-, JL, -, CW, -, DP, -, HH & -, XZ 2011, 'Realizing Secure Cloud Computing Environment by ECA Rules', International Journal of Advancements in Computing Technology, vol. 3, no. 5, pp. 267-274.
View/Download from: Publisher's site
-, JL, -, XZ, -, DP & -, HH 2011, 'Active XML for Service Discovery in Mobile Environment', Journal of Convergence Information Technology, vol. 6, no. 6, pp. 47-53.
View/Download from: Publisher's site
Ahmed, A, Mubashir Hassan, M, Sohaib, O, Hussain, W & Qasim Khan, M 2011, 'An agent based architecture for cognitive spectrum management', Australian Journal of Basic and Applied Sciences, vol. 5, no. 12, pp. 682-689.
View description>>
In the recent years, wireless technologies and devices have progressed dramatically that has augmented the demand for electromagnetic spectrum. Some research work showed that spectrum access and provision to user is not possible due to shortage of spectrum but federal communication commission refused to accept this theory and indicated that the spectrum is available since most of the frequency bands are underutilized. In order to allow the use of these frequency bands without interference, cognitive radio was proposed that characterizes the growing intelligence of radio systems can adapt to the radio environment, allowing opportunistic usage and sharing with the existing uses of spectrum. To take this concept a step further, we propose to use intelligent agent for spectrum management in the context of cognitive radio in this paper. In our proposed architecture, agents are embedded in the radio devices that coordinate their operations to benefit from network and avoid interference with the primary user. Agents carry a set of modules to gather information about the terminal status and the radio environment and act accordingly to the constraints of the user application.
Ahmed, W, Aslam, MA, Lopez-Lorca, AA, Shen, J, Beydoun, G & Richards, D 2011, 'Using Ontologies to Synchronize Change in Relational Database Systems', JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, vol. 43, no. 2, pp. 89-107.
Ali, A, Hussain, W & Ahmed, A 2011, 'E-learning: Closing the digital gap between developed and developing countries', Australian Journal of Basic and Applied Sciences, vol. 5, no. 11, pp. 903-908.
View description>>
As there are many gaps between developed and developing countries, Digital Gap is one of them. Research has raised the idea and question of e-learning closing this gap. Research has identified, compared, evaluated and reviewed the issue from both the angels of literature and quantitative research. The focus has been to assess the e-learning potential to provide quality education though electronic means and review to what extent this is going to be feasible. ICT infrastructure, channels of communication, learning styles, the role of teacher and classroom and blended learning has been discussed.
Anaissi, A, Kennedy, PJ & Goyal, ML 2011, 'Dimension Reduction of Microarray Data Based on Local Principal Component', World Academy of Science, Engineering and Technology, vol. 77, pp. 68-73.
View description>>
Analysis and visualization of microarraydata is veryassistantfor biologists and clinicians in the field of diagnosis and treatment of patients. It allows Clinicians to better understand the structure of microarray and facilitates understanding gene expression in cells. However, microarray dataset is a complex data set and has thousands of features and a very small number of observations. This very high dimensional data set often contains some noise, non-useful information and a small number of relevant features for disease or genotype. This paper proposes a non-linear dimensionality reduction algorithm Local Principal Component (LPC) which aims to maps high dimensional data to a lower dimensional space. The reduced data represents the most important variables underlying the original data. Experimental results and comparisons are presented to show the quality of the proposed algorithm. Moreover, experiments also show how this algorithm reduces high dimensional data whilst preserving the neighbourhoods of the points in the low dimensional space as in the high dimensional space.
Azadeh, A, Asadzadeh, SM, Saberi, M, Nadimi, V, Tajvidi, A & Sheikalishahi, M 2011, 'A Neuro-fuzzy-stochastic frontier analysis approach for long-term natural gas consumption forecasting and behavior analysis: The cases of Bahrain, Saudi Arabia, Syria, and UAE', Applied Energy, vol. 88, no. 11, pp. 3850-3859.
View/Download from: Publisher's site
Azadeh, A, Rouzbahman, M, Saberi, M & Mohammad Fam, I 2011, 'An adaptive neural network algorithm for assessment and improvement of job satisfaction with respect to HSE and ergonomics program: The case of a gas refinery', Journal of Loss Prevention in the Process Industries, vol. 24, no. 4, pp. 361-370.
View/Download from: Publisher's site
Azadeh, A, Saberi, M & Anvari, M 2011, 'An Integrated Artificial Neural Network Fuzzy C-Means-Normalization Algorithm for performance assessment of decision-making units: The cases of auto industry and power plant', Computers & Industrial Engineering, vol. 60, no. 2, pp. 328-340.
View/Download from: Publisher's site
Azadeh, A, Saberi, M & Asadzadeh, SM 2011, 'An adaptive network based fuzzy inference system–auto regression–analysis of variance algorithm for improvement of oil consumption estimation and policy making: The cases of Canada, United Kingdom, and South Korea', Applied Mathematical Modelling, vol. 35, no. 2, pp. 581-593.
View/Download from: Publisher's site
Azadeh, A, Saberi, M & Gitiforouz, A 2011, 'An integrated simulation-based fuzzy regression-time series algorithm for electricity consumption estimation with non-stationary data', Journal of the Chinese Institute of Engineers, vol. 34, no. 8, pp. 1047-1066.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Anvari, M & Mohamadi, M 2011, 'An integrated artificial neural network-genetic algorithm clustering ensemble for performance assessment of decision making units', Journal of Intelligent Manufacturing, vol. 22, no. 2, pp. 229-245.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Anvari, M, Azaron, A & Mohammadi, M 2011, 'An adaptive network based fuzzy inference system–genetic algorithm clustering ensemble algorithm for performance assessment and improvement of conventional power plants', Expert Systems with Applications, vol. 38, no. 3, pp. 2224-2234.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Asadzadeh, SM & Khakestani, M 2011, 'A hybrid fuzzy mathematical programming-design of experiment framework for improvement of energy consumption estimation with small data sets and uncertainty: The cases of USA, Canada, Singapore, Pakistan and Iran', Energy, vol. 36, no. 12, pp. 6981-6992.
View/Download from: Publisher's site
Azadeh, A, Saberi, M, Moghaddam, RT & Javanmardi, L 2011, 'An integrated Data Envelopment Analysis–Artificial Neural Network–Rough Set Algorithm for assessment of personnel efficiency', Expert Systems with Applications, vol. 38, no. 3, pp. 1364-1373.
View/Download from: Publisher's site
Azadeh, A, Seraj, O & Saberi, M 2011, 'A comparative assessment of fuzzy regression models: the case of oil consumption estimation', International Journal of Industrial and Systems Engineering, vol. 7, no. 2, pp. 195-195.
View/Download from: Publisher's site
View description>>
The objective of this study is to examine the most well-known FR approaches with respect to oil consumption estimation. Furthermore, there is no clear cut as to which approach is superior for oil consumption estimation. The economic indicators used in this paper are population, cost of crude oil, gross domestic production and annual oil production. The data for oil consumption in Canada, USA, Japan and Australia from 1990 to 2005 are considered. The input data are divided into train and test data. The FR models have been tuned for all their parameters according to the train data and the best coefficients are identified. Three popular defuzzification methods for defuzzifying outputs are applied. For determining the rate of error of FR models estimations, mean absolute percentage error is calculated. This study reveals that there is no best FR model unlike previous studies which claim to have developed the most efficient FR models. Copyright © 2011 Inderscience Enterprises Ltd.
Azadeh, A, Seraj, O & Saberi, M 2011, 'An integrated fuzzy regression–analysis of variance algorithm for improvement of electricity consumption estimation in uncertain environments', The International Journal of Advanced Manufacturing Technology, vol. 53, no. 5-8, pp. 645-660.
View/Download from: Publisher's site
Beydoun, G, Lopez-Lorca, AA, Garcia-Sanchez, F & Martinez-Bejar, R 2011, 'How do we measure and improve the quality of a hierarchical ontology?', JOURNAL OF SYSTEMS AND SOFTWARE, vol. 84, no. 12, pp. 2363-2373.
View/Download from: Publisher's site
View description>>
Hierarchical ontologies enable organising information in a human-machine understandable form, but constructing them for reuse and maintainability remains difficult. Often supporting tools available lack formal methodological underpinning and their developers are not supported by any concomitant metrics. The paper presents a formal underpinning to provide quality metrics of a taxonomy hierarchical ontology and proposes a methodology for semi-automatic building of maintainable taxonomies. Users provide terms to be used to describe different ontological elements as well as their attributes and their ranges of values. The methodology uses the formalised metrics to assess the quality of the users input and proposes changes according to given quality constraints. The paper illustrates the metrics and the methodology in constructing and repairing two medium size well-known taxonomies. © 2011 Elsevier Inc. All rights reserved.
Beydoun, G, Low, G, Tran, N & Bogg, P 2011, 'Development of a peer-to-peer information sharing system using ontologies', EXPERT SYSTEMS WITH APPLICATIONS, vol. 38, no. 8, pp. 9352-9364.
View/Download from: Publisher's site
Bremner, MJ, Jozsa, R & Shepherd, DJ 2011, 'Classical simulation of commuting quantum computations implies collapse of the polynomial hierarchy', PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, vol. 467, no. 2126, pp. 459-472.
View/Download from: Publisher's site
View description>>
We consider quantum computations comprising only commuting gates, known as IQP computations, and provide compelling evidence that the task of sampling their output probability distributions is unlikely to be achievable by any efficient classical means. More specifically, we introduce the class post-IQP of languages decided with bounded error by uniform families of IQP circuits with post-selection, and prove first that post-IQP equals the classical class PP. Using this result we show that if the output distributions of uniform IQP circuit families could be classically efficiently sampled, either exactly in total variation distance or even approximately up to 41 per cent multiplicative error in the probabilities, then the infinite tower of classical complexity classes known as the polynomial hierarchy would collapse to its third level. We mention some further results on the classical simulation properties of IQP circuit families, in particular showing that if the output distribution results from measurements on only O(log n) lines then it may, in fact, be classically efficiently sampled.
Budka, M, Gabrys, B & Musial, K 2011, 'On Accuracy of PDF Divergence Estimators and Their Applicability to Representative Data Sampling', Entropy, vol. 13, no. 7, pp. 1229-1266.
View/Download from: Publisher's site
Catley, C, Smith, K, McGregor, C, James, A & Eklund, JM 2011, 'A Framework for Multidimensional Real-Time Data Analysis', International Journal of Computational Models and Algorithms in Medicine, vol. 2, no. 1, pp. 16-37.
View/Download from: Publisher's site
View description>>
In this paper, the authors present a framework to support multidimensional analysis of real-time physiological data streams and clinical data. The clinical context for the case study demonstration is neonatal intensive care, focusing specifically on the detection of episodes of central apnoea, a clinically significant problem. The model accounts for the multidimensional and real-time nature of apnoea of prematurity and the associated clinical rules. The framework demonstration includes: 1) defining rules that quantify concurrent behaviours between multiple synchronous data streams and asynchronous data values; 2) designing UML models to define present practice event processing for episodes of apnoea; 3) translating the model in SPADE to enable the deployment within the real-time processing layer of the Artemis platform, which utilizes IBM’s InfoSphere Streams; 4) demonstrating knowledge discovery with simple and complex temporal abstractions of the data streams; and 5) presenting results for early detection of episodes of apnoea across multiple physiological data streams.
Cetindamar, D & Pala, O 2011, 'Chief technology officer roles and performance.', Technol. Anal. Strateg. Manag., vol. 23, no. 10, pp. 1031-1046.
View/Download from: Publisher's site
Cheng, J, Qiao, M, Bian, W & Tao, D 2011, '3D human posture segmentation by spectral clustering with surface normal constraint.', Signal Process., vol. 91, no. 9, pp. 2204-2212.
View/Download from: Publisher's site
View description>>
In this paper, we propose a new algorithm for partitioning human posture represented by 3D point clouds sampled from the surface of human body. The algorithm is formed as a constrained extension of the recently developed segmentation method, spectral clu
Devitt, SJ, Stephens, AM, Munro, WJ & Nemoto, K 2011, 'Integration of highly probabilistic sources into optical quantum architectures: perpetual quantum computation', New J. Phys. 13: 095001 (2011), vol. 13.
View/Download from: Publisher's site
View description>>
In this paper we introduce a design for an optical topological cluster statecomputer constructed exclusively from a single quantum component. Unlikeprevious efforts we eliminate the need for on demand, high fidelity photonsources and detectors and replace them with the same device utilised to createphoton/photon entanglement. This introduces highly probabilistic elements intothe optical architecture while maintaining complete specificity of thestructure and operation for a large scale computer. Photons in this system arecontinually recycled back into the preparation network, allowing for aarbitrarily deep 3D cluster to be prepared using a comparatively small numberof photonic qubits and consequently the elimination of high frequency,deterministic photon sources.
Dong, H & Hussain, FK 2011, 'Semantic service matchmaking for Digital Health Ecosystems', KNOWLEDGE-BASED SYSTEMS, vol. 24, no. 6, pp. 761-774.
View/Download from: Publisher's site
View description>>
The vision of Digital Ecosystems was initiated by the European Commission, with the purpose of constructing an information and communication technology environment to facilitate the sustainable development of small and medium enterprises. As a key sub-domain of Digital Ecosystems, Digital Health Ecosystems provide crucial services to maintain the health of the main participants of Digital Ecosystems. We are concerned with the large-scale, ambiguous, heterogeneous, and untrustworthy nature of health service information in Digital Health Ecosystems. An intensive survey found that current research cannot support accurate and trustworthy matchmaking between health service requests and health service advertisements in Digital Health Ecosystems. Therefore, in this paper, we propose a framework for a semantic service matchmaker that takes into account the ambiguous, heterogeneous nature of service information in Digital Health Ecosystems. This framework is designed to make four major contributions, which are health service domain knowledge modeling, online health service information disambiguation, health service query disambiguation and health service quality evaluation and ranking. In order to thoroughly evaluate this framework, we implement a prototype - a Semantic Health Service Search Engine, and conduct a series of experiments on the prototype using a functional testing and simulation approach
Dong, H, Hussain, FK & Chang, E 2011, 'A framework for discovering and classifying ubiquitous services in digital health ecosystems', JOURNAL OF COMPUTER AND SYSTEM SCIENCES, vol. 77, no. 4, pp. 687-704.
View/Download from: Publisher's site
View description>>
A digital ecosystem is a widespread type of ubiquitous computing environment comprised of ubiquitous, geographically dispersed, and heterogeneous species, technologies and services. As a subdomain of the digital ecosystems, digital health ecosystems are crucial for the stability and sustainable development of the digital ecosystems. However, since the service information in the digital health ecosystems exhibits the same features as those in the digital ecosystems, it is difficult for a service consumer to precisely and quickly retrieve a service provider for a given health service request. Consequently, it is a matter of urgency that a technology is developed to discover and classify the health service information obtained from the digital health ecosystems. A survey of state-of-the-art semantic service discovery technologies reveals that no significant research effort has been made in this area. Hence, in this paper, we present a framework for discovering and classifying the vast amount of service information present in the digital health ecosystems. The framework incorporates the technology of semantic focused crawler and social classification. A series of experiments are conducted in order to respectively evaluate the framework and the employed mathematical model.
Dong, H, Hussain, FK & Chang, E 2011, 'A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment', JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, vol. 34, no. 2, pp. 619-631.
View/Download from: Publisher's site
View description>>
A Service Ecosystem is a biological view of the business and software environment, which is comprised of a Service Use Ecosystem and a Service Supply Ecosystem. Service matchmakers play an important role in ensuring the connectivity between the two ecosystems. Current matchmakers attempt to employ ontologies to disambiguate service consumers' service queries by semantically classifying service entities and providing a series of human computer interactions to service consumers. However, the lack of relevant service domain knowledge and the wrong service queries could prevent the semantic service matchmakers from seeking the service concepts that can be used to correctly represent service requests. To resolve this issue, in this paper, we propose the framework of a service concept recommendation system, which is built upon a semantic similarity model. This system can be employed to seek the concepts used to correctly represent service consumers' requests, when a semantic service matchmaker finds that the service concepts that are eventually retrieved cannot match the service requests. Whilst many similar semantic similarity models have been developed to date, most of them focus on distance-based measures for the semantic network environment and ignore content-based measures for the ontology environment. For the ontology environment in which concepts are defined with sufficient datatype properties, object properties, and restrictions etc., the content of concepts should be regarded as an important factor in concept similarity measures. Hence, we present a novel semantic similarity model for the service ontology environment. The technical details and evaluation details of the framework are discussed in this paper
Dong, Y, Hong, W-C, Xu, Y & Yu, S 2011, 'Selecting the Individual Numerical Scale and Prioritization Method in the Analytic Hierarchy Process: A 2-Tuple Fuzzy Linguistic Approach', IEEE Transactions on Fuzzy Systems, vol. 19, no. 1, pp. 13-25.
View/Download from: Publisher's site
Dovey, K & Muller, L 2011, 'Dangerous learning in edgy contexts: creativity and innovation in the South African arts domain', International Journal of Lifelong Education, vol. 30, no. 5, pp. 613-629.
View/Download from: Publisher's site
View description>>
n this paper, we outline a pilot project aimed at exploring the role of contextual factors in the facilitation of creativity and innovation within a range of South African art forms. Interviews with 11 people who have rich experience of the South African art domain delivered an insightful perspective on the contextual factors driving lifelong creativity and its continuous realization in innovative outcomes within these art forms.
Dyson, LE & Litchfield, A 2011, 'Advancing Collaboration between M-Learning Researchers and Practitioners through an Online Portal and Web 2.0 Technologies', International Journal of Mobile and Blended Learning, vol. 3, no. 1, pp. 64-72.
View/Download from: Publisher's site
View description>>
With growing interest in mobile learning to address the educational requirements of a generation of students who have grown up with digital technology, and given the widespread adoption of mobile devices by indigenous people and in developing countries, there is a need for improved practice and better theoretical understanding of m-learning. This could be achieved through a more accessible body of knowledge of m-learning principles, teaching strategies and case-studies. This paper proposes the establishment of an online portal to influence and support good m-learning practice. An m-learning portal, incorporating a range of online, Web 2.0 and mobile technologies, would foster collaboration between researchers and educators and inform emerging national and international approaches using mobile technologies at all levels of the education sector and across all disciplines.
Filatova, T, Voinov, A & van der Veen, A 2011, 'Land market mechanisms for preservation of space for coastal ecosystems: An agent-based analysis', Environmental Modelling & Software, vol. 26, no. 2, pp. 179-190.
View/Download from: Publisher's site
Gao, Y, Zhang, G, Lu, J & Wee, H-M 2011, 'Particle swarm optimization for bi-level pricing problems in supply chains', JOURNAL OF GLOBAL OPTIMIZATION, vol. 51, no. 2, pp. 245-254.
View/Download from: Publisher's site
View description>>
With rapid technological innovation and strong competition in hi-tech industries such as computer and communication organizations, the upstream component price and the downstream product cost usually decline significantly with time. As a result, an effective pricing supply chain model is very important. This paper first establishes two bi-level pricing models for pricing problems with the buyer and the vendor in a supply chain designated as the leader and the follower, respectively. A particle swarm optimization (PSO) based algorithm is developed to solve problems defined by these bi-level pricing models. Experiments illustrate that this PSO based algorithm can achieve a profit increase for buyers or vendors if they are treated as the leaders under some situations, compared with the existing methods.
Gil-Aluja, J, Gil-Lafuente, AM & Merigó, JM 2011, 'Using homogeneous groupings in portfolio management', Expert Systems with Applications, vol. 38, no. 9, pp. 10950-10958.
View/Download from: Publisher's site
Golsteijn, C & van den Hoven, E 2011, 'Facilitating communication about books through an online community', PERSONAL AND UBIQUITOUS COMPUTING, vol. 15, no. 2, pp. 197-217.
