This panel attempts to discuss these key challenges in details and provide an opportunity for a meaningful dialogue between academics and practitioners for identifying effective pedagogical paradigms, practical techniques and tools for teaching and learning requirements engineering principles. © 2009 IEEE.
Zowghi, D 1970, 'Teaching Requirements Engineering to the Baháí Students in Iran who are Denied of Higher Education', 2009 Fourth International Workshop on Requirements Engineering Education and Training, 2009 Fourth International Workshop on Requirements Engineering Education and Training (REET 2009), IEEE, pp. 38-48.
View/Download from: Publisher's site
View description>>
The increasing interest in Requirements Engineering (RE) in recent years has motivated many academics to provide students with a broad knowledge of the fundamental principles of RE. In RE Education and Training (REET), it is imperative to cover a wide range of topics and teach a variety of skills. Major challenges of REET have already been well recognised and documented in the literature. Moreover, wide spread use of web-based education has caused an explosion of published literature related to distance education. When students are not collocated with the instructor and they themselves are geographically dispersed clearly exacerbates some of the well-known challenges of REET. In this paper I share the experiences gained in teaching an online postgraduate RE subject for the first time to students located in Iran. These students have been denied of basic human rights, specifically access to University education. I used role playing as a pedagogical tool to give students a greater appreciation of issues and problems associated with RE in quasi-real settings. This paper describes some of the challenges encountered and the lessons learnt with some suggestions on how to address, among other issues, the problem of distance between students and the instructor.