View/Download from: Publisher's site
View description>>
Reading books can serve as a means of gathering information, relaxing and escaping daily stress. Although reading is often primarily an individual activity, many readers also enjoy sharing reading experiences with friends, relatives, colleagues and, through the internet, even with strangers. Apart from valuing these individual and collective book activities, books as physical artifacts are also valued, for example because of the memories associated with them. This paper investigates how books can be enhanced with a new product, system or service. In a qualitative interview study, the main reasons for valuing books were found to be related to the self (individual activities and feelings), experiences (e.g., enjoyment or release) and personal values (e.g., embodiment of ideals or personification). As a result, it was decided for the remainder of this study to focus on communication about books, because in addition to individual book-related activities and feelings, users indicated to communicate about books a lot. A book community Web site, called Shelf, was developed to investigate whether book communication could be increased by facilitating an online community and whether users would appreciate the Website functionality. Shelf was used in a 14-day user evaluation, and it was concluded that the Web site increased the extent to which readers communicated about books. We expect that such an online book community would be a valuable enhancement of current book customs, in particular in combination with the current e-book trend, for various types of readers who would like to share their experiences.
Gramann, K, Gwin, JT, Ferris, DP, Oie, K, Jung, T-P, Lin, C-T, Liao, L-D & Makeig, S 2011, 'Cognition in action: imaging brain/body dynamics in mobile humans', Reviews in the Neurosciences, vol. 22, no. 6, pp. 593-608.
View/Download from: Publisher's site
View description>>
We have recently developed a mobile brain imaging method (MoBI), that allows for simultaneous recording of brain and body dynamics of humans actively behaving in and interacting with their environment. A mobile imaging approach was needed to study cognitive processes that are inherently based on the use of human physical structure to obtain behavioral goals. This review gives examples of the tight coupling between human physical structure with cognitive processing and the role of supraspinal activity during control of human stance and locomotion. Existing brain imaging methods for actively behaving participants are described and new sensor technology allowing for mobile recordings of different behavioral states in humans is introduced. Finally, we review recent work demonstrating the feasibility of a MoBI system that was developed at the Swartz Center for Computational Neuroscience at the University of California, San Diego, demonstrating the range of behavior that can be investigated with this method. Copyright © 2011 by Walter de Gruyter, Berlin, Boston.
Gui, L, Liu, B, Wu, H-C, Li, Y & Ma, W 2011, 'Helicopter-Based Digital Electronic News Gathering (H-DENG) System: Case Study and System Solution', IEEE Transactions on Broadcasting, vol. 57, no. 1, pp. 121-128.
View/Download from: Publisher's site
Guo, Z-H, Wu, J, Lu, H-Y & Wang, J-Z 2011, 'A case study on a hybrid wind speed forecasting method using BP neural network', Knowledge-Based Systems, vol. 24, no. 7, pp. 1048-1056.
View/Download from: Publisher's site
View description>>
Wind energy, which is intermittent by nature, can have a significant impact on power grid security, power system operation, and market economics, especially in areas with a high level of wind power penetration. Wind speed forecasting has been a vital part of wind farm planning and the operational planning of power grids with the aim of reducing greenhouse gas emissions. Improving the accuracy of wind speed forecasting algorithms has significant technological and economic impacts on these activities, and significant research efforts have addressed this aim recently. However, there is no single best forecasting algorithm that can be applied to any wind farm due to the fact that wind speed patterns can be very different between wind farms and are usually influenced by many factors that are location-specific and difficult to control. In this paper, we propose a new hybrid wind speed forecasting method based on a back-propagation (BP) neural network and the idea of eliminating seasonal effects from actual wind speed datasets using seasonal exponential adjustment. This method can forecast the daily average wind speed one year ahead with lower mean absolute errors compared to figures obtained without adjustment, as demonstrated by a case study conducted using a wind speed dataset collected from the Minqin area in China from 2001 to 2006. © 2011 Elsevier B.V. All rights reserved.
Hesaraki, S, Javaheri Vayghan, A, Jarolmasjed, SH & Saberi, M 2011, 'Proliferative pigmented pilomatricoma: An immunohistochemical study of CK 7, CK 8 and P 53 expression', Journal of Veterinary Research, vol. 66, no. 1, pp. 73-76.
View description>>
Pilomatricomas are cystic hair follicle neoplasms originate from matrix cells which is produced by hair shaft and Inner root sheaths of this zone region of the inferior part of the hair follicle there is cornification patterns are present. These structures are recognized almost exclusively in dogs. A five-year-old, male intact boxer dog was presented with a large pedunculated mass in medial aspect of elbow region. The histopathological findings were confirmed by immunohistochemistry. The tumor was BCC like with lobules of tumor basal cells and shadow cell-like necrotic cells showing central keratinization. Immunohistochemically, the CK7was negative that revealed this tumor could not to be a BCC. Positivity for CK8 revealed that this tumor originated from hair sheath. Nonentity of invasion and metastasis and negativity for P53 implicated that the tumor was benign. This tumor was proliferative pigmented pilomatricoma because of a large number of basal cells of lobules and melanophages in the interlobular fibrous tissue. This report can be useful in oncoming reclassification of canine skin tumors.
Hussain, W, Sohaib, O & Ali, A 2011, 'Improving Web Page Readability by Plain Language', IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011, 315-319, vol. 8, no. 3, pp. 315-319.
View description>>
In today's world anybody who wants to access any information the first choiceis to use the web because it is the only source to provide easy and instantaccess to information. However web readers face many hurdles from web whichincludes load of web pages, text size, finding related information, spellingand grammar etc. However understanding of web pages written in English languagecreates great problems for non native readers who have basic knowledge ofEnglish. In this paper, we propose a plain language for a local language (Urdu)using English alphabets for web pages in Pakistan. For this purpose wedeveloped two websites, one with a normal English fonts and other in a locallanguage text scheme using English alphabets. We also conducted a questionnairefrom 40 different users with a different level of English language fluency inPakistan to gain the evidence of the practicality of our approach. The resultshows that the proposed plain language text scheme using English alphabetsimproved the reading comprehension for non native English speakers in Pakistan.
Hussain, W, Sohaib, O, Ahmed, A & Qasim Khan, M 2011, 'Web readability factors affecting users of all ages', Australian Journal of Basic and Applied Sciences, vol. 5, no. 11, pp. 972-977.
View description>>
With the increase in the growth of internet since 1990 WorldWide Web have gained a worldwide popularity.Web has become an ultimate source of information throughout the world. The web has been a source of information, knowledge, entertainment and carrying out different tasks such as online shopping, reservation etc. Every one finds ways to the web due to easiness of access and the bulk of information that has been available so ways to make web more attractive and easy to interact with has been an issue under discussion since its inception. In this paper we have focused how to make a webpage more usable for different age group in terms of readability. We have focused on eight eternal readability factors i.e. color contrast, white space, line spacing, font style, font size, text width, headings, graphics and animation. These eight factors are compared that how different age group people behave with the web applications by varying these eight factors. Based on literature review we have proposed an idea that how to make web more readable for people of different age groups e.g. children, teenagers and old /senior users.
Iqbal, MA, Dai, B, Huang, B, Hassan, A & Yu, S 2011, 'Survey of network coding-aware routing protocols in wireless networks', Journal of Network and Computer Applications, vol. 34, no. 6, pp. 1956-1970.
View/Download from: Publisher's site
Juang, C-F & Chang, Y-C 2011, 'Evolutionary-Group-Based Particle-Swarm-Optimized Fuzzy Controller With Application to Mobile-Robot Navigation in Unknown Environments', IEEE Transactions on Fuzzy Systems, vol. 19, no. 2, pp. 379-392.
View/Download from: Publisher's site
Juang, C-F, Chang, Y-C & Hsiao, C-M 2011, 'Evolving Gaits of a Hexapod Robot by Recurrent Neural Networks With Symbiotic Species-Based Particle Swarm Optimization', IEEE Transactions on Industrial Electronics, vol. 58, no. 7, pp. 3110-3119.
View/Download from: Publisher's site
Kennard, R & Leaney, J 2011, 'Is there convergence in the field of UI generation?', JOURNAL OF SYSTEMS AND SOFTWARE, vol. 84, no. 12, pp. 2079-2087.
View/Download from: Publisher's site
View description>>
For many software projects, the construction of the User Interface (UI) consumes a significant proportion of their development time. Any degree of automation in this area therefore has clear benefits. But it is difficult to achieve such automation in a way that will be widely adopted by industry because of the diversity of UIs, software architectures, platforms and development environments. In a previous article, the authors identified five key characteristics any UI generator would need in order to address this diversity. We asserted that, without these characteristics, a UI generator should not expect wide industry adoption or standardisation. We supported this assertion with evidence from industry adoption studies. A further source of validation would be to see if other research teams, who were also conducting industry field trials, were independently converging on this same set of characteristics. Conversely, it would be instructive if they were found to be converging on a different set of characteristics. In this article, the authors look for such evidence of convergence by interviewing the team behind one of the research community's most significant UI generators: Naked Objects. We observe strong signs of convergence, which we believe signal the beginning of a general purpose architecture for UI generation, one that both industry and the research community could standardise upon.
Kieferova, M & Nagaj, D 2011, 'Quantum Walks on Necklaces and Mixing', Issue, vol. 2, p. 1250025.
View description>>
We analyze continuous-time quantum walks on necklace graphs - cyclical graphsconsisting of many copies of a smaller graph (pearl). Using a Bloch-type ansatzfor the eigenfunctions, we block-diagonalize the Hamiltonian, reducing theeffective size of the problem to the size of a single pearl. We then present ageneral approach for showing that the mixing time scales (with growing size ofthe necklace) similarly to that of a simple walk on a cycle. Finally, wepresent results for mixing on several necklace graphs.
Liang Gong, Lin Gui, Bo Liu, Bo Rong, Yin Xu, Yiyan Wu & Wenjun Zhang 2011, 'Improve the Performance of LDPC Coded QAM by Selective Bit Mapping in Terrestrial Broadcasting System', IEEE Transactions on Broadcasting, vol. 57, no. 2, pp. 263-269.
View/Download from: Publisher's site
Lister, R 2011, 'COMPUTING EDUCATION RESEARCHProgramming, syntax and cognitive load', ACM Inroads, vol. 2, no. 2, pp. 21-22.
View/Download from: Publisher's site
View description>>
This is a regular invited column I write for this journal.
Lister, R 2011, 'Programming, syntax and cognitive load (part 2)', ACM Inroads, vol. 2, no. 3, pp. 16-17.
View/Download from: Publisher's site
Lister, R 2011, 'Ten years after the McCracken Working Group', ACM Inroads, vol. 2, no. 4, pp. 18-19.
View/Download from: Publisher's site
View description>>
This is a regular invited column I write for this journal.
Lister, R 2011, 'What if we approached teaching like software engineering?', ACM Inroads, vol. 2, no. 1, pp. 17-18.
View/Download from: Publisher's site
View description>>
This is a regular invited column I write for this journal.
Lister, R 2011, 'What if we approached teaching like software engineering?', ACM Inroads, vol. 2, no. 1, pp. 17-18.
View/Download from: Publisher's site
View description>>
This is a regular invited column I write for this journal.
Mans, B & Mathieson, L 2011, 'On the Treewidth of Dynamic Graphs', Theoretical Computer Science, vol. 554, no. C, pp. 217-228.
View/Download from: Publisher's site
View description>>
Dynamic graph theory is a novel, growing area that deals with graphs thatchange over time and is of great utility in modelling modern wireless, mobileand dynamic environments. As a graph evolves, possibly arbitrarily, it ischallenging to identify the graph properties that can be preserved over timeand understand their respective computability. In this paper we are concerned with the treewidth of dynamic graphs. We focuson metatheorems, which allow the generation of a series of results based ongeneral properties of classes of structures. In graph theory two majormetatheorems on treewidth provide complexity classifications by employingstructural graph measures and finite model theory. Courcelle's Theorem gives ageneral tractability result for problems expressible in monadic second orderlogic on graphs of bounded treewidth, and Frick & Grohe demonstrate a similarresult for first order logic and graphs of bounded local treewidth. We extend these theorems by showing that dynamic graphs of bounded (local)treewidth where the length of time over which the graph evolves and is observedis finite and bounded can be modelled in such a way that the (local) treewidthof the underlying graph is maintained. We show the application of these resultsto problems in dynamic graph theory and dynamic extensions to static problems.In addition we demonstrate that certain widely used dynamic graph classesnaturally have bounded local treewidth.
Martincic, A & Dovey, K 2011, 'Action research as a knowledge generating change methodology', International Journal of Learning and Intellectual Capital, vol. 8, no. 1, pp. 108-108.
View/Download from: Publisher's site
View description>>
The paper outlines an action research project conducted within an Australian public sector organisation with the purpose of changing a key internal business process. Despite the significant challenges incurred by using a change methodology considered to be âradicalâ within this conventional, hierarchically structured, organisation, the business process was transformed successfully and productivity has increased significantly within the organisation. Furthermore, the action research approach generated pertinent new knowledge; greatly enriched various forms of intangible capital within the organisation; and created a precedent with respect to greater collaboration and democracy within the organisation. In encouraging this approach to managing change within hierarchically structured organisations, the paper advocates caution in its introduction and warns of the challenges that it poses for power management in such organisations.
McGregor, C 2011, 'Methodologies for implementing clinical applications of complexity at the bedside', Journal of Critical Care, vol. 26, no. 3, pp. e18-e18.
View/Download from: Publisher's site
McIntosh, BS, Ascough, JC, Twery, M, Chew, J, Elmahdi, A, Haase, D, Harou, JJ, Hepting, D, Cuddy, S, Jakeman, AJ, Chen, S, Kassahun, A, Lautenbach, S, Matthews, K, Merritt, W, Quinn, NWT, Rodriguez-Roda, I, Sieber, S, Stavenga, M, Sulis, A, Ticehurst, J, Volk, M, Wrobel, M, van Delden, H, El-Sawah, S, Rizzoli, A & Voinov, A 2011, 'Environmental decision support systems (EDSS) development – Challenges and best practices', Environmental Modelling & Software, vol. 26, no. 12, pp. 1389-1402.
View/Download from: Publisher's site
Merigo, JM 2011, 'The uncertain probabilistic weighted average and its application in the theory of expertons', AFRICAN JOURNAL OF BUSINESS MANAGEMENT, vol. 5, no. 15, pp. 6092-6102.
Merigó, JM 2011, 'A unified model between the weighted average and the induced OWA operator', Expert Systems with Applications, vol. 38, no. 9, pp. 11560-11572.
View/Download from: Publisher's site
Merigó, JM 2011, 'Fuzzy multi-person decision making with fuzzy probabilistic aggregation operators', International Journal of Fuzzy Systems, vol. 13, no. 3, pp. 163-174.
View description>>
We present a fuzzy multi-person decision making model with fuzzy probabilistic information. For doing so, we present the fuzzy probabilistic ordered weighted averaging (FPOWA) operator. It is an aggregation operator that unifies the fuzzy probabilistic aggregation and the fuzzy OWA (FOWA) operator in the same formulation considering the degree of importance that each concept has in the analysis. We study its applicability and we see that it is very broad because all the previous studies that use the probability or the OWA operator can be revised and extended with this new approach. We focus on a multi-person decision making problem that unifies risk and uncertain environments in the same formulation. We implement this approach in a political management problem regarding the selection of fiscal policies. © 2011 TFSA.
Merigo, JM & Casanovas, M 2011, 'Generalized aggregation operators in decision making with Dempster-Shafer belief structure', Information, vol. 14, no. 8, pp. 2711-2732.
View description>>
We present a general method for decision making with Dempster-Shafer belief structure based on generalized aggregation operators. The main advantage of this approach is that it gives a more complete formulation of the D-S framework because it is able to provide a wide range of aggregation operators by using generalized means, quasi-arithmetic means and ordered weighted averaging (OWA) operators. Thus, we are able to formulate the D-S approach by using the usual arithmetic means but also using other types of means such as geometric or quadratic means. We study different properties and particular cases based on the generalized OWA operator. We further generalize this approach by using the Quasi-OWA operator. Moreover, we extend this approach by using induced aggregation operators and the hybrid average. The paper ends with an illustrative example of the new approach in a decision making problem regarding the selection of strategies. © 2011 International Information Institute.
Merigó, JM & Casanovas, M 2011, 'A New Minkowski Distance Based on Induced Aggregation Operators', International Journal of Computational Intelligence Systems, vol. 4, no. 2, pp. 123-133.
View/Download from: Publisher's site
Merigó, JM & Casanovas, M 2011, 'Decision Making with Dempster-Shafer Theory Using Fuzzy Induced Aggregation Operators', Studies in Fuzziness and Soft Computing, vol. 265, pp. 209-228.
View/Download from: Publisher's site
View description>>
We develop a new approach for decision making with Dempster-Shafer theory of evidence where the available information is uncertain and it can be assessed with fuzzy numbers. With this approach, we are able to represent the problem without losing relevant information, so the decision maker knows exactly which are the different alternatives and their consequences. For doing so, we suggest the use of different types of fuzzy induced aggregation operators in the problem. Then, we can aggregate the information considering all the different scenarios that could happen in the analysis. As a result, we get new types of fuzzy induced aggregation operators such as the belief structure - fuzzy induced ordered weighted averaging (BS-FIOWA) and the belief structure - fuzzy induced hybrid averaging (BS-FIHA) operator. We study some of their main properties. We further generalize this approach by using fuzzy induced generalized aggregation operators. We also develop an application of the new approach in a financial decision making problem about selection of financial strategies. © 2011 Springer-Verlag Berlin Heidelberg.
Merigó, JM & Casanovas, M 2011, 'Decision-making with distance measures and induced aggregation operators', Computers & Industrial Engineering, vol. 60, no. 1, pp. 66-76.
View/Download from: Publisher's site
Merigó, JM & Casanovas, M 2011, 'Induced aggregation operators in the Euclidean distance and its application in financial decision making', Expert Systems with Applications, vol. 38, no. 6, pp. 7603-7608.
View/Download from: Publisher's site
Merigó, JM & Casanovas, M 2011, 'Induced and uncertain heavy OWA operators', Computers & Industrial Engineering, vol. 60, no. 1, pp. 106-116.
View/Download from: Publisher's site
MERIGÓ, JM & CASANOVAS, M 2011, 'THE UNCERTAIN GENERALIZED OWA OPERATOR AND ITS APPLICATION TO FINANCIAL DECISION MAKING', International Journal of Information Technology & Decision Making, vol. 10, no. 02, pp. 211-230.
View/Download from: Publisher's site
View description>>
We introduce the uncertain generalized OWA (UGOWA) operator. This operator is an extension of the OWA operator that uses generalized means and uncertain information represented as interval numbers. By using UGOWA, it is possible to obtain a wide range of uncertain aggregation operators such as the uncertain average (UA), the uncertain weighted average (UWA), the uncertain OWA (UOWA) operator, the uncertain ordered weighted geometric (UOWG) operator, the uncertain ordered weighted quadratic averaging (UOWQA) operator, the uncertain generalized mean (UGM), and many specialized operators. We study some of its main properties, and we further generalize the UGOWA operator using quasi-arithmetic means. The result is the Quasi-UOWA operator. We end the paper by presenting an application to a decision-making problem regarding the selection of financial strategies.
Merigó, JM & Casanovas, M 2011, 'The uncertain induced quasi-arithmetic OWA operator', International Journal of Intelligent Systems, vol. 26, no. 1, pp. 1-24.
View/Download from: Publisher's site
Merigo, JM & Gil-Lafuente, AM 2011, 'OWA OPERATORS IN HUMAN RESOURCE MANAGEMENT', ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH, vol. 45, no. 2, pp. 153-168.
Merigó, JM & Gil-Lafuente, AM 2011, 'Decision-making in sport management based on the OWA operator', Expert Systems with Applications, vol. 38, no. 8, pp. 10408-10413.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 2011, 'Fuzzy induced generalized aggregation operators and its application in multi-person decision making', Expert Systems with Applications, vol. 38, no. 8, pp. 9761-9772.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 2011, 'Owa operators in human resource management', Economic Computation and Economic Cybernetics Studies and Research, vol. 2, pp. 118-134.
View description>>
We develop a new approach that uses the ordered weighted averaging (OWA) operator in different methods for the selection of human resources. The objective of this new model is to manipulate the neutrality of the old methods, so the decision maker can select human resources according to his degree of optimism or pessimism. In order to develop this model, first, a short revision of the OWA operators is introduced. Next, we briefly explain the general model for the selection of human resources and suggest three new indexes for the selection of human resources that use the OWA operator and the hybrid average in the Hamming distance, in the adequacy coefficient and in the index of maximum and minimum level. The main advantage of this method is that it is more complete than the previous ones so the decision maker gets a better understanding of the decision problem. The work ends with an illustrative example that shows the results obtained by using different types of aggregation operators in the new approaches.
Merigó, JM & Wei, G 2011, 'PROBABILISTIC AGGREGATION OPERATORS AND THEIR APPLICATION IN UNCERTAIN MULTI-PERSON DECISION-MAKING / TIKIMYBINIAI SUMAVIMO OPERATORIAI IR JŲ TAIKYMAS PRIIMANT GRUPINIUS SPRENDIMUS NEAPIBRĖŽTOJE APLINKOJE', Technological and Economic Development of Economy, vol. 17, no. 2, pp. 335-351.
View/Download from: Publisher's site
View description>>
We present the uncertain probabilistic ordered weighted averaging (UPOWA) operator. It is an aggregation operator that uses probabilities and OWA operators in the same formulation considering the degree of importance of each concept in the analysis. Moreover, it also uses uncertain information assessed with interval numbers in the aggregation process. The main advantage of this aggregation operator is that it is able to use the attitudinal character of the decision maker and the available probabilistic information in an environment where the information is very imprecise and can be assessed with interval numbers. We study some of its main properties and particular cases such as the uncertain probabilistic aggregation (UPA) and the uncertain OWA (UOWA) operator. We also develop an application of the new approach in a multi-person decision-making problem in political management regarding the selection of monetary policies. Thus, we obtain the multiperson UPOWA (MP-UPOWA) operator. We see that this model gives more complete information of the decision problem because it is able to deal with decision making problems under uncertainty and under risk in the same formulation. Santrauka Autoriai pristato tikimybinį svertinio vidurkio operatorių, taikytiną neapibrežtumo sąlygomis. Tai tikimybėmis pagrįstas sumavimo operatorius, kuris kartu su svertinio vidurkio operatoriais gali įvertinti alternatyvų svarbumo laipsnį. Be to, jis gali operuoti neapibrežta informacija, išreikšta skaičiais intervaluose. Pagrindinis šio operatoriaus privalumas yra tas, kad jį galima taikyti uždaviniams, kuriuose informacija yra netiksli. Išnagrinėtos kai kurios minėto operatoriaus savybės. Sukurtas metodas pritaikytas monetarinei politikai parinkti, situacijai, kai sprendimus priima žmoniu grupė. Modelis suteikia išsamesnę informaciją apie problemą, nes gali įvertinti neapibrežtumus ir riziką.
Merigo, JM, Gil-Lafuente, AM & Gil-Aluja, J 2011, 'Decision making with the induced generalized adequacy coefficient', Applied and Computational Mathematics, vol. 10, no. 2, pp. 321-339.
View description>>
We introduce the induced generalized ordered weighted averaging adequacy coefficient (IGOWAAC) operator. The main advantage is that it provides a more complete generalization of the aggregation operators that includes a wide range of situations. We apply the new approach in a decision making problem.
Merigo, JM, Gil-Lafuente, AM & Gil-Aluja, J 2011, 'Soft computing techniques for decision making with induced aggregation operators', Information, vol. 14, no. 6, pp. 2019-2039.
View description>>
We present a method for decision making by using induced aggregation operators. This method is very useful for business decision making problems such as product management, investment selection and strategic management We introduce a new aggregation operator that uses the induced ordered weighted averaging (IOWA) operator in the adequacy coefficient. We call it the induced ordered weighted averaging adequacy coefficient (IOWAAC) operator. The main advantage is that it is able to deal with complex attitudinal characters in the aggregation process. Thus, we are able to give a better representation of the problem considering the complex environment that affects the decisions. We study some of the main properties of this approach and we see mat it includes the IOWA operator as a special case. We also see that sometimes this approach becomes the Hamming distance or more precisely, the induced OWA distance (IOWAD) operator. We further extend the IOWAAC operator by using the hybrid average, obtaining the induced hybrid averaging adequacy coefficient (IHAAC). We end the paper with a numerical example of the new approach in a decision making problem regarding product management. © 2011 International Information Institute.
Merigo, JM, Gil-Lafuente, AM, Zhou, L & Chenm, H 2011, 'Generalization of the linguistic aggregation operator and its application in decision making', Journal of Systems Engineering and Electronics, vol. 22, no. 4, pp. 593-603.
View/Download from: Publisher's site
Miliszewska, I & Sztendur, E 2011, 'Critical Success Attributes of Transnational IT Education Programmes: The Client Perspective', Journal of Information Technology Education: Research, vol. 10, no. 1, pp. 123-137.
View/Download from: Publisher's site
View description>>
How can transnational education (TNE) programs be made more effective? According to the literature, no one is in a better position to comment on this question than the students themselves. At the same time, there is a recognized scarcity in the literature of student input into the issue of transnational program effectiveness. In consideration of this need, a research study was conducted to examine the effectiveness of TNE programs from the student perspective. To this end, transnational students' views on the various dimensions of the TNE context were used as a key indicator of the effectiveness of transnational programs. The evaluated dimensions included student, instructor, curriculum and instruction design, interaction, evaluation and assessment, technology, and program management, and organisational support. Data for the study was collected from approximately five hundred transnational students participating in eight transnational undergraduate computing programs offered by four Australian universities in Hong Kong, Malaysia, Singapore and Vietnam. Overall, students from the eight different programs considered in this study were in agreement as to the factors they perceived as most important to the effectiveness of transnational programs. As anticipated and confirmed by the literature, students were of the view that their own motivation, self-discipline, and the ability to work independently, as well as in a team, was a pre-condition of an effective program. With respect to instructors, students attached the greatest importance to the instructors' ability to understand program requirements and student needs, use communication skills effectively, and be well prepared and organized. They were also in agreement regarding the importance of instructors' experience with technology-based programs and their ability to provide well-designed syllabus and presentation outlines. The relevance of the curriculum to job and career was perceived as the most important aspect ...
Nizami, S, Green, JR & McGregor, C 2011, 'Service oriented architecture to support real-time implementation of artifact detection in critical care monitoring', 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 4925-4928.
View/Download from: Publisher's site
Oberst, S & Lai, JCS 2011, 'Chaos in brake squeal noise', Journal of Sound and Vibration, vol. 330, no. 5, pp. 955-975.
View/Download from: Publisher's site
Oberst, S & Lai, JCS 2011, 'Statistical analysis of brake squeal noise', Journal of Sound and Vibration, vol. 330, no. 12, pp. 2978-2994.
View/Download from: Publisher's site
Panozzo, D, Puppo, E, Tarini, M, Pietroni, N & Cignoni, P 2011, 'Automatic Construction of Quad-Based Subdivision Surfaces Using Fitmaps.', IEEE Trans. Vis. Comput. Graph., vol. 17, pp. 1510-1520.
View/Download from: Publisher's site
Peng, D, Xiang, Y, Yi, Z & Yu, S 2011, 'CM-Based Blind Equalization of Time-Varying SIMO-FIR Channel With Single Pulsation Estimation', IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2410-2415.
View/Download from: Publisher's site
Pietroni, N, Corsini, M, Cignoni, P & Scopigno, R 2011, 'An Interactive Local Flattening Operator to Support Digital Investigations on Artwork Surfaces.', IEEE Trans. Vis. Comput. Graph., vol. 17, pp. 1989-1996.
View/Download from: Publisher's site
Pietroni, N, Tarini, M, Sorkine, O & Zorin, D 2011, 'Global parametrization of range image sets', ACM Transactions on Graphics, vol. 30, no. 6, pp. 1-10.
View/Download from: Publisher's site
View description>>
We present a method to globally parameterize a surface represented by height maps over a set of planes (range images). In contrast to other parametrization techniques, we do not start with a manifold mesh. The parametrization we compute defines a manifold structure, it is seamless and globally smooth, can be aligned to geometric features and shows good quality in terms of angle and area preservation, comparable to current parametrization techniques for meshes. Computing such global seamless parametrization makes it possible to perform quad remeshing, texture mapping and texture synthesis and many other types of geometry processing operations. Our approach is based on a formulation of the Poisson equation on a manifold structure defined for the surface by the range images. Construction of such global parametrization requires only a way to project surface data onto a set of planes, and can be applied directly to implicit surfaces, nonmanifold surfaces, very large meshes, and collections of range scans. We demonstrate application of our technique to all these geometry types.
Saberi, M, Shahriari, A, Tarnian, F, Jafari, M & Safari, H 2011, 'Influence of some chemical compounds on germination and early seedling growth of two range species under allelopathic conditions', Frontiers of Agriculture in China, vol. 5, no. 3, pp. 310-321.
View/Download from: Publisher's site
Saidi Mehrabad, M, Anvari, M & Saberi, M 2011, 'Targeting performance measures based on performance prediction', International Journal of Productivity and Performance Management, vol. 61, no. 1, pp. 46-68.
View/Download from: Publisher's site
View description>>
Purpose: This study aims to investigate the development of predictive tools in performance measurement and management (PMM), and modeling of a forward-looking method to help managers to quantitatively target performance measures based on achieving desired improvement, minimum cost and strategic priorities. Design/methodology/approach: A case-based methodology is used to test the conceptual approach in a production system. Mathematical models are used to model modules of the proposed approach. The proposed approach is applied to an actual conventional power plant unit to show its applicability and superiority over conventional methods. Findings: The developed system enables managers to develop systematic ways to manage future performance; for example, planning, performance forecasting and target setting. The predictive ability of the developed system is comparable with the judgment of the manager in the case company. Originality/value: This paper proposes the use of mathematical models in the development of performance measures targeted on performance prediction and desired improvement. The paper also offers practical help to organizations to embed a forward-looking capability into their operations. © Emerald Group Publishing Limited.
Seely, AJE, Kauffman, SA, Bates, JHT, Macklem, PT, Suki, B, Marshall, JC, Batchinsky, AI, Perez-Velazquez, JL, Seiver, A, McGregor, C, Maksym, G, Kamath, MV, Similowski, T, Buchman, TG, Letellier, C, Filoche, M, Frasch, MG, Straus, C, Glass, L, Godin, PJ, Morris, JA, Sow, D, Nenadovic, V, Arnold, RC, Norris, P & Moorman, JR 2011, 'Proceedings from the Montebello Round Table Discussion. Second annual conference on Complexity and Variability discusses research that brings innovation to the bedside', Journal of Critical Care, vol. 26, no. 3, pp. 325-327.
View/Download from: Publisher's site
Sow, D & McGregor, C 2011, 'Synergies of the complexity continuum and the stream computing paradigm', Journal of Critical Care, vol. 26, no. 3, pp. e29-e30.
View/Download from: Publisher's site
Tang, F, Tang, C, Guo, M, Yu, S & Guo, S 2011, 'A shadow-Like task migration model based on context semantics for mobile and pervasive environments', Computing and Informatics, vol. 30, no. 6, pp. 1131-1146.
View description>>
Pervasive computing is a user-centric mobile computing paradigm, in which tasks should be migrated over different platforms in a shadow-like way when users move around. In this paper, we propose a context-sensitive task migration model that recovers program states and rebinds resources for task migrations based on context semantics through inserting resource description and state description sections in source programs. Based on our model, we design and develop a task migration framework xMozart which extends the Mozart platform in terms of context awareness. Our approach can recover task states and rebind resources in the context-aware way, as well as support multi- modality I/O interactions. The extensive experiments demonstrate that our approach can migrate tasks by resuming them from the last broken points like shadows moving along with the users.
Tarini, M, Puppo, E, Panozzo, D, Pietroni, N & Cignoni, P 2011, 'Simple quad domains for field aligned mesh parametrization', Proceedings of the 2011 SIGGRAPH Asia Conference, vol. 30, pp. 142-142.
View/Download from: Publisher's site
van den Hoven, E & Mazalek, A 2011, 'Grasping gestures: Gesturing with physical artifacts', AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, vol. 25, no. 3, pp. 255-271.
View/Download from: Publisher's site
View description>>
Gestures play an important role in communication. They support the listener, who is trying to understand the speaker. However, they also support the speaker by facilitating the conceptualization and verbalization of messages and reducing cognitive load. Gestures thus play an important role in collaboration and also in problem-solving tasks. In human-computer interaction, gestures are also used to facilitate communication with digital applications, because their expressive nature can enable less constraining and more intuitive digital interactions than conventional user interfaces. Although gesture research in the social sciences typically considers empty-handed gestures, digital gesture interactions often make use of handheld objects or touch surfaces to capture gestures that would be difficult to track in free space. In most cases, the physical objects used to make these gestures serve primarily as a means of sensing or input. In contrast, tangible interaction makes use of physical objects as embodiments of digital information. The physical objects in a tangible interface thus serve as representations as well as controls for the digital information they are associated with. Building on this concept, gesture interaction has the potential to make use of the physical properties of hand-held objects to enhance or change the functionality of the gestures made. In this paper, we look at the design opportunities that arise at the intersection of gesture and tangible interaction. We believe that gesturing while holding physical artifacts opens up a new interaction design space for collaborative digital applications that is largely unexplored. We provide a survey of gesture interaction work as it relates to tangible and touch interaction. Based on this survey, we define the design space of tangible gesture interaction as the use of physical devices for facilitating, supporting, enhancing, or tracking gestures people make for digital interaction purposes, and outline the ...
Wang, J, Chi, D, Wu, J & Lu, H-Y 2011, 'Chaotic time series method combined with particle swarm optimization and trend adjustment for electricity demand forecasting', Expert Systems with Applications, vol. 38, no. 7, pp. 8419-8429.
View/Download from: Publisher's site
View description>>
Electricity demand forecasting plays an important role in electric power systems planning. In this paper, nonlinear time series modeling technique is applied to analyze electricity demand. Firstly, the phase space, which describes the evolution of the be
Xu, D, Wijesooriya, C, Wang, Y-G & Beydoun, G 2011, 'Outbound logistics exception monitoring: A multi-perspective ontologies' approach with intelligent agents', EXPERT SYSTEMS WITH APPLICATIONS, vol. 38, no. 11, pp. 13604-13611.
View/Download from: Publisher's site
Xu, Y, Liu, B, Gong, L, Rong, B & Gui, L 2011, 'Improved shortening algorithm for irregular QC-LDPC codes using known bits', IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp. 1057-1063.
View/Download from: Publisher's site
Yang, J, Dai, B, Huang, B & Yu, S 2011, 'Orthogonal feedback scheme for network coding', Journal of Network and Computer Applications, vol. 34, no. 5, pp. 1623-1633.
View/Download from: Publisher's site
Ye, D, Zhang, M & Sutanto, D 2011, 'A Hybrid Multiagent Framework With Q-Learning for Power Grid Systems Restoration', IEEE Transactions on Power Systems, vol. 26, no. 4, pp. 2434-2441.
View/Download from: Publisher's site
Yu, S, Zhou, W, Doss, R & Jia, W 2011, 'Traceback of DDoS Attacks Using Entropy Variations', IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, pp. 412-425.
View/Download from: Publisher's site
Zheng, L, Jin, J, Guo, Y, Xu, W, Lu, H & Zhu, J 2011, 'Characteristics and Optimization of a PMLSM for HTS Magnetic Suspension Propulsion System', Journal of Applied Superconductivity and Electromagnetics, vol. 1, no. 1, pp. 66-74.
View description>>
¾Permanent magnet (PM) linear synchronous motors (PMLSMs) can be integrated with a high temperature superconducting (HTS) magnetic suspension system to be used in such as electromagnetic aircraft launcher and maglev transportation which have a levitated object moving on a long linear track. This paper presents the design and electromagnetic characteristic analysis of a long-primary single-sided PMLSM for a HTS bulk-PM guideway repulsion magnetic suspension propulsion system. Based on the characteristics and performance analysis of the PMLSM, a new type of HTS suspension propulsion system driven by a double-sided PMLSM with an optimal PM structure is then proposed. The running characteristics of the linear propulsion systems are studied through finite element analysis (FEA) with comprehensive performance results obtained for practical development.
Zong, Y, Xu, G, Jin, P, Zhang, Y & Chen, E 2011, 'HC_AB: A new heuristic clustering algorithm based on Approximate Backbone', Information Processing Letters, vol. 111, no. 17, pp. 857-863.
View/Download from: Publisher's site
View description>>
Clustering is an important research area with numerous applications in pattern recognition, machine learning, and data mining. Since the clustering problem on numeric data sets can be formulated as a typical combinatorial optimization problem, many researches have addressed the design of heuristic algorithms for finding sub-optimal solutions in a reasonable period of time. However, most of the heuristic clustering algorithms suffer from the problem of being sensitive to the initialization and do not guarantee the high quality results. Recently, Approximate Backbone (AB), i.e., the commonly shared intersection of several sub-optimal solutions, has been proposed to address the sensitivity problem of initialization. In this paper, we aim to introduce the AB into heuristic clustering to overcome the initialization sensitivity of conventional heuristic clustering algorithms. The main advantage of the proposed method is the capability of restricting the initial search space around the optimal result by defining the AB, and in turn, reducing the impact of initialization on clustering, eventually improving the performance of heuristic clustering. Experiments on synthetic and real world data sets are performed to validate the effectiveness of the proposed approach in comparison to three conventional heuristic clustering algorithms and three other algorithms with improvement on initialization
Zong, Y, Xu, GD, Zhang, YC & Li, MC 2011, 'Node priority guided clustering algorithm', Kongzhi yu Juece/Control and Decision, vol. 26, no. 6.
View description>>
Density-based clustering algorithms have the advantages of clustering with arbitrary shapes and handling noise data, but cannot deal with unsymmetrical density distribution and high dimensionality dataset. Therefore, a node priority guided clustering algorithm(NPGC) is proposed. A direct K neighbor graph of dataset is set up based on KNN neighbor method. Then the local information of each node in graph is captured by using KNN kernel density estimate method, and the node priority is calculated by passing the local information through graph. Finally, a depth-first search on graph is applied to find out the clustering results based on the local kernel degree. Experiment results show that NPGC has the ability to deal with unsymmetrical density distribution and high dimensionality dataset.
Al-hassan, M, Lu, H & Lu, J 1970, 'Personalized e-Government Services: Tourism Recommender System Framework', WEB INFORMATION SYSTEMS AND TECHNOLOGIES, International Conference on Web Information Systems and Technologies, Springer, Valencia, Spain, pp. 173-187.
View/Download from: Publisher's site
View description>>
Most governments around the globe use the internet and information technologies to deliver information and services for citizens and businesses. One of the main directions in the current e-government (e-Gov) development strategy is to provide better online services to citizens such that the required information can be located by citizens with less time and effort. Tourism is one of the main focused areas of e-Gov development strategy because it is one of the major profitable industries. Significant efforts have been devoted by governments to improve tourism services. However, the current e-Gov tourism services are limited to simple online presentation; intelligent e-Gov tourism services are highly desirable. Personalization techniques, particularly recommendation systems, are the most promising techniques to deliver personalized e-Gov (Pe-Gov) tourism services. This study proposes ontology-based personalized e-Gov tourism recommender system framework, which would enable tourism information seekers to locate the most interesting destinations and find the most preferable attractions and activities with less time and effort. The main components of the proposed framework and some outstanding features are presented along with a detailed description of a scenario. © 2011 Springer-Verlag Berlin Heidelberg.
Anaissi, A, Kennedy, PJ & Goyal, M 1970, 'Dimension reduction of microarray data based on local principal component', World Academy of Science, Engineering and Technology, pp. 1176-1181.
View description>>
Analysis and visualization of microarraydata is veryassistantfor biologists and clinicians in the field of diagnosis and treatment of patients. It allows Clinicians to better understand the structure of microarray and facilitates understanding gene expression in cells. However, microarray dataset is a complex data set and has thousands of features and a very small number of observations. This very high dimensional data set often contains some noise, non-useful information and a small number of relevant features for disease or genotype. This paper proposes a non-linear dimensionality reduction algorithm Local Principal Component (LPC) which aims to maps high dimensional data to a lower dimensional space. The reduced data represents the most important variables underlying the original data. Experimental results and comparisons are presented to show the quality of the proposed algorithm. Moreover, experiments also show how this algorithm reduces high dimensional data whilst preserving the neighbourhoods of the points in the low dimensional space as in the high dimensional space.
Anaissi, A, Kennedy, PJ & Goyal, M 1970, 'Feature Selection of Imbalanced Gene Expression Microarray Data', 2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Distributed Computing, IEEE, Sydney, pp. 73-78.
View/Download from: Publisher's site
View description>>
Gene expression data is a very complex data set characterised by abundant numbers of features but with a low number of observations. However, only a small number of these features are relevant to an outcome of interest. With this kind of data set, feature selection becomes a real prerequisite. This paper proposes a methodology for feature selection for an imbalanced leukaemia gene expression data based on random forest algorithm. It presents the importance of feature selection in terms of reducing the number of features, enhancing the quality of machine learning and providing better understanding for biologists in diagnosis and prediction. Algorithms are presented to show the methodology and strategy for feature selection taking care to avoid overfitting. Moreover, experiments are done using imbalanced Leukaemia gene expression data and special measurement is used to evaluate the quality of feature selection and performance of classification.
Antle, AN, Marshall, P & van den Hoven, E 1970, 'Workshop on embodied interaction', CHI '11 Extended Abstracts on Human Factors in Computing Systems, CHI '11: CHI Conference on Human Factors in Computing Systems, ACM, Vancouver, Canada, pp. 5-8.
View/Download from: Publisher's site
View description>>
For over ten years researchers in human-computer interaction (HCI) have explored an embodied perspective that seeks to describe and explain the fundamental role played by the physical body in how we experience, interact with and understand computation in the world we live in. Recently, such a perspective has been used to discuss human actions and interactions with a range of computational applications including tangibles, mobiles, wearables, tabletops and interactive environments. This workshop aims to enable participants to critically explore the different approaches to incorporating an embodied perspective in HCI research, and to develop a shared set of understandings and identification of differences, similarities and synergies between our research approaches.
Arefin, AS, Inostroza-Ponta, M, Mathieson, L, Berretta, R & Moscato, P 1970, 'Clustering Nodes in Large-Scale Biological Networks Using External Memory Algorithms', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), International Conference on Algorithms and Architectures for Parallel Processing, Springer Berlin Heidelberg, Melbourne, Australia, pp. 375-386.
View/Download from: Publisher's site
View description>>
Novel analytical techniques have dramatically enhanced our understanding of many application domains including biological networks inferred from gene expression studies. However, there are clear computational challenges associated to the large datasets generated from these studies. The algorithmic solution of some NP-hard combinatorial optimization problems that naturally arise on the analysis of large networks is difficult without specialized computer facilities (i.e. supercomputers). In this work, we address the data clustering problem of large-scale biological networks with a polynomial-time algorithm that uses reasonable computing resources and is limited by the available memory. We have adapted and improved the MSTkNN graph partitioning algorithm and redesigned it to take advantage of external memory (EM) algorithms. We evaluate the scalability and performance of our proposed algorithm on a well-known breast cancer microarray study and its associated dataset. © 2011 Springer-Verlag.
Argente, E, Beydoun, G, Fuentes-Fernandez, R, Henderson-Sellers, B & Low, G 1970, 'Modelling with Agents', AGENT-ORIENTED SOFTWARE ENGINEERING X, Agent-Oriented Software Engineering Workshop, Springer-Verlag Berlin Heidelberg, Budapest, Hungary, pp. 157-168.
View/Download from: Publisher's site
View description>>
Modelling is gaining relevance in Agent-Oriented Software Engineering (AOSE) because of two main reasons. Firstly, the conceptual frameworks have reached a level of maturity that makes it reasonable to devote effort to seek a consensus in modelling languages, including tool support. Secondly, the influence of model-driven engineering emphasizes the potential value of having models at the core of development processes. This survey analyzes these changes in AOSE modelling languages along three dimensions. The semantic dimension refers to the concepts considered in the languages. The syntactic dimension covers the technical means by which languages are defined. The operational dimension regards the use of these languages, considering both their support and acceptance. The overall context for this discussion is the comparison of several modern AOSE approaches.
Ariffin, SA, Dyson, LE & Hoskins-McKenzie, D 1970, 'Specialists' Perspectives on Mobile Content in Malaysia', INNOVATION AND KNOWLEDGE MANAGEMENT: A GLOBAL COMPETITIVE ADVANTAGE, VOLS 1-4, 16th International-Business-Information-Management-Association Conference, INT BUSINESS INFORMATION MANAGEMENT ASSOC-IBIMA, Kuala Lumpur, MALAYSIA, pp. 1-8.
Babai, L, Codenotti, P, Grochow, JA & Qiao, Y 1970, 'Code Equivalence and Group Isomorphism', Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, San Francisco, USA, pp. 1395-1408.
View/Download from: Publisher's site
View description>>
The isomorphism problem for groups given by their multiplication tables has long been known to be solvable in time nlog n+O(1). The decades-old quest for a polynomial-time algorithm has focused on the very difficult case of class-2 nilpotent groups (groups whose quotient by their center is abelian), with little success. In this paper we consider the opposite end of the spectrum and initiate a more hopeful program to find a polynomial-time algorithm for semisimple groups, defined as groups without abelian normal subgroups. First we prove that the isomorphism problem for this class can be solved in time nO(log log n). We then identify certain bottlenecks to polynomial-time solvability and give a polynomial-time solution to a rich subclass, namely the semisimple groups where each minimal normal subgroup has a bounded number of simple factors. We relate the results to the filtration of groups introduced by Babai and Beals (1999). One of our tools is an algorithm for equivalence of (not necessarily linear) codes in simply-exponential time in the length of the code, obtained by modifying Luks's algorithm for hypergraph isomorphism in simply-exponential time in the number of vertices (FOCS 1999). We comment on the complexity of the closely related problem of permutational isomorphism of permutation groups.
Babar, A, Wong, B & Qumer, A 1970, 'An evaluation of the goal-oriented approaches for modelling strategic alignment concept.', RCIS, International Conference on Research Challenges in Information Science, IEEE, Gosier, pp. 1-8.
View/Download from: Publisher's site
View description>>
Several frameworks have been proposed in Requirements Engineering (RE) discipline that use goal-oriented approach to model the concept of strategic alignment. Understanding the concept of strategic alignment from the perspective of Management Information Systems (MIS) discipline and evaluating goal-oriented approaches in the context of strategic alignment appear to be the fundamental weakness in the RE frameworks that claim to model strategic alignment. In this research we developed a list of constructs by analysing the concept of strategic alignment embedded in strategy map which is one of the widely used frameworks to develop strategic alignment in MIS discipline. In this regard we analysed details of a case study conducted to develop strategic alignment. Against the identified list of constructs we evaluated five well-known goal-oriented approaches and presented their level of effectiveness to model the concept of strategic alignment. © 2011 IEEE.
Bakker, S, van den Hoven, E, Antle, AN & ACM 1970, 'MoSo Tangibles: Evaluating Embodied Learning', TEI 2011: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON TANGIBLE EMBEDDED AND EMBODIED INTERACTION, Tangible, Embedded, and Embodied Interaction, ACM, Madeira, Portugal, pp. 85-92.
View/Download from: Publisher's site
View description>>
Using tangible interaction in interactive educational systems can benefit learning. This can be supported by relying on experientially originating schemata in the interaction design of learning systems. This paper presents the design and evaluation of MoSo Tangibles, a set of interactive, physical artifacts with which children manipulate the pitch, volume and tempo of ongoing tones, in order to structure their understanding of these abstract sound concepts in terms of multiple different concrete body-based concepts. The results indicate that MoSo provided children with a physical handle to reason about the targeted abstract concepts.
Behbood, V & Lu, J 1970, 'Efficiency Prediction in Decision Making Units Merger using Data Envelopment Analysis and Neural Network', 19th Triennial Conference of the International Federation of Operational Research Societies, IFORS, Australia.
Behbood, V & Lu, J 1970, 'Financial Early Warning System: Adaptive Inference-based Fuzzy Neural Network', 19th Triennial Conference of the International Federation of Operational Research Societies, IFORS, Australia.
Behbood, V & Lu, J 1970, 'Fuzzy Refinement-based Transductive Transfer Learning for Bank Failure Prediction', World Conference on Soft Computing, IEEE, USA.
Behbood, V & Lu, J 1970, 'Intelligent financial warning model using Fuzzy Neural Network and case-based reasoning', 2011 IEEE Symposium on Computational Intelligence for Financial Engineering and Economics (CIFEr), Economics -Part Of 17273 - 2011 Ssci, IEEE, Paris, France, pp. 9-15.
View/Download from: Publisher's site
View description>>
Creating an applicable and precise financial early warning model is highly desirable for decision makers and regulators in the financial industry. Although Business Failure Prediction (BFP) especially banks has been extensively a researched area since late 1960s, the next critical step which is the decision making support scheme has been ignored. This paper presents a novel model for financial warning which combines a fuzzy inference system with the learning ability of neural network as a Fuzzy Neural Network (FNN) to predict organizational financial status and also applies reasoning capability of Fuzzy Case-Based Reasoning (FCBR) to support decision makers measuring appropriate solutions. The proposed financial warning model generates an adaptive fuzzy rule base to predict financial status of target case and then if it is predicted to fail, the FCBR is used to find similar survived cases. Finally according similar cases and a fuzzy rule base, the model provides financial decisions to change particular features as company goals in upcoming year to avoid future financial distress.
Behbood, V, Lu, J, Zhang, G & IEEE 1970, 'Long Term Bank Failure Prediction using Fuzzy Refinement-based Transductive Transfer Learning', IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ 2011), IEEE International Conference on Fuzzy Systems, IEEE, Taipei, Taiwan, pp. 2676-2683.
View/Download from: Publisher's site
View description>>
Machine learning algorithms, which have been considered as robust methods in different computational fields, assume that the training and test data are drawn from the same distribution. This assumption may be violated in many real world applications like bank failure prediction because training and test data may come from different time periods or domains. An efficient novel algorithm known as Fuzzy Refinement (FR) is proposed in this paper to solve this problem and improve the performance. The algorithm utilizes the fuzzy system and similarity concept to modify the instances' labels in target domain which was initially predicted by shift-unaware Fuzzy Neural Network (FNN) proposed by [1]. The experiments are performed using bank failure financial data of United States to evaluate the algorithm performance. The results address a significant improvement in the predictive accuracy of FNN due to applying the proposed algorithm.
Behrouznia, A, Azadeh, A, Pichka, K, Pazhoheshfar, P & Saberi, M 1970, 'Prediction of manufacturing lead time based on Adaptive Neuro-Fuzzy Inference System (ANFIS)', 2011 International Symposium on Innovations in Intelligent Systems and Applications, 2011 International Symposium on Innovations in Intelligent Systems and Applications (INISTA), IEEE, pp. 16-18.
View/Download from: Publisher's site
View description>>
The lead time estimation is significant activity in each corporation that concerns with the breakdown of machines and maintenance. An integrated algorithm for forecasting weekly lead time based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is proposed in this study. First, an ANFIS model is illustrated for the lead time forecasting simultaneously. The lowest Mean Absolute Percentage Error (MAPE) value is used to select the best model. In order to illustrate the applicability and superiority of the proposed algorithm, the weekly lead time of Motogen Company in Iran for 70 weeks is used and applied to the proposed algorithm. © 2011 IEEE.
Bennett, I & Dyson, LE 1970, 'Modelling Personal Improvement: Using a Survey to Shape Linguistic and Employment Confidence in First-Year International NESB Students', Proceedings of the 14th Pacific Rim First Year in Higher Education Conference (FYHE) 2011, QUT, Fremantle, pp. 1-10.
Bremner, MJ 1970, 'Classical simulation of commuting quantum computations implies collapse of the polynomial hierarchy', 14th Workshop on Quantum Information Processing, Singapore.
View description>>
Quantum Information Processing (QIP) is a rapidly developing field of research spanning both physics and computer science. As the name implies, the field extends information processing (including computing and cryptography) to physical regimes where quantum effects become significant. QIP 2011 was the fourteenth workshop on theoretical aspects of quantum computing, quantum cryptography, and quantum information in a series that started in Aarhus in 1998 and was held 2010 at ETH Zurich, Switzerland. QIP 2011 featured a tutorial programme, invited talks, contributed talks, and a poster session. In addition, there was a rump session with short informal talks.
Casanovas, M & Merigo, JM 1970, 'A new decision making method with uncertain induced aggregation operators', 2011 IEEE Symposium on Computational Intelligence in Multicriteria Decision-Making (MDCM), 2011 Ieee Symposium On Computational Intelligence In Multicriteria Decision-Making - Part Of 17273 - 2011 Ssci, IEEE, pp. 151-158.
View/Download from: Publisher's site
View description>>
We introduce a new decision making method based on the use of uncertain induced aggregation operators, probabilities and weighted averages. We present the uncertain induced probabilistic ordered weighted averaging weighted averaging (UIPOWAWA) operator. It is a new aggregation operator that provides a parameterized family of aggregation operators between the minimum and the maximum in a unified framework between the probability, the weighted average and the induced ordered weighted averaging (IOWA) operator. Moreover, it also uses uncertain information that can be represented with interval numbers. We study some of its main properties and particular cases including the uncertain induced probabilistic OWA (UIPOWA), the uncertain induced OWA (UIOWA) and the uncertain weighted average (UWA). We also develop an application in multi-person decision making regarding the selection of fiscal policies. © 2011 IEEE.
Chen, L & Zhang, C 1970, 'Semi-supervised Variable Weighting for Clustering', Proceedings of the 2011 SIAM International Conference on Data Mining, Proceedings of the 2011 SIAM International Conference on Data Mining, Society for Industrial and Applied Mathematics, Mesa, Arizona, USA, pp. 863-871.
View/Download from: Publisher's site
View description>>
Semi-supervised learning, which uses a small amount of labeled data in conjunction with a large amount of unlabeled data for training, has recently attracted huge research attention due to the considerable improvement in learning accuracy. In this work, we focus on semi- supervised variable weighting for clustering, which is a critical step in clustering as it is known that interesting clustering structure usually occurs in a subspace defined by a subset of variables. Besides exploiting both labeled and unlabeled data to effectively identify the real importance of variables, our method embeds variable weighting in the process of semi-supervised clustering, rather than calculating variable weights separately, to ensure the computation efficiency. Our experiments carried out on both synthetic and real data demonstrate that semi-supervised variable weighting signicantly improves the clustering accuracy of existing semi-supervised k-means without variable weighting, or with unsupervised variable weighting.
Chen, Q, Lin, W, Dou, W & Yu, S 1970, 'CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment', 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE, pp. 427-434.
View/Download from: Publisher's site
View description>>
Distributed Denial-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily applied in cloud security due to their relatively low efficiency, large storage, to name a few. In view of this challenge, a Confidence-Based Filtering method, named CBF, is investigated for cloud computing environment, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack period. More specially, legitimate packets are collected at non-attack period, for extracting attribute pairs to generate a nominal profile. With the nominal profile, the CBF method is promoted by calculating the score of a particular packet at attack period, to determine whether to discard it or not. At last, extensive simulations are conducted to evaluate the feasibility of the CBF method. The result shows that CBF has a high scoring speed, a small storage requirement and an acceptable filtering accuracy, making it suitable for real-time filtering in cloud environment. © 2011 IEEE.
Chin-Teng Lin, Chun-Ling Lin, Tzai-Wen Chiu, Jeng-Ren Duann & Tzyy-Ping Jung 1970, 'Effect of respiratory modulation on relationship between heart rate variability and motion sickness', 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Boston, MA, USA, pp. 1921-1924.
View/Download from: Publisher's site
View description>>
This study investigates the interplay among heart rate variability (HRV), respiration, and the severity of motion sickness (MS) in a realistic passive driving task. Although HRV is a commonly used metrically in physiological research or even believed to be a direct measure of sympathovagal activities, the results of MS-effected HRV remain mixed across studies. The goal of this study is to find the source of these contradicting results of HRV associated with MS. Experimental results of this study showed that the group trend of the low-frequency (LF) component and the LF/HF ratio increased and high-frequency (HF) component decreased significantly as self-reported MS level increased (p0.001), consistent with a perception-driven autonomic response of the cardiovascular system. However, in one of the subjects, the relationship was reversed when individuals intentionally adjust themselves (deep breathing) to relieve the discomfort of MS during the experiments. It appears that the correlations between HRV and MS level were higher when individuals made fewer adjustments (the number of deep breathing) during the passive driving experiments. © 2011 IEEE.
Corney, M, Lister, R & Teague, D 1970, 'Early Relational Reasoning and the Novice Programmer: Swapping as the 'Hello World' of Relational Reasoning', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Perth, Australia, pp. 95-104.
View description>>
We report on a longitudinal research study of the development of novice programmers in their first semester of programming. In the third week, almost half of our sample of students could not answer an explain-inplain-English question, for code consisting of just three assignment statements, which swapped the values in two variables. We regard code that swaps the values of two variables as the simplest case of where a programming student can manifest a SOLO relational response. Our results demonstrate that the problems many students face with understanding code can begin very early, on relatively trivial code. However, using traditional programming exercises, these problems often go undetected until late in the semester. New approaches are required to detect and fix these problems earlier. © 2011, Australian Computer Society, Inc.
Devitt, SJ, Stephens, AM, Munro, WJ & Nemoto, K 1970, 'The optical quantum computer: how big and how fast?', SPIE Proceedings, SPIE Optical Engineering + Applications, SPIE, San Diego, CA.
View/Download from: Publisher's site
Ding, Y, Wu, J, Zhou, H, Feng, P, Liu, B & Gui, L 1970, 'A self-awareness routing scheme with power control for underlay spectrum sharing networks', 2011 International Conference on Wireless Communications and Signal Processing (WCSP), Signal Processing (WCSP 2011), IEEE.
View/Download from: Publisher's site
View description>>
Dynamic spectrum sharing technology through the underlay approach in cognitive radio systems is becoming one of the most important issues to improve the spectrum utilization. In this paper, we first introduce a novel routing selection scenario for underlay spectrum sharing network. The scenario consists of three parts: spectrum management network (SMN), secondary user network (SUN) and primary user network (PUN). Through the spectrum information collection in SMN and the spectrum related information exchange between the SMN and SUN in a common channel, the underlay model can avoid the interference to the PUN as much as possible. To better establish an effective and practical routing selection model in SUN and minimize the interference to PUN, we propose a self-awareness routing (SAR) scheme, based on the power control approach and the router capacity metric. The simulation results validate that SAR can achieve a high level performance not only in the routing quality, but also in the minimization of the interference to the PUN. © 2011 IEEE.
Doss, R, Zhou, W, Yu, S & Gao, L 1970, 'A novel mutual authentication scheme with minimum disclosure for RFID systems', 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, pp. 544-549.
View/Download from: Publisher's site
View description>>
In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We take into account the computational constraints of EPC Class-1 Gen-2 passive RFID tags and only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are employed. Detailed security analysis of our scheme shows that it can offer robust security properties in terms of tag anonymity and tag untraceability while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the proposed scheme and its impact on authentication delay. © 2011 IEEE.
Dovey, KA 1970, 'The Promise of Crisis: Dangerous Learning in Turbulent Contexts', OLKC 2011: Making Waves, Organizational Learning and Knowledge Capabilities, Hull University Business School, Hull, United Kingdom, pp. 36-53.
View description>>
In this paper, I outline a pilot project aimed at exploring creativity and innovation within the South African creative industries. Interviews with eleven people who have deep knowledge of these industries delivered an insightful perspective on the contextual factors driving creativity and its realization in innovative outcomes within these industries; factors that align well with those identified in the creativity and innovation research literature.
Durao, F, Bayyapu, K, Guandong Xu, Dolog, P & Lage, R 1970, 'Using Tag-Neighbors for Query Expansion in Medical Information Retrieval', 2011 International Conference on Information Science and Applications, 2011 International Conference on Information Science and Applications (ICISA 2011), IEEE, Jeju Island, South Korea.
View/Download from: Publisher's site
View description>>
In the context of medical document retrieval, users often under-specified queries lead to undesired search results that suffer from not containing the information they seek, inadequate domain knowledge matches and unreliable sources. To overcome the limitations of under-specified queries, we utilize tags to enhance information retrieval capabilities by expanding users' original queries with context-relevant information. We compute a set of significant tag neighbor candidates based on the neighbor frequency and weight, and utilize the most frequent and weighted neighbors to expand an entry query that has terms matching tags. The proposed approach is evaluated using MedWorm medical article collection and standard evaluation methods from the text retrieval conference (TREC). We compared the baseline of 0.353 for Mean Average Precision (MAP), reaching a MAP 0.491 (+39%) with the query expansion. In-depth analysis shows how this strategy is beneficial when compared with different ranks of the retrieval results. © 2011 IEEE.
Eklund, JM, Catley, C, McGregor, C & James, A 1970, 'Detection of Apnoea in Newborn Infants using Impedance Respiratory Wave Data', Imaging and Signal Processing in Healthcare and Technology, Imaging and Signal Processing in Healthcare and Technology, ACTAPRESS, pp. 90-94.
View/Download from: Publisher's site
View description>>
Apnoea is a serious condition that occurs frequently in prematurely born infants as well as other patients requiring critical care. At least while in the intensive care environment, these patients are provided with constant care assisted by modern medical monitoring systems. The systems record continuous data from each patient, however most of these data are not used except when a care provider observes the device directly, or when an alert - that is used to draw the attention of those same providers - is generated. This paper explores how these continuous data streams can be used in real-time to provide better alert mechanisms and diagnostics, with particular focus on the impedance respiratory waveform, a high rate physiological stream that measures the expansion and contraction of the patient's chest and is traditionally used to determine the respiratory rate. The direct use of this data stream is compared to the derived respiratory rate as a means to estimate the onset of a suspected case of apnoea.
Feng, P, Ding, Y, Liu, B, Wu, J, Gui, L & Zhou, H 1970, 'A QoS constrained cognitive routing algorithm for ad hoc networks based on directional antenna', 2011 International Conference on Wireless Communications and Signal Processing (WCSP), Signal Processing (WCSP 2011), IEEE.
View/Download from: Publisher's site
View description>>
Communication and networking with directional antenna are widely used recently. In this paper, for the communication scenarios based on the directional antenna, we design a cognitive retransmission mechanism. The mechanism can increase the probability of successful retransmission on one hand, on the other hand, it can dramatically reduce the route discovery time in ad hoc networks. For factual applications, we propose a QoS constrained cognitive routing algorithm named as QoS-CRA for wireless ad hoc networks. This algorithm adopts the strategy of initiating the route discovery by the source node, but making decision to choose the best route by the destination node. The simulation results demonstrate that the cognitive retransmit strategy is far more efficient than the traditional one and different QoS parameters in our algorithm can meet different application requirements. © 2011 IEEE.
Fernandez-Llatas, C, Mocholi, JB, Sala, P, Naranjo, JC, Pileggi, SF, Guillen, S & Traver, V 1970, 'Ambient assisted living spaces validation by services and devices simulation', 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Boston, MA, pp. 1785-1788.
View/Download from: Publisher's site
Fernandez-Llatas, C, Pileggi, SF, Traver, V & Benedi, JM 1970, 'Timed Parallel Automaton: A Mathematical Tool for Defining Highly Expressive Formal Workflows', 2011 Fifth Asia Modelling Symposium, 2011 5th Asia Modelling Symposium (AMS 2011), IEEE, pp. 56-61.
View/Download from: Publisher's site
View description>>
The definition and simulation of processes using Work flow technology is becoming more and more popular. In that way, to standardize and simulate complex processes it is needed high expressive languages able to be automatically executed by computers. Currently, high expressive languages that can be used for simulation and definition of processes are based in Petri Nets technology. Nevertheless, Petri Nets are difficult to understand by processes experts with no computer science training or expertise and are more complex to be executed than other simpler approaches like finite automatons. In this paper an automata based mathematical tool with a high expressivity capacity is presented. This framework is easier to understand also by non computer science expert sand its automation is simple in order to allow to experts to define formal work flows that can be easily automated. © 2011 IEEE.
Garcia, J, Navarro, KF & Lawrence, E 1970, 'Serious games to improve the physical health of the elderly: A categorization scheme', International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services. Barcelona, Spain, International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, IARIA, Barcelona, Spain, pp. 64-71.
View description>>
this paper aims to provide a snapshot of the current status in the field of serious games for improving the physical health of the elderly. This work covers recent research projects for stroke rehabilitation and for falls prevention where user-center design methodologies were applied in order to satisfy this audience. A classification of the most relevant work in this area is provided along with a brief description of the platform, technology required and user-center design principles applied.
Gervasi, V & Zowghi, D 1970, 'Mining Requirements Links', REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, International Working Conference on Requirements Engineering: Foundation for Software Quality, Springer Verlag, Essen, Germany, pp. 196-+.
View/Download from: Publisher's site
View description>>
[Context & motivation] Obtaining traceability among requirements and between requirements and other artifacts is an extremely important activity in practice, an interesting area for theoretical study, and a major hurdle in common industrial experience. Substantial effort is spent on establishing and updating such links in any large project, even more so when requirements refer to a product family. [Question/problem]. While most research is concerned with ways to reduce the effort needed to establish and maintain traceability links, a different question can also be asked: how is it possible to harness the vast amount of implicit (and tacit) knowledge embedded in already-established links? Is there something to be learned about a specific problem or domain, or about the humans who establish traces, by studying such traces?
Ghaffar, ARA, Beydoun, G, Shen, J & Tibben, W 1970, 'Towards Knowledge Management in Sports Event Management - Context Analysis of Malaysian Biannual Games with CommonKADS.', ICSOFT (2), International Conference on Software and Data Technologies, SciTePress, Seville, Spain, pp. 377-383.
View description>>
Context Analysis (CA) is typically used as an early phase preceding the development of a knowledge-based systems in order to indicate how the system should interact with its environment and the various stakeholders. We undertake a detailed context analysis of business processes of the Malaysian Games (MG) to highlight blind spots of the process and enable the identification of an initial sports event knowledge management (KM) framework. Firstly, our CommonKADS driven analysis highlights how we can improve the business process and enable the organization to develop, distribute and apply its knowledge resources effectively. Secondly, the paper highlights specific features about the domain of sports events management and accordingly presents a set of recommendations to extend the CA of CommonKADS to improve its applicability to Sports Events Management in general.
Ghous, H, Ho, N, Catchpoole, DR & Kennedy, PJ 1970, 'Comparing functional visualizations of genes', The 5th International Workshop on Data Mining in Functional Genomics and Proteomics: Current Trends and Future Directions, International Workshop on Data Mining in Functional Genomics and Proteomics: Current Trends and Future Directions, European Conference on Machine Learning, Athens, Greece, pp. 12-21.
Gill, AQ & Bunker, D 1970, 'Connceptualization of a Context Aware Cloud Adaptation (CACA) Framework', 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), International Conference on Dependable, Autonomic and Secure Computing, IEEE CPS, Sydney, pp. 760-767.
Gill, AQ, Bunker, D & Seltsikas, P 1970, 'An Empirical Analysis of Cloud, Mobile, Social and Green Computing: Financial Services IT Strategy and Enterprise Architecture.', DASC, International Conference on Dependable, Autonomic and Secure Computing, IEEE Computer Society, Sydney, pp. 697-704.
View/Download from: Publisher's site
View description>>
Financial services organisations have shown a significant interest in the adoption of emerging cloud, mobile, social networks and green computing environments for managing the needs of their complex business processes and systems. How will these emerging technologies affect and be embraced by financial services organizations in practice? This paper presents empirical exploratory research on the applicability of emerging cloud, mobile, social and green technologies in these organizations. We investigate how these emerging technologies will affect the IT strategy and enterprise architecture of the financial services organisations by analyzing recent interviews of fifteen senior technology executives and CIOs from this sector. The outcomes of this study suggest that the sector perceives these emerging technologies both as a challenge and opportunity for their businesses. In order to meet their business objectives they do, however, require a phased, systematic, people-oriented, business-focused and low risk approach that combines both business and technology impacts to the assessment, selection, consolidation and adoption of these technologies for specific business services without putting their customers' information at risk. © 2011 IEEE.
Gluga, R, Kay, J, Lever, T & Lister, R 1970, 'An architecture for systematic tracking of skill and competence level progression in Computer Science', 2nd Annual International Conferences on Computer Science Education: Innovation and Technology (CSEIT 2011), Annual International Conferences on Computer Science Education: Innovation and Technology, Global Science & Technology Forum (GSTF), Singapore, pp. 65-69.
View/Download from: Publisher's site
View description>>
A typical Computer Science degree is three to five years long, consists of four to six subjects per semester, and two semesters per year. A student enrolled in such a degree is expected to learn both discipline-specific skills and transferable generic skills. These skills are to be taught in a progressive sequence through the duration of the degree. As the student progresses through the subjects and semesters of a degree, his skill portfolio and competence level for each skill is expected to grow. Effectively modeling these curriculum skills, mapping them to assessment tasks across subjects of a degree, and measuring the progression in learner competence level is, largely, still an unsolved problem. Previous work at this scale is limited. This systematic tracking of skills and competence is crucial for effective quality control and optimization of degree structures. Our main contribution is an architecture for a curriculum information management system to facilitate this systematic tracking of skill and competence level progression in a Computer Science context.
Gong, L, Gui, L, Liu, B, Rong, B, Xu, Y, Wu, Y & Zhang, W 1970, 'Selective bit mapping for Chinese DTMB LDPC coded QAM modulation scheme', 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE.
View/Download from: Publisher's site
View description>>
In this paper, we introduce selective-bit mapping to improve the performance of the LDPC coded QAM modulation scheme for Chinese Digital Terrestrial Television Broadcasting (DTMB) system. The threshold of message-passing decoding can be lowered by matching the binary components of LDPC codeword to the positions in the m-tuples to be mapped into 2 mQAM symbols. By our approach, the pattern of mapping is described by bit-mapping polynomials, based on which density evolution using Gaussian approximation can be applied. We optimize the bit mapping polynomials for the LDPC codes of the Chinese DTMB standard. Numerical results illustrate that by the proposed approach the decoding threshold can be lowered by 0.05dB to 0.499dB by different combinations of code rate and order of QAM modulations. Simulation results show that the actual BER improvement varies from 0.09dB to 0.6dB in single-carrier and OFDM modes. © 2011 IEEE.
Gong, L, Liu, B, Xu, Y, Rong, B, Wu, Y, Gagnon, G, Gui, L & Zhang, W 1970, 'Multi-rate LDPC codes for DTV transmission by known-bits padding', 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE.
View/Download from: Publisher's site
View description>>
Modern DTV broadcasting systems, such as DVB and the Chinese DTMB system, usually have multiple code rates for forward error correction to accommodate a variety of channel conditions. In these systems, each code rate corresponds to a special set of code words, which put a limit on rate granularity and thus cannot achieve seamless code rate adaptation. To solve this problem, we propose a known-bits padding scheme to generate multi-code-rate LDPC codes of arbitrary granularity. In our scheme, we take a standardized LDPC code of specific rate as mother code, then pad known-bits according to the targeted code rate and given shortening optimization algorithm. Simulation study shows that our proposed scheme can obtain satisfying performance in terms of code rate flexibility and decoding threshold. © 2011 IEEE.
Haibo Zhou, Bo Liu, Lin Gui, Xinbing Wang & Ying Li 1970, 'Fast Spectrum Sharing for Cognitive Radio Networks: A Joint Time-Spectrum Perspective', 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011, 2011 IEEE Global Communications Conference (GLOBECOM 2011), IEEE, Houston, TX.
View/Download from: Publisher's site
Hezaveh, NK, Azadeh, A, Tofighi, S, Saberi, M, Pazhoheshfar, P & Behrouznia, A 1970, 'An integrated ANN and Fuzzy C-mean clustering algorithm for performance assessment of telecommunication sectors and auto industries', 2011 IEEE 3rd International Conference on Communication Software and Networks, 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), IEEE, pp. 6-10.
View/Download from: Publisher's site
View description>>
This study proposes a non-parametric efficiency frontier analysis method based on the adaptive neural network technique for measuring efficiency as a complementary tool for the common techniques of the efficiency studies in the previous studies. The proposed computational method is able to find a stochastic frontier based on a set of input-output observational data and do not require explicit assumptions about the function structure of the stochastic frontier. In this algorithm, for calculating the efficiency scores, a similar approach to econometric methods has been used. Moreover, the effect of the return to scale of decision making unit (DMU) on its efficiency is included and the unit used for the correction is selected by notice of its scale (under constant return to scale assumption). Also for increasing DMUs' homogeneousness, Fuzzy C-means method is used to cluster DMUs. An example using real data is presented for illustrative purposes. In the application to the wireless telecommunication and auto industries, we find that the neural network provide more robust results and identifies more efficient units than the conventional methods since better performance patterns are explored. © 2011 IEEE.
Howsawi, EM, Eager, D, Bagia, R & IEEE 1970, 'Understanding Project Success: the Four-Level Project Success Framework', 2011 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), IEEE, Singapore, Singapore, pp. 620-624.
View/Download from: Publisher's site
View description>>
It is acknowledged in project management literature that a project's success means different things to different people. This implies that the definition of success will be different for each project. However, success is a common goal for projects regardless of the specific definition for each project. This statement implies that there can be a common approach in planning for success and generalized framework that can guide the process of defining and planning the project success for different projects. This paper presents the underlying framework that directs the optimum success definition and planning process. Through a literature review and classification of success criteria, a four level success framework was developed, namely: context level; business level; product level; and project process level. This framework explains the relationship between levels and provides guidelines for decision process. The framework is generalized and can be applied to most projects.
Hsu, C-H, Li, P, Guo, S, Yu, S & Qian, Z 1970, 'Multicast Lifetime Maximization Using Network Coding in Lossy Wireless Ad Hoc Networks', 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011 IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC), IEEE, pp. 95-99.
View/Download from: Publisher's site
View description>>
In traditional stop-and-wait strategy for reliable communications, such as ARQ, retransmission for the packet loss problem would incur a great number of packet transmissions in lossy wireless ad-hoc networks. We study the reliable multicast lifetime maximization problem by alternatively exploring the random linear network coding in this paper. We formulate such problem as a min-max problem and propose a heuristic algorithm, called maximum lifetime tree (MLT), to build a multicast tree that maximizes the network lifetime. Simulation results show that the proposed algorithms can significantly increase the network lifetime when compared with the traditional algorithms under various distributions of error probability on lossy wireless links. © 2011 IEEE.
Hussain, W, Sohaib, O, Ahmed, A & Khattak, BS 1970, 'Comparative study of WCAG 2.0, IBM Web 5.1 and Section 508-1194.22 for Lower-Literate Web-Users to enhance Content Usability', FUTURE INFORMATION TECHNOLOGY, International Conference on Future Information Technology (ICFIT 2011), INT ASSOC COMPUTER SCIENCE & INFORMATION TECHNOLOGY PRESS-IACSIT PRESS, Singapore, SINGAPORE, pp. 149-153.
Jiang, J, Zhang, H & Yu, S 1970, 'A Novel Monotonic Fixed-Point Algorithm for l 1-Regularized Least Square Vector and Matrix Problem', HIGH PERFORMANCE NETWORKING, COMPUTING, AND COMMUNICATION SYSTEMS, 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC 2011), Springer Berlin Heidelberg, Singapore, SINGAPORE, pp. 476-483.
View/Download from: Publisher's site
Johnston, AJ & CLARKSON, D 1970, 'Designing for Conversational Interaction with Interactive Dance Works', Proceedings of the Workshop: The Body In Design, The Australasian Computer Human Interaction Conference (OzCHI), Australian Computer Human Interaction Conference, Interaction Design and Work Practice Laboratory (IDWoP), Canberra, pp. 13-16.
View description>>
In this paper we describe ongoing work, which explores the physicality of human-computer interaction in dance works. The use of physical simulations in the interface to connect with the performers and audiences lived experience of the physical world is discussed. Drawing on past work with musicians, we argue that this approach is effective in encouraging creative, `conversational interactions in live performance.
Juang, C-F, Chang, Y-C, Hsu, C-H & Chung, I-F 1970, 'Fuzzy controller design using group-crossover particle swarm optimization for truck reversing control', 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE.
View/Download from: Publisher's site
Juszczyszyn, K, Budka, M & Musial, K 1970, 'The Dynamic Structural Patterns of Social Networks Based on Triad Transitions', 2011 International Conference on Advances in Social Networks Analysis and Mining, 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2011), IEEE, Kaohsiung, TAIWAN, pp. 581-586.
View/Download from: Publisher's site
Juszczyszyn, K, Musial, K & Budka, M 1970, 'Link Prediction Based on Subgraph Evolution in Dynamic Social Networks', 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom), IEEE, pp. 27-34.
View/Download from: Publisher's site
View description>>
We propose a new method for characterizing the dynamics of complex networks with its application to the link prediction problem. Our approach is based on the discovery of network subgraphs (in this study: triads of nodes) and measuring their transitions during network evolution. We define the Triad Transition Matrix (TTM) containing the probabilities of transitions between triads found in the network, then we show how it can help to discover and quantify the dynamic patterns of network evolution. We also propose the application of TTM to link prediction with an algorithm (called TTM-predictor) which shows good performance, especially for sparse networks analyzed in short time scales. The future applications and research directions of our approach are also proposed and discussed. © 2011 IEEE.
Kassenaar, P, Bredies, K & van den Hoven, E 1970, 'Designing for utilization: Putting design principles into practice', Proceedings of the Nordes '11: The 4th Nordic Design Research Conference MAKING DESIGN MATTER!, Nordic Design Research Conference, School of Art and Design, Aalto University, Helsinki, Finland, pp. 324-329.
View description>>
Designers do not only create usable products for a predefined purpose, but also to explore new materials and technologies. In doing so, they should not restrict themselves to existing conventions, but develop new ones out of the medium at hand. These new interface forms should encourage users to appropriate an object for their own purposes - i.e. utilize it. In this paper, we will describe the development of a fabric interface prototype that should exploit the material and encourage utilization of the interface. We discuss how our theoretical perspective was translated into a concrete design, and how appropriate we judge it for utilization. We conclude that design without final goal is surprisingly hard to do, but can show the value of the medium used.
Kazienko, P, Kukla, E, Musial, K, Kajdanowicz, T, Bródka, P & Gaworecki, J 1970, 'A Generic Model for a Multidimensional Temporal Social Network', E-TECHNOLOGIES AND NETWORKS FOR DEVELOPMENT, 1st International Conference on e-Technologies and Networks for Development (ICeND 2011), Springer Berlin Heidelberg, Inst Finance Management, Dar es Salaam, TANZANIA, pp. 1-14.
View/Download from: Publisher's site
Kazienko, P, Musial, K, Kukla, E, Kajdanowicz, T & Bródka, P 1970, 'Multidimensional Social Network: Model and Analysis', COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT I, 3rd International Conference on Computational Collective Intelligence (ICCCI 2011), Springer Berlin Heidelberg, Gdynia Maritime Univ, Gdynia, POLAND, pp. 378-387.
View/Download from: Publisher's site
Kimman, F, Weda, H, van den Hoven, E, de Zeeuw, T, Luitjens, S & ACM 1970, 'Spinning in Control: Design Exploration of a Cross-Device Remote', TEI 2011: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON TANGIBLE EMBEDDED AND EMBODIED INTERACTION, Tangible, Embedded, and Embodied Interaction, ACM, Funchal, Portugal, pp. 189-192.
View/Download from: Publisher's site
View description>>
You buy a new TV and get a new remote, you buy a DVD player and you get another remote, you buy a sound system and guess what? Almost every digital media product comes with its own designated remote control (RC). What would happen if one remote adapts to the owner's activities and is able to have cross-device control? In this paper we describe a design exploration conducted to create new ways to interact with digital media products. The main ingredients are: fit for a social setting, portable, and including physical interaction. The result is an exploration of a button less single-hand remote control concept.
Lawrence, E, Navarro, KF, Marin, JAG & Sax, C 1970, 'Towards building health systems', PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS 2011), 6th International Conference on Systems (ICONS), IARIA XPS PRESS, St Maarten, NETHERLANDS, pp. 109-114.
View description>>
This paper reports on a series of interviews with three mainstream and three alternative/complimentary health professionals about the use of interactive technologies as a tool to improve the physical and mental well-being of the elderly. The questions are based around an Analytic Framework for investigating Interactive Technologies and the elderly. Four balance games using the Wii were demonstrated to the interviewees and their opinion of the suitability or otherwise of these games are discussed. The chosen games did not meet with universal approval but did provide us with useful insights on how to ensure the development of appropriate games for the elderly.
Li, J & Tao, D 1970, 'A Probabilistic Model for Discovering High Level Brain Activities from fMRI.', ICONIP (1), International Conference on Neural Information Processing, Springer, Shanghai, China, pp. 329-336.
View/Download from: Publisher's site
View description>>
Functional magnetic resonance imaging (fMRI) has provided an invaluable method of investing real time neuron activities. Statistical tools have been developed to recognise the mental state from a batch of fMRI observations over a period. However, an interesting question is whether it is possible to estimate the real time mental states at each moment during the fMRI observation. In this paper, we address this problem by building a probabilistic model of the brain activity. We model the tempo-spatial relations among the hidden high-level mental states and observable low-level neuron activities. We verify our model by experiments on practical fMRI data. The model also implies interesting clues on the task-responsible regions in the brain. © 2011 Springer-Verlag.
Li, J & Tao, D 1970, 'Wisdom of Crowds: Single Image Super-resolution from the Web.', ICDM Workshops, IEEE International Conference on Data Mining, IEEE Computer Society, Vancouver, Canada, pp. 812-816.
View/Download from: Publisher's site
View description>>
This paper addresses the problem of learning based single image super-resolution. Previous research on this problem employs human user to provide a set of images that are similar to the target image as a reference. Then the superresolution algorithm can learn from the provided reference images to predict the high resolution details for the target image. We propose a fully automatic scheme, which leverages the knowledge of the entire visual world and to query relevant references from the Internet. The proposed scheme is free of human supervision, and the performance compromise is small. We conduct experiments to show the effectiveness of the method. © 2011 IEEE.
Li, J, Bian, W, Tao, D & Zhang, C 1970, 'Learning Colours from Textures by Sparse Manifold Embedding.', Australasian Conference on Artificial Intelligence, Australasian Joint Conference on Artificial Intelligence, Springer, Perth, Australia, pp. 600-608.
View/Download from: Publisher's site
View description>>
The capability of inferring colours from the texture (grayscale contents) of an image is useful in many application areas, when the imaging device/environment is limited. Traditional colour assignment involves intensive human effort. Automatic methods have been proposed to establish relations between image textures and the corresponding colours. Existing research mainly focuses on linear relations. In this paper, we employ sparse constraints in the model of texture-colour relationship. The technique is developed on a locally linear model, which assumes manifold assumption of the distribution of the image data. Given the texture of an image patch, learning the model transfers colours to the texture patch by combining known colours of similar texture patches. The sparse constraint checks the contributing factors in the model and helps improve the stability of the colour transfer. Experiments show that our method gives superior results to those of the previous work. © 2011 Springer-Verlag.
Li, L, Xu, G, Yang, Z, Zhang, Y & Kitsuregawa, M 1970, 'A Feature-Free Flexible Approach to Topical Classification of Web Queries', 2011 Seventh International Conference on Semantics, Knowledge and Grids, 2011 Seventh International Conference on Semantics Knowledge and Grid (SKG), IEEE, Beijing, China, pp. 59-66.
View/Download from: Publisher's site
View description>>
The task of topical classification of Web queries is to classify Web queries into a set of target categories. Machine learning based conventional approaches usually rely on external sources of information to obtain additional features for Web queries and training data for target categories. Unfortunately, these approaches are known to suffer from inability to adapt to different target categories which may be caused by the dynamic changes observed in both Web topic taxonomy and Web content. In this paper, we propose a feature-free flexible approach to topical classification of Web queries. Our approach analyzes queries and topical categories themselves and utilizes the number of Web pages containing both a query and a category to determine their similarity. The most attractive feature of our approach is that it only utilizes the Web page counts estimated by a search engine to provide the Web query classification with respectable accuracy. We conduct experimental study on the effectiveness of our approach using a set of rank measures and show that our approach performs competitively to some popular state-of-the-art solutions which, however, make frequent use of external sources and are inherently insufficient in flexibility. © 2011 IEEE.
Lin, C-T, Chen, S-A, Ko, L-W & Wang, Y-K 1970, 'EEG-based brain dynamics of driving distraction', The 2011 International Joint Conference on Neural Networks, 2011 International Joint Conference on Neural Networks (IJCNN 2011 - San Jose), IEEE, San Jose, CA, USA, pp. 1497-1500.
View/Download from: Publisher's site
View description>>
Distraction during driving has been recognized as a significant cause of traffic accidents. The aim of this study is to investigate Electroencephalography (EEG) -based brain dynamics in response to driving distraction. To study human cognition under specific driving tasks in a simulated driving experiment, this study utilized two simulated events including unexpected car deviations and mathematics questions. The raw data were first separated into independent brain sources by Independent Component Analysis. Then, the EEG power spectra were used to evaluate the time-frequency brain dynamics. Results showed that increases of theta band and beta band power were observed in the frontal cortex. Further analysis demonstrated that reaction time and multiple cortical EEG power had high correlation. Thus, this study suggested that the features extracted by EEG signal processing, which were the theta power increases in frontal area, could be used as the distracted indexes for early detection of driver inattention in real driving. © 2011 IEEE.
Lin, C-T, Wang, Y-K & Chen, S-A 1970, 'An EEG-Based Brain-Computer Interface for Dual Task Driving Detection', NEURAL INFORMATION PROCESSING, PT I, 18th International Conference on Neural Information Processing (ICONIP), Springer Berlin Heidelberg, Shanghai, PEOPLES R CHINA, pp. 701-708.
View/Download from: Publisher's site
Lister, R 1970, 'Concrete and other neo-piagetian forms of reasoning in the novice programmer', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Perth, Australia, pp. 9-18.
View description>>
This paper brings together a number of empirical research results on novice programmers, using a neo-Piagetian theoretical framework. While there already exists literature connecting programming with classical Piagetian theory, in this paper we apply neo-Piagetian theory. Using that neo-Piagetian perspective, we offer an explanation as to why attempts to predict ability for programming via classical Piagetian tests have yielded mixed results. We offer a neo-Piagetian explanation of some of the previously puzzling observations about novice programmers, such as why many of them make little use of diagrams, and why they often manifest a nonsystematic approach to writing programs. We also develop the relatively unexplored relationship between concrete operational reasoning and programming, by exploring concepts such as conservation and reversibility. © 2011, Australian Computer Society, Inc.
Liu, B, Gui, L, Zhang, W & Gong, L 1970, 'Iterative rake structural decision feedback equalization in linear single frequency network of Chinese High Speed Railway Television system', 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE.
View/Download from: Publisher's site
View description>>
The Chinese High Speed Railway Television (HSRT) has become a new hotpot among applications of broadcasting technology. In this paper, we consider a kind of network infrastructure based on signal frequency network (SFN) design. The character of linear SFN in the railway television system is that receiver between two transmitters will receive signal from both base stations. When single carrier system is adopted as the modulation/demodulation technique, decision feedback equalization (DFE) is used to combat the interference brought by SFN and reflected signals. However, traditional DFE may waste the signal power of dispersive channels. Thus it is not the most effective method in the linear SFN of railway television. To deal with this problem, we propose an iterative rake structural DFE algorithm with cancellation (IR-DFE-C). Theoretical analysis and simulation show that IR-DFE-C algorithm utilizes the power of multipath channels more efficiently than traditional time domain decision feedback equalization (TD-DFE). Moreover, this IR-DFE-C will not be affected by the deep fading problems in frequency domain. Therefore it has advantages over both TD-DFE and frequency domain linear equalization (FD-LE) method which has the problem of noise enhancement in such circumstances. © 2011 IEEE.
Lopez-Lorca, AA, Beydoun, G, Martínez-Béjar, R & Tootell, H 1970, 'Supporting developers in complex systems modelling', ACIS 2011 Proceedings - 22nd Australasian Conference on Information Systems, Australasian Conference on Information Systems, AIS Electronic Library (AISeL), Sydney, Australia.
View description>>
Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the quality of the final product. Early validation of MAS models can prevent rework efforts or building a system that is non-compliant with the client's specification. In this paper we propose a process to support developers in modelling tasks using ontologies to validate and improve the quality of requirement analysis models as they are being developed and at the same time bridging the traditional gap between developers and clients. The proposed ontology-mediated validation is easily applicable to other kinds of architectures, however we illustrate this for MAS development as its complexity justifies any additional cost associated with applying it. © 2011 Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell.
Mairiza, D & Zowghi, D 1970, 'Constructing a Catalogue of Conflicts among Non-functional Requirements', Communications in Computer and Information Science, International Conference on Evaluation of Novel Approaches to Software Engineering, Springer Berlin Heidelberg, Athens, Greece, pp. 31-44.
View/Download from: Publisher's site
View description>>
Non-Functional Requirements (NFRs) are recognized as a critical factor to the success of software projects because they address the essential issue of software quality. NFRs tend to interfere, conflict, and contradict with one another and this conflict is widely acknowledged as one of the key characteristics of NFRs. Several models of NFRs conflicts have been proposed and the interacting nature of NFRs has been characterized as either positive or negative inter-relationships among NFRs. Positive relationship represents a pair of NFRs that are supporting each other while negative relationship represents those NFRs that are conflicting with one another. Furthermore, as NFRs are also relative, the interpretation of NFRs may vary depending on many factors such as the context of the system being developed and the extent of stakeholders’ involvement. The multiple interpretations of NFRs may lead to positive or negative inter-relationships that are not always obvious. These relationships may change depending on the meaning of NFRs in the system being developed. Hence, the existing potential conflicts models remain in disagreement with one other. This paper presents the result of an extensive and systematic investigation of the extant literature over the notion of NFRs and the conflicts among them. Rigorous synthesis of the carefully reviewed literature has resulted in the construction of a catalogue of NFRs conflicts with respect to NFRs relative characteristic. The relativity of conflicts is characterized by three categories: absolute conflict; relative conflict; and never conflict. This comprehensive catalogue could assist software developers with identifying the NFRs conflicts, performing conflicts analysis, and suggesting potential strategies to resolve these conflicts. © Springer-Verlag Berlin Heidelberg 2011.
Makki, SK, Srirangam, NB, Aiswarya, VS & Yu, S 1970, 'Utilizing Intelligent Middleware for Reconfiguration of Applications on Android', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 81-89.
View/Download from: Publisher's site
View description>>
The recent technological advances in mobile communication and handheld devices transform the existing mobile phones to powerful computers with variety of functionalities and capabilities. This evolution has led to development of advanced applications such as maps and navigation, social networking, enhanced games, and many more which can be utilized by thesephones. However, these smartphoneshave several limitations such as, limited energy, memory and processing power. These constraints limit the ability of thesephones for performing complex tasks, or computationally intensive tasks at a constant level of performance for thesephonesto match the users' desires. Therefore, in this paper we develop an intelligent middleware to enhance the capabilities of these handheld devices. This middleware allows the device to switch applications from executing locally to executing remotely. © 2011 Springer-Verlag.
Marin, JAG, Lawrence, E, Navarro, KF & Sax, C 1970, 'Heuristic Evaluation for Interactive Games within Elderly Users', PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON EHEALTH, TELEMEDICINE, AND SOCIAL MEDICINE (ETELEMED 2011), 3rd International Conference on eHealth, Telemedicine, and Social Medicine (eTELEMED), IARIA XPS PRESS, Gosier, FRANCE, pp. 130-133.
View description>>
This paper presents the results obtained after performing a number of demonstrations followed by a series of interviews concerning the usage of interactive games as a tool to improve both physical and mental well-being of elderly persons. This study points out the importance of a proper design regarding the usability of video games for the aged to ensure the elderly benefit from such games.
Marin, L, Merigo, JM, Valls, A, Moreno, A & Isern, D 1970, 'Induced Unbalanced Linguistic Ordered Weighted Average', Proceedings of the 7th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-2011), 7th conference of the European Society for Fuzzy Logic and Technology, Atlantis Press, Aix-les-Bains, FRANCE, pp. 1-8.
View/Download from: Publisher's site
McGregor, C 1970, 'A cloud computing framework for real-time rural and remote service of critical care', 2011 24th International Symposium on Computer-Based Medical Systems (CBMS), 2011 24th International Symposium on Computer-Based Medical Systems (CBMS), IEEE.
View/Download from: Publisher's site
View description>>
Critical care patients in rural, remote and some urban healthcare facilities do not have the same level of access to intensivist specialist support as patients in higher care level urban critical care units (CCUs). New clinical research is also demonstrating that computationally intensive analysis of physiological data streams in near real-time has the potential to detect the onset of certain conditions earlier. The provision of clinical decision support tools, in a cost effective way to all CCUs has the potential to reduce mortality and morbidity rates, reduce critical care patient transportation between CCUs and in so doing reduce healthcare costs. This research presents Artemis Cloud, a cloud computing based Software-asa-Service and Data-as-a-Service approach for the provision of remote real-time patient monitoring and support for clinical research. This research is demonstrated using a neonatal intensive care unit case study supporting clinical research for earlier onset detection of late onset neonatal sepsis. © 2011 IEEE.
McGregor, C, Catley, C & James, A 1970, 'A process mining driven framework for clinical guideline improvement in critical care', CEUR Workshop Proceedings.
View description>>
This paper presents a framework for process mining in critical care. The framework uses the CRISP-DM model, extended to incorporate temporal and multidimensional aspects (CRISP-TDMn), combined with the Patient Journey Modeling Architecture (PaJMa), to provide a structured approach to knowledge discovery of new condition onset pathophysiologies in physiological data streams. The approach is based on temporal abstraction and mining of physiological data streams to develop process flow mappings that can be used to update patient journeys; instantiated in critical care within clinical practice guidelines. We demonstrate the framework within the neonatal intensive care setting, where we are performing clinical research in relation to pathophysiology within physiological streams of patients diagnosed with late onset neonatal sepsis. We present an instantiation of the framework for late onset neonatal sepsis, using CRISP-TDMn for the process mining model and PaJMa for the knowledge representation.
McGregor, C, Catley, C, James, A & Padbury, J 1970, 'Next generation neonatal health informatics with Artemis.', Stud Health Technol Inform, 23 rd Conference of the European Federation of Medical Informatics (MIE), IOS PRESS, Netherlands, pp. 115-119.
View/Download from: Publisher's site
View description>>
This paper describes the deployment of a platform to enable processing of currently uncharted high frequency, high fidelity, synchronous data from medical devices. Such a platform would support the next generation of informatics solutions for neonatal intensive care. We present Artemis, a platform for real-time enactment of clinical knowledge as it relates to multidimensional data analysis and clinical research. Through specific deployment examples at two different neonatal intensive care units, we demonstrate that Artemis supports: 1) instantiation of clinical rules; 2) multidimensional analysis; 3) distribution of services for critical care via cloud computing; and 4) accomplishing 1 through 3 using current technology without a negative impact on patient care.
Mearns, H, Leaney, J, Parakhine, A, Debenham, J & Verchere, D 1970, 'An Autonomic Open Marketplace for Inter-Cloud Service Management', 2011 Fourth IEEE International Conference on Utility and Cloud Computing, 2011 IEEE 4th International Conference on Utility and Cloud Computing (UCC 2011), IEEE, Melbourne, Australia, pp. 186-193.
View/Download from: Publisher's site
View description>>
The rise of utility in cloud computing and telecommunications has introduced greater complexity in the provisioning and performance management of remote services. We propose extended management strategies for this complexity. Our overall aim is for the management to accept responsibility for the complex service in an open marketplace. Responsibility is, firstly, defined by aiming to cover the totality of modern complex services, managing both the connectivity and virtual infrastructure. Secondly, responsibility is further defined as managing risk and resilience in the provisioning and operation of the complex service. With these aims, we are working towards a bundled service provider agent architecture, which can negotiate on the open service market. This approach aims to also optimise the utilisation of the providers infrastructure while reducing the risk of failure to users through total service management. We present the specification, design and simulation of the bundled service agents in a marketplace environment. © 2011 IEEE.
Mearns, H, Leaney, J, Parakhine, A, Debenham, J & Verchere, D 1970, 'An autonomic open marketplace for service management and resilience', 2011 7th International Conference on Network and Service Management, CNSM 2011, International Conference on Network and Service Management, IEEE, Paris, France, pp. 1-5.
View description>>
Expansion in telecommunications services, such as triple play and unified communications, introduces complexity that adversely affects service and network provisioning, especially in terms of provisioning times and the risk of delivery (failure) of new services. We envision a marketplace in which all manner of complex services will be provisioned, and their performance managed, especially against poor performance. The first phase of our work is a focus on the architecture, negotiation and management, which will lead to effective specification of network management requirements. We are working towards a bundled service agent architecture, which can negotiate on an open single service market, and which will eventually help to optimise the utilisation of the providers networks while reducing the risk of failure to users. Our work to date has been on the specification, behaviour, service definition and simulation of service agents for bundled service delivery. © 2011 IFIP.
Mehboob, Z, Zowghi, D & Lowe, D 1970, 'A process model of change impact analysis for web systems using design knowledge', Proceedings of the European, Mediterranean and Middle Eastern Conference on Information Systems - Informing Responsible Management: Sustainability in Emerging Economies, EMCIS 2011, European, Mediterranean and Middle Eastern Conference on Information Systems, EMCIS, Athens, Greece, pp. 582-595.
View description>>
Change impact analysis (CIA) approaches have been developed to identify the consequences of making changes to system artefacts and to support decision making with regards to those changes. There is a growing body of research on CIA approaches that specifically addresses changes and their impacts on architecture design. However, there is little research focus on approaches that particularly support the identification of impacts on architecture design resulting from business process changes i.e. early identification of change impacts in Web systems. In this paper we propose a process model of CIA(PMCIA) that employs design knowledge to support early identification of change impacts. This process model is described in three steps including analysing changes, tracing potential change impacts and implementing changes on architecture design. We also illustrate the process model through an exemplar case study.
Merigo, JM 1970, 'A Unified Model for Fuzzy Aggregation Operators and its Application in Group Decision Making', Proceedings of the 7th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-2011), 7th conference of the European Society for Fuzzy Logic and Technology, Atlantis Press, Aix-les-Bains, FRANCE, pp. 965-972.
View/Download from: Publisher's site
Merigo, JM 1970, 'Decision making with probabilities, weighted averages and OWA operators', 2011 IEEE Symposium on Foundations of Computational Intelligence (FOCI), 2011 Ieee Symposium On Foundations Of Computational Intelligence - Part Of 17273 - 2011 Sscifo, IEEE, pp. 122-129.
View/Download from: Publisher's site
View description>>
We develop a new method for decision making based on the use of probabilities, weighted averages and ordered weighted averaging (OWA) operators. We analyze a method that it is able to deal with several aggregation structures thus obtaining a more general formulation that represents the information in a more complete way. We introduce a new aggregation operator that aggregates a wide range of other aggregation operators. Therefore, we can include in the same formulation a wide range of concepts and representing how relevant they are in the aggregation. We call it the unified aggregation operator. By using this aggregation operator we can deal with a wide range of complex structures, for example, we can aggregate in a decision making problem several structures of probabilities, weighted averages and OWA operators. Thus, the information we provide is more complete because in real world problems the information comes from different sources and this needs to be considered in the aggregation process. We study the applicability of this new approach and we see that it is very broad because real world problems are better assessed with this new model. We focus on a multi-person decision making example where we use several structures of probabilities, weighted averages and OWA operators, thus representing the subjective and the objective information and the attitudinal character in a more complete way. © 2011 IEEE.
Merigo, JM & Casanovas, M 1970, 'FUZZY GROUP DECISION MAKING IN RESEARCH MANAGEMENT', EDULEARN11: 3RD INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 3rd International Conference on Education and New Learning Technologies (EDULEARN), IATED-INT ASSOC TECHNOLOGY EDUCATION & DEVELOPMENT, Barcelona, SPAIN, pp. 6057-6064.
Merigo, JM & Casanovas, M 1970, 'The Uncertain Generalized Probabilistic Weighted Average and its Application in the Theory of Expertons', Proceedings of the 7th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-2011), 7th conference of the European Society for Fuzzy Logic and Technology, Atlantis Press, Aix-les-Bains, FRANCE, pp. 852-859.
View/Download from: Publisher's site
Merigo, JM & Gil-Lafuente, AM 1970, 'Financial decision making with distance measures and induced probabilistic generalized aggregation operators', 2011 IEEE Symposium on Computational Intelligence for Financial Engineering and Economics (CIFEr), Economics -Part Of 17273 - 2011 Ssci, IEEE, pp. 116-123.
View/Download from: Publisher's site
View description>>
We develop a new financial decision making approach by using induced and probabilistic generalized aggregation operators. We introduce the induced generalized probabilistic ordered weighted averaging distance (IGPOWAD) operator and some of its main properties. Its main advantage is that it uses distance measures in a unified framework between the probability and the OWA operator where we can consider the degree of importance of each concept in the aggregation. Moreover, it also uses order-inducing variables that represent complex reordering processes in the aggregation. We develop an application of this new approach in a financial multi-person decision making problem regarding the selection of financial strategies. We see that the opinion of several experts provides more robust information for the decision maker. © 2011 IEEE.
Merigo, JM, Lopez-Jurado, P & Carmen Gracia, M 1970, 'MAKING DECISIONS IN EDUCATIONAL MANAGEMENT WITH PROBABILISTIC AND IMPRECISE INFORMATION', EDULEARN11: 3RD INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 3rd International Conference on Education and New Learning Technologies (EDULEARN), IATED-INT ASSOC TECHNOLOGY EDUCATION & DEVELOPMENT, Barcelona, SPAIN, pp. 6041-6051.
Milne, DN & Witten, IH 1970, 'A link-based visual search engine for Wikipedia', Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries, JCDL '11: Joint Conference on Digital Libraries, ACM, pp. 223-226.
View/Download from: Publisher's site
View description>>
This paper introduces HMpara, a new search engine that aims to make Wikipedia easier to explore. It works on top of the encyclopedia's existing link structure, abstracting away from document content and allowing users to navigate the resource at a higher level. It utilizes semantic relatedness measures to emphasize articles and connections that are most likely to be of interest, visualization to expose the structure of how the available information is organized, and lightweight information extraction to explain itself. © 2011 ACM.
Milne, DN & Witten, IH 1970, 'Exploring Wikipedia with HMpara', Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries, JCDL '11: Joint Conference on Digital Libraries, ACM, pp. 453-454.
View/Download from: Publisher's site
Munro, WJ, Devitt, SJ & Nemoto, K 1970, 'Designing quantum repeaters and networks', SPIE Proceedings, SPIE Optical Engineering + Applications, SPIE, San Diego, CA.
View/Download from: Publisher's site
Munro, WJ, Devitt, SJ, Stephens, AM, Nemoto, K, Ralph, T & Lam, PK 1970, 'High Bandwidth Quantum Communication', AIP Conference Proceedings, QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC): The Tenth International Conference, AIP, Brisbane, AUSTRALIA.
View/Download from: Publisher's site
Munro, WJ, Stephens, AM, Devitt, SJ & Nemoto, K 1970, 'Quantum communication without memories or shared entanglement', Optics InfoBase Conference Papers, pp. 413-414.
View description>>
Long-range quantum communication and its associated repeater network are a necessity for any future quantum Internet. The performance of such networks is currently limited by the time it takes to establish entangled links between the appropriate parties on the network. Typically this scales as the round trip time for a signal to be transmitted between those parties. We present in this talk the design of a communications network for the direct transfer of quantum information where the rate at which quantum data can be transmitted is not limited by the distance the information needs to be sent but instead by the time to perform efficient local gate operations. Our scheme requires neither the establishment of entanglement between communication nodes nor the use of long-lived quantum memories. Our scheme thus provides a much higher communications rate than in standard teleportation based schemes. © 2011 AOS.
Navarro, KF, Lawrence, E, Marin, JAG & Sax, C 1970, 'A Dynamic and Customisable Layered Serious Game Design Framework for Improving the Physical and Mental Health of the Aged and the Infirm', PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON EHEALTH, TELEMEDICINE, AND SOCIAL MEDICINE (ETELEMED 2011), 3rd International Conference on eHealth, Telemedicine, and Social Medicine (eTELEMED), IARIA XPS PRESS, Gosier, FRANCE, pp. 140-145.
View description>>
This paper proposes a dynamic and customizable layered serious game design framework for improving the physical and mental health of the aged after presenting the results obtained from a study with mainstream and alternative/complimentary health professionals concerning the usage of interactive games as a tool to improve both physical and mental well-being of the elderly. This study reports on the commonality of design and health factors regarding the usability of video games for the aged to ensure the elderly benefit from traditional and alternative healthcare professionalsâ perspectives.
Nayyar, A, Bashir, F & Ubaid-UR-Rehman 1970, 'Load based energy aware multimedia routing protocol-(LEAR)', 2011 3rd International Conference on Computer Research and Development, 2011 3rd International Conference on Computer Research and Development (ICCRD), IEEE.
View/Download from: Publisher's site
Nayyar, A, Bashir, F, Ubaid-UR-Rehman & Hamid, Z 1970, 'Intelligent routing protocol for Multimedia Sensor networks', ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia, 2011 International Conference on IT and Multimedia (ICIM), IEEE.
View/Download from: Publisher's site
Pala, O & Cetindamar, D 1970, 'Sculpting an organisational field', PICMET: Portland International Center for Management of Engineering and Technology, Proceedings, Portland International Center for Management of Engineering and Technology (PICMET) Conference on Technology Management in the Energy-Smart World, IEEE, Portland, OR.
View description>>
Organisational fields in the aggregate constitute a recognized area of institutional life. In Turkey, Sabanci University (SU) has shaped the emerging organisational field of technology-based academic entrepreneurship significantly. SU has founded the second technology transfer office, Research and Graduate Policy Directorate (RGP), in Turkey. In essence, RGP acts as an interface between academic and the business world according the demands of the business world with the research of the academic world. However, RGP goes further and founds the first technology commercialisation company, Inovent, providing business view to researchers and help them get patents, found companies, and transfer their knowledge to business world. Furthermore, Golden Horn Ventures, second venture capital firm spins-out from Inovent. Subsequently, other universities started founding technology transfer offices and companies like Inovent. Overall, this paper is an explorative research, which will provide the detailed case of the shaping of an organisational field in a developing country by a dominant actor. In other words, the role of SU in creating technology-based academic entrepreneurship in Turkey. © 2011 IEEE.
Papapetrou, O & Chen, L 1970, 'XStreamCluster: An Efficient Algorithm for Streaming XML Data Clustering', Lecture Notes in Computer Science: Database Systems for Advanced Applications 16th International Conference, DASFAA 2011, Database Systems for Advanced Applications, Springer Berlin Heidelberg, Hongkong, China, pp. 496-510.
View/Download from: Publisher's site
View description>>
XML clustering finds many applications, ranging from storage to query processing. However, existing clustering algorithms focus on static XML collections, whereas modern information systems frequently deal with streaming XML data that needs to be processed online. Streaming XML clustering is a challenging task because of the high computational and space efficiency requirements implicated for online approaches. In this paper we propose XStreamCluster, which addresses the two challenges using a two-layered optimization. The bottom layer employs Bloom filters to encode the XML documents, providing a space-efficient solution to memory usage. The top layer is based on Locality Sensitive Hashing and contributes to the computational efficiency. The theoretical analysis shows that the approximate solution of XStreamCluster generates similarly good clusters as the exact solution, with high probability. The experimental results demonstrate that XStreamCluster improves both memory efficiency and computational time by at least an order of magnitude without affecting clustering quality, compared to its variants and a baseline approach.
Parvin, S & Hussain, FK 1970, 'Digital Signature-Based Secure Communication in Cognitive Radio Networks', 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, 2011 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), IEEE, Barcelona, Spain, pp. 230-235.
View/Download from: Publisher's site
View description>>
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. The unique characteristics of Cognitive Radio Networks (CRNs) make security more challenging. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for other conventional wireless networks. This work thus proposes digital signature-based secure communication for identifying efficient primary users in CRNs. The security analysis is analyzed to guarantee that the proposed approach achieves security proof. © 2011 IEEE.
Peng, D, Yi, S, Huo, H & Lu, J 1970, 'MTrust-S: A Multi-model Based Prototype System of Trust Management for Web Services', Springer Berlin Heidelberg, pp. 412-419.
View/Download from: Publisher's site
Pileggi, SF, Fernandez-Llatas, C & Meneu, T 1970, 'Evaluating Mobility Impact on Wireless Sensor Network', 2011 UkSim 13th International Conference on Computer Modelling and Simulation, 2011 UkSim 13th International Conference on Computer Modelling and Simulation (UKSim), IEEE, pp. 461-466.
View/Download from: Publisher's site
View description>>
An increasing number of applications based on Wireless Sensor Networks assume mobile environments(Mobile WSNs). Mobile WSNs propose several converging issues with Mobile Ad-hoc Networks (MANETs) but the peculiarities of their technology and application domain advise a specific theoretical analysis of mobility impact on network connectivity. Network performance depends by several factors; there is a clear relationship between overall performance and the efficiency of network mechanisms (e.g. topology control and routing) that are directly affected by network connectivity. The paper first proposes an evaluation of randomly deployed clustered WSNs in function of network size/density, topology and communication range. Then, the mobility impact on network connectivity is analyzed and evaluated extending the analysis to overlay configuration. This evaluation has an implicit relationship with mobile behaviors. In order to provide extended analysis capabilities, an analytic model for mobile behaviors is also proposed. All reported results were obtained through simulations according to a general approach, independent from routing protocols or any other domain specific mechanisms as well as by environmental conditions. © 2011 IEEE.
Pileggi, SF, Fernandez-Llatas, C & Traver, V 1970, 'Enabling semantic ecosystems among heterogeneous Cognitive Networks', KEOD 2011 - Proceedings of the International Conference on Knowledge Engineering and Ontology Development, International Conference on Knowledge Engineering and Ontology Development, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Univ Paris Est Creteil, Paris, FRANCE, pp. 487-492.
View description>>
Cognitive Networks working on large scale are object of an increasing interest by both the scientific and the commercial point of view in the context of several environments and domains. The natural convergence point for these heterogeneous disciplines is the need of a strong advanced technologic support that enables the generation of distributed observations on large scale as well as the intelligent process of obtained information. An approach based on the Semantic Sensor Web could be the key issue for enabling semantic ecosystems among heterogeneous Cognitive Networks.
Qiao, Y, Jayalal, SMN & Tang, B 1970, 'On isomorphism testing of groups with normal hall subgroups', Leibniz International Proceedings in Informatics, LIPIcs, 28th International Symposium on Theoretical Aspects of Computer Science (SATCS), SCHLOSS DAGSTUHL, LEIBNIZ CENTER INFORMATICS, Dortmund, GERMANY, pp. 567-578.
View/Download from: Publisher's site
View description>>
A normal Hall subgroup N of a group G is a normal subgroup with its order coprime with its index. Schur-Zassenhaus theorem states that every normal Hall subgroup has a complement subgroup, that is a set of coset representatives H which also forms a subgroup of G. In this paper, we present a framework to test isomorphism of groups with at least one normal Hall subgroup, when groups are given as multiplication tables. To establish the framework, we first observe that a proof of Schur-Zassenhaus theorem is constructive, and formulate a necessary and sufficient condition for testing isomorphism in terms of the associated actions of the semidirect products, and isomorphisms of the normal parts and complement parts. We then focus on the case when the normal subgroup is abelian. Utilizing basic facts of representation theory of finite groups and a technique by Le Gall in [9], we first get an efficient isomorphism testing algorithm when the complement has bounded number of generators. For the case when the complement subgroup is elementary abelian, which does not necessarily have bounded number of generators, we obtain a polynomial time isomorphism testing algorithm by reducing to generalized code isomorphism problem. A solution to the latter can be obtained by a mild extension of the singly exponential (in the number of coordinates) time algorithm for code isomorphism problem developed recently by Babai in [3]. Enroute to obtaining the above reduction, we study the following computational problem in representation theory of finite groups: given two representations ρ and τ of a group H over ℤdp, p a prime, determine if there exists an automorphism φ: H → H, such that the induced representation ρφ = ρ o φ and τ are equivalent, in time poly(|H|,pd). © Youming Qiao, Jayalal Sarma M.N., and Bangsheng Tang.
Ramezani, F & Lu, J 1970, 'A New Approach for Choosing the Most Appropriate Fuzzy Ranking Algorithm for Solving MADM Problems', AUTONOMOUS SYSTEMS: DEVELOPMENTS AND TRENDS, Workshop Autonomous Systems, Springer-Verlag Berlin / Heidelberg, Mallorca, Spain, pp. 13-24.
View/Download from: Publisher's site
View description>>
There are many fuzzy ranking algorithms available to solve multi-attribute decision making (MADM) problems. Some are more suitable than others for particular decision problems. This paper proposes a new method for choosing the most appropriate fuzzy ranking algorithm for solving MADM problems based on the type and number of attributes and the number of alternatives, considering the least time consumption and the least computation for ranking alternatives. In addition, we develop a software to simulate three main fuzzy ranking algorithms: SAW, Negi, and Chen and Hwang (Chen and Hwang 1992). This software can be used in any MADM decision support system.
Ramezani, F, Memariani, A & Lu, J 1970, 'A Dynamic Fuzzy Multi-criteria Group Decision Support System for Manager Selection', PRACTICAL APPLICATIONS OF INTELLIGENT SYSTEMS, International Conference on Intelligent Systems and Knowledge Engineering, Springer-Verlag Berlin / Heidelberg, Shanghai, China, pp. 265-+.
View/Download from: Publisher's site
View description>>
In any organization, because of the importance of management responsibility and its effect on efficiency improvement, the selection of the appropriate person as a manager is one of the important decision making subjects. This paper proposes a new fuzzy multiple attribute-based decision support system (DSS) for choosing suitable managers as such a selection may involve both quantitative and qualitative assessment attributes. There are many fuzzy ranking methods available to solve multi-attribute decision making (MADM) problems. Some are more suitable than other for particular decision problems. The proposed DSS has ability to choose the most appropriate fuzzy ranking method for solving given MADM problem, based on the type of attributes and the size of the problem, considering the least computation and time consumption for ranking alternatives. A DSS software prototype has been developed on the basis of the proposed DSS which can be applied for solving every FMADM problem which needs to rank some alternatives according to some attributes.
Rehman, ZU, Hussain, FK & Hussain, OK 1970, 'Towards Multi-criteria Cloud Service Selection', 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), IEEE, Seoul, South Korea, pp. 44-48.
View/Download from: Publisher's site
View description>>
Cloud computing despite being in an early stage of adoption is becoming a popular choice for businesses to replace in-house IT infrastructure due to its technological advantages such as elastic computing and cost benefits resulting from pay-as-you-go pricing and economy of scale. These factors have led to a rapid increase in both the number of cloud vendors and services on offer. Given that cloud services could be characterized using multiple criteria (cost, pricing policy, performance etc.) it is important to have a methodology for selecting cloud services based on multiple criteria. Additionally, the end user requirements might map to different criteria of the cloud services. This diversity in services and the number of available options have complicated the process of service and vendor selection for prospective cloud users and there is a need for a comprehensive methodology for cloud service selection. The existing research literature in cloud service selection is mostly concerned with comparison between similar services based on cost or performance benchmarks. In this paper we discuss and formalize the issue of cloud service selection in general and propose a multi-criteria cloud service selection methodology. © 2011 IEEE.
Saberi, M, Azadeh, A, Hezaveh, NK, Anvari, M, Pazhoheshfar, P & Behrouznia, A 1970, 'Performance assessment and optimization of decision making units with an integrated artificial neural network algorithm', 2011 IEEE 3rd International Conference on Communication Software and Networks, 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), IEEE, pp. 1-5.
View/Download from: Publisher's site
View description>>
This study proposes a non-parametric efficiency frontier analysis method based on artificial neural network (ANN) for measuring efficiency as a complementary tool for the common techniques of the efficiency studies in the previous studies. The proposed ANN algorithm is able to find a stochastic frontier based on a set of input-output observational data and do not require explicit assumptions about the functional structure of the stochastic frontier. Furthermore, it uses a similar approach to econometric methods for calculating the efficiency scores. Moreover, the effect of the return to scale of decision making unit (DMU) on its efficiency is included and the unit used for the correction is selected based on its scale (under constant return to scale assumption). However, the proposed algorithm is capable of handling outliers and noise. This is shown by two examples related to outlier situations. It is also capable of performing optimization analysis and forecasting for a given set of data. The proposed approach is applied to a set of actual conventional power plants to show its applicability and superiority. © 2011 IEEE.
Saberi, M, Azadeh, A, Nourmohammadzadeh, A & Pazhoheshfar, P 1970, 'Comparing performance and robustness of SVM and ANN for fault diagnosis in a centrifugal pump', MODSIM 2011 - 19th International Congress on Modelling and Simulation - Sustaining Our Future: Understanding and Living with Uncertainty, MSSANZ 19th Biennial Congress on Modelling and Simulation (MODSIM), MODELLING & SIMULATION SOC AUSTRALIA & NEW ZEALAND INC, Perth, AUSTRALIA, pp. 433-439.
View description>>
Fault detection and diagnosis has an effective role for the safe operation and long life of systems. Condition monitoring is an appropriate way of the maintenance techniques which is applicable in the fault diagnosis of rotating machinery faults. We considered the Support Vector Machine (SVM) method for classifying the condition of centrifugal pump into two types of faults through six features: flow, temperature, suction pressure, discharge pressure, velocity, and vibration. The SVM method is based on statistical learning theory (SLT) and powerful for the problem with small sampling, nonlinear and high dimension. (L.V. Ganyun et al 2005). The SVM classifying is implemented with 4 kernel functions and the results of them are compared. We use an Artificial Neural Network (ANN) as the second classifying method to have comparison among the performance of two methods. After applying the two methods to our data set we make the data set noisy and again we try our SVMs and ANN to compare their robustness in noisy conditions and the results obtained from two methods confirmed the superiority of SVM with some specific kernel functions.
Saberi, M, Azadeh, A, Tofighi, S & Pazhoheshfar, P 1970, 'An integrated neural network algorithm for optimum performance assessment of auto industry with multiple outputs and corrupted data and noise', IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society, IECON 2011 - 37th Annual Conference of IEEE Industrial Electronics, IEEE, Melbourne, AUSTRALIA, pp. 2323-2328.
View/Download from: Publisher's site
Santosa, H, Milton, J & Kennedy, PJ 1970, 'HMXT-GP', Proceedings of the 2011 ACM Symposium on Applied Computing, SAC'11: The 2011 ACM Symposium on Applied Computing, ACM, Taichung, Taiwan, pp. 1070-1075.
View/Download from: Publisher's site
View description>>
This paper applies a recent informationtheoretic approach to controlling Genetic Algorithms (GAs) called HMXT to treebased Genetic Programming (GP). HMXT, in a GA domain, requires the setting of selection thresholds in a population and the application of high levels of crossover to thoroughly mix alleles. Applying these in a treebased GP setting is not trivial. We present results comparing HMXT GP to Kozastyle GP for varying amounts of crossover and over three different optimisation (minimisation) problems. Results show that average fitness is better with HMXTGP because it maintains more diversity in populations, but that the minimum fitness found was better with Koza. HMXT allows straightforward tuning of population diversity and selection pressure by altering the position of the selection thresholds.
Sheard, J, Simon, Carbone, A, Chinn, D, Laakso, M-J, Clear, T, de Raadt, M, D'Souza, D, Harland, J, Lister, R, Philpott, A & Warburton, G 1970, 'Exploring programming assessment instruments', Proceedings of the seventh international workshop on Computing education research, ICER '11: International Computing Education Research Workshop, ACM, Providence, Rhode Island, USA, pp. 33-38.
View/Download from: Publisher's site
View description>>
This paper describes the development of a classification scheme that can be used to investigate the characteristics of introductory programming examinations. We describe the process of developing the scheme, explain its categories, and present a taste of the results of a pilot analysis of a set of CS1 exam papers. This study is part of a project that aims to investigate the nature and composition of formal examination instruments used in the summative assessment of introductory programming students, and the pedagogical intentions of the educators who construct these instruments.
Shen, J, Beydoun, G & Low, G 1970, 'An MAS-Based Implementation for Semantic Web Services Composition.', ISD, International Conference on Information Systems Development, Springer, Edinburgh, Scotland, pp. 231-241.
View/Download from: Publisher's site
Shen, J, Beydoun, G, Henderson-Sellers, B, Yuan, S & Low, G 1970, 'Towards Peer Selection in a Semantically-Enriched Service Execution Framework with QoS Specifications', PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 6th International Conference on Internet andWeb Applications and Services (ICIW) / 1st International Workshop on Enterprise Cloud Computing - Strategies and Solutions (ECCSS), IARIA XPS PRESS, St Maarten, NETHERLANDS, pp. 201-206.
View description>>
This paper promotes an ontology-based multi agent system (MAS) framework to facilitate Peer-to-Peer (P2P) service selection with multiple service properties. P2P-based service has emerged as an important new field in the distributed computing arena. It focuses on intensive service sharing, innovative applications and compositions, and, in some cases, high performance orientation. However, one of the remaining challenges for the P2P-based service composition process is how to effectively discover and select the most appropriate peers to execute the service applications when considering multiple properties of the requested services. By introducing an ontology, different ontology-based e-service profiles can be proposed to facilitate handling multiple properties and to enhance the service oriented process in order to achieve the total or partial automation of service discovery, selection and composition. In this paper, we present a conceptual framework for peer selection with a preliminary mathematical model and a selection process, so as to enhance the P2P-based service coordination system and its components.
Shen, J, Beydoun, G, Yuan, S & Low, G 1970, 'Comparison of Bio-inspired Algorithms for Peer Selection in Services Composition.', IEEE SCC, IEEE International Conference on Services Computing, IEEE Computer Society, Washington, DC, USA, pp. 250-257.
View/Download from: Publisher's site
View description>>
One of the challenges for the P2P-based service composition process is how to effectively discover and select the most appropriate peers to execute the service applications when considering multiple properties of the requested services. Different ontology-based e-service profiles have been proposed to facilitate handling multiple properties and to enhance the service oriented process in order to achieve the total or partial automation of service discovery, selection and composition. This paper investigates how the ACO (Ant Colony Optimisation) algorithm and the GA (Genetic Algorithm) may facilitate P2P-based (Peer-to-Peer) service selection with multiple service properties. The performance of both algorithms is evaluated and compared statistically using a pooled t-test for 30 randomly generated composition scenarios. Our experimental results show that both algorithms can improve the quality of service composition, while showing that the ACO approach is the more effective. © 2011 IEEE.
Smith, A, Reitsma, L, van den Hoven, E, Kotze, P & Coetzee, L 1970, 'Towards Preserving Indigenous Oral Stories Using Tangible Objects', 2011 Second International Conference on Culture and Computing, 2011 Second International Conference on Culture and Computing (Culture Computing), IEEE, Kyoto, Japan, pp. 86-91.
View/Download from: Publisher's site
View description>>
Handcrafted beadwork produced by the BaNtwane people of South Africa is loaded with meaning. Communicating indigenous oral stories is important for passing on culture-specific traditions and community memory, such as the meaning of the handcrafted beadwork. Oral stories are told within the physical confines of the community. The community we focus on in this paper suffers from younger generations moving away physically, start preferring the English language over their mother tongue and digital over oral communication, and therefore this co-located storytelling process is interrupted. As part of the StoryBeads project we have created an interactive system that incorporates a combination of physical objects and modern technology for recording and replaying oral stories that can help preserve the meaning of the handcrafted beadwork of the BaNtwane people.
Sohaib, O, Hussain, W, Ahmed, A & Khattak, BS 1970, 'Understanding Context- aware Architectures for Ubiquitous Environment', FUTURE INFORMATION TECHNOLOGY, International Conference on Future Information Technology (ICFIT 2011), INT ASSOC COMPUTER SCIENCE & INFORMATION TECHNOLOGY PRESS-IACSIT PRESS, Singapore, SINGAPORE, pp. 154-158.
Speelpenning, T, Antle, AN, Doering, T & van den Hoven, E 1970, 'Exploring How Tangible Tools Enable Collaboration in a Multi-touch Tabletop Game', Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction, IFIP TC13 Conference on Human-Computer Interaction, Springer Berlin Heidelberg, Lisbon, Portugal, pp. 605-621.
View/Download from: Publisher's site
View description>>
Digital tabletop surfaces afford multiple user interaction and collaboration. Hybrid tabletops that include both tangible and multi-touch elements are increasingly being deployed in public settings (e.g. Microsoft Surface, reacTable). Designers need to understand how the different characteristics of tangible and multi-touch interface elements affect collaborative activity on tabletops. In this paper, we report on a mixed methods exploratory study of a collaborative tabletop game about sustainable development. We explore the effects of tangible and multi-touch tools on collaborative activity. Forty-five participants, in trios, played the game using both versions of the tools. Our analysis includes quantitative performance measures, qualitative themes and behavioral measures. Findings suggest that both tangible and multi-touch tools enabled effective tool use and that collaborative activity was more influenced by group dynamics than tool modality. However, we observed that the physicality of the tangible tools facilitated individual ownership and announcement of tool use, which in turn supported group and tool awareness.
Talaei-Khoei, A, Ray, P, Parameswaran, N & Beydoun, G 1970, 'Modeling Awareness of Agents using Policies.', ICSOFT (2), International Conference on Software and Data Technologies, SciTePress, Seville, Spain, pp. 353-358.
View description>>
In addition to cooperation, research in disaster management exposes the need for policy awareness to recognize relevant information in enhancing cooperation. Intelligent software agents have previously been employed for problem solving in disaster situations but without incorporating how the agents can create or model awareness. This paper presents an awareness based modelling method, called MAAP, to maintain awareness of software agents of a given set of policies. The paper presents preliminary results indicating that the use of policies as a source of awareness, as facilitated by MAAP, is a potentially effective method to enhance cooperation.
Tan, CT & Johnston, A 1970, 'Towards a nondisruptive, practical, and objective automated playtesting process', Artificial Intelligence in the Game Design Process - Papers from the 2011 AIIDE Workshop, Artificial Intelligence in the Game Design Process, AAAI Press, Stanford, USA, pp. 25-28.
View description>>
Playtesting is the primary process that allows a game designer to access game quality. Current playtesting methods are often intrusive to play, involves much manual labor, and might not even portray the player's true feedback. This paper aims to alleviate these shortcomings by presenting the position that state of the art artificial intelligence techniques can construct automated playtesting systems that supplement or even substitute this process to a certain extent. Several potential research directions are proposed in this theme. A work-inprogress report is also included to demonstrate the conceptual feasibility of the potentials of this research area. © 2011, Association for the Advancement of Artificial Intelligence.
Thapngam, T, Yu, S, Zhou, W & Beliakov, G 1970, 'Discriminating DDoS attack traffic from flash crowd through packet arrival patterns', 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE INFOCOM 2011 - IEEE Conference on Computer Communications Workshops, IEEE, pp. 952-957.
View/Download from: Publisher's site
View description>>
Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission strategies and various forms of attack packets to beat defense systems. These problems lead to defense systems requiring various detection methods in order to identify attacks. Moreover, DDoS attacks can mix their traffics during flash crowds. By doing this, the complex defense system cannot detect the attack traffic in time. In this paper, we propose a behavior based detection that can discriminate DDoS attack traffic from traffic generated by real users. By using Pearson's correlation coefficient, our comparable detection methods can extract the repeatable features of the packet arrivals. The extensive simulations were tested for the accuracy of detection. We then performed experiments with several datasets and our results affirm that the proposed method can differentiate traffic of an attack source from legitimate traffic with a quick response. We also discuss approaches to improve our proposed methods at the conclusion of this paper. © 2011 IEEE.
Valipour, M, Shabibi, SA, Saberi, M & Azadeh, A 1970, 'Improving the performance of artificial immune system in estimation problems with normalization technique: A case study of USA, Japan and France electricity consumption', 2011 IEEE 9th International Symposium on Applied Machine Intelligence and Informatics (SAMI), 2011 IEEE 9th International Symposium on Applied Machine Intelligence and Informatics (SAMI), IEEE, pp. 137-141.
View/Download from: Publisher's site
View description>>
This paper presents an artificial immune system (AIS) for electricity consumption estimation as a common problem in estimation domain. We study the impact of data normalization on artificial immune system (AIS) performance and two hundred AIS are constructed for this. Also, fifty AIS have been constructed and tested in order to finding best AIS for electricity consumption estimation in each case. Another unique feature of this study is the utilization of AIS in estimation domain and especially in electricity consumption estimation as the first time. Two standard inputs are used in order to training and testing developed AIS. The mentioned input parameters are gross domestic product (GDP) and population (POP). All of trained AIS are then compared with respect to mean absolute percentage error (MAPE). To meet the best performance of the intelligent based approaches, data are normalized. To show the applicability and superiority of the AIS, actual electricity consumption in USA, Japan and France from 1980 to 2007 is considered. © 2011 IEEE.
Vamplew, P, Stranieri, A, Ong, K, Christen, P & Kennedy, PJ 1970, 'Data Mining and Analytics 2011 (AusDM'11)', Proceedings of the Ninth Australasian Data Mining Conference (AusDM'11), Ninth Australasian Data Mining Conference, Australian Computer Society, Ballarat, Australia, pp. i-229.
View description>>
We are delighted to welcome you to the Ninth Australasian Data Mining Conference (AusDM'11) being held this year in Ballarat, Victoria. AusDM started in 2002 and is now the annual flagship meeting for data mining and analytics professionals in Australia. Both scholars and practitioners present the state-of-the-art in the field. Endorsed by the peak professional body, the Institute of Analytics Professionals of Australia, AusDM has developed a unique profile in nurturing this joint community. The conference series has grown in size each year from early events held in Canberra (2002, 2003), Cairns (2004), Sydney (2005, 2006), the Gold Coast (2007), Glenelg (2008) and Melbourne (2009).
van Erve, D, Vos, G-W, van den Hoven, E & Frohlich, D 1970, 'Cueing the past', Procedings of the Second Conference on Creativity and Innovation in Design, DESIRE '11: Creativity and Innovation in Design, ACM, Eindhoven, The Netherlands, pp. 335-345.
View/Download from: Publisher's site
View description>>
Embodied interaction describes how meaning in interaction is created through engagement. With this approach as a source of inspiration for three exploratory design cases this paper explores the possibilities of embodied interaction in storing, retrieving and enriching everyday memories. Following the principles of designing for embodiment, all three design cases aim at cueing memories through visual modalities like photo and video. We discuss these case studies in light of the embodied interaction and memory theory. Our findings indicate that everyday remembering may be a suitable application area for combining it with embodied interaction, because of its abstract and personal nature.
Van, A, Gay, V, Kennedy, PJ, Barin, E & Leijdekkers, P 1970, 'Understanding risk factors in cardiac rehabilitation patients with random forests and decision trees.', AusDM, Australian Data Mining Conference, Australian Computer Society, Ballarat, Australia, pp. 11-22.
Wakefield, JA, Frawley, JK, Dyson, LE, Tyler, JV & Litchfield, AJ 1970, 'Increasing Student Engagement and Performance in Introductory Accounting through Student-Generated Screencasts', AFAANZ Conference, Accounting and Finance Association of Australia and New Zealand Conference, AFAANZ, Darwin, Australia, pp. 1-27.
View description>>
The paper reports the findings of a trial of student generated screencasts in an introductory accounting subject. This paper examines the effect of this screencast project on student engagement and performance. The effect on student engagement is examined using data from a pre and post screencast project student survey and performance effects examined by analysing the performance of students completing and not completing the project. The results of the study suggest the screencast project facilitated higher student engagement and performance. These findings have important implications for integrating technologies such as screencasting to facilitate enhanced learning outcomes in introductory accounting subjects.
Wang, X, Wang, Z & Xu, X 1970, 'Price Heuristics for Highly Efficient Profit Optimization of Service Composition', 2011 IEEE International Conference on Services Computing, 2011 IEEE International Conference on Services Computing (SCC), IEEE, pp. 378-385.
View/Download from: Publisher's site
View description>>
Service composition follows a three-party paradigm, i.e., a broker mediates between service providers and service consumers to properly select and compose a set of distributed services together so that requirements raised by consumers are satisfied by the composite service on demand. As the de facto provider of composite services, the broker charges the consumers; on the other hand, it awards cost to the providers whose services are involved in the composite services. Besides traditional quality-oriented optimization from the consumers' point of view, the profit that a broker could earn from the composition is another objective to be optimized. But just as the quality optimization, service selection for profit optimization suffers from dramatic efficiency decline along with the growth in the number of candidate services. On the premise that the expected quality are guaranteed, this paper presents a "divide and select" approach for high-efficiency profit optimization, with price as heuristics. This approach can be applied to both static and dynamic pricing scenarios of service composition. Experiments demonstrate the feasibility. © 2011 IEEE.
Wang, X, Wang, Z & Xu, X 1970, 'Semi-empirical Service Composition: A Clustering Based Approach', 2011 IEEE International Conference on Web Services, 2011 IEEE International Conference on Web Services (ICWS), IEEE, pp. 219-226.
View/Download from: Publisher's site
View description>>
Service composition has the capability of constructing coarse-grained solutions by dynamically aggregating a set of services to satisfy complex requirements, but it suffers from dramatic decrease on the efficiency of determining the best composition solution when large scale candidate services are available. Most current approaches look for the optimal composition solution by real-time computation, and the composition efficiency greatly depends on the adopted algorithms. To eliminate such deficiency, this paper proposes a semi-empirical composition approach which incorporates two stages, i.e., periodical clustering and real-time composition. The former partitions the candidate services and historical requirements into clusters based on similarity measurement, and then the probabilistic correspondences between service clusters and requirement clusters are identified by statistical analysis. The latter deals with a new requirement by firstly finding its most similar requirement cluster and the corresponding service clusters by leveraging Bayesian inference, then a set of concrete services are optimally selected from such reduced solution space and constitute the final composition solution. Instead of relying on solely historical data exploration or on pure real-time computation, our approach distinguishes from traditional methods by combining the two perspectives together. Experiments demonstrate the advantages of this approach. © 2011 IEEE.
Wei Xiong, Bo Liu & Lin Gui 1970, 'Neighbor Discovery with Directional Antennas in Mobile Ad-Hoc Networks', 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011, 2011 IEEE Global Communications Conference (GLOBECOM 2011), IEEE.
View/Download from: Publisher's site
View description>>
Directional antennas offer great performance improvement for mobile ad hoc networks, but this improvement requires new mechanisms at medium access and networking layer. One of the most important protocols is neighbor discovery aiming at setting up links between nodes and their neighbors. This paper proposes a mathematical framework of a scan-based algorithm (SBA) for neighbor discovery, taking into account the case that more than one node exist in one directional beam. The analysis adopts detailed model for the discovery process and derives expression for the average number of slots required to discover all the neighbor nodes. Numerical results indicate the superiority of the proposed model. © 2011 IEEE.
Wei, B, Jin, Z & Zowghi, D 1970, 'An Automatic Reasoning Mechanism for NFR Goal Models', 2011 Fifth International Conference on Theoretical Aspects of Software Engineering, 2011 IEEE 5th International Symposium on Theoretical Aspects of Software Engineering (TASE), IEEE, Xian, China, pp. 52-59.
View/Download from: Publisher's site
View description>>
Software requirements, especially non-functional requirements, are considered as vital prerequisites for producing software of high quality. As widely accepted, non-functional goal modeling like the NFR Framework usually employs tree modeling style, and presents an interactive process for the analysis of nonfunctional requirements. However, there still exist some problems during the identification of satisficing status. This paper based on the popular NFR goal model reasoning manners, clearly distinguishes the closed world assumption and the open world assumption, and proposes an automatic reasoning mechanism for NFR goal models in order to identify the satisficing statuses of the goal tree roots according to leavesâ contributions. Under a specific assumption, goalsâ satisficing statuses will be transformed to affect satisficing statuses of their parents. Then parentsâ satisficing statuses will be inferred according to the reasoning rules derived from different decomposition relationships. By alternately adopting these two steps, goal tree rootâs satisficing status can be identified layer by layer. An illustrative example is used to show how our proposed formal approach works.
Wei, B, Yin, B, Jin, Z & Zowghi, D 1970, 'rΣ: Automated reasoning tool for non-functional requirement goal models', 2011 IEEE 19th International Requirements Engineering Conference, 2011 IEEE 19th International Requirements Engineering Conference (RE), IEEE, Trento, Italy, pp. 337-338.
View/Download from: Publisher's site
View description>>
Reasoning is critical for non-functional requirements (NFRs) analysis and verification. Furthermore, it can provide rationale about implementation strategies for NFRs. The existing tools can execute an interactive reasoning process which sometimes needs extra information from stakeholders. We build a tool called rΣ for reasoning on NFR models especially when extra information is unavailable or forbidden, like at the model verification stage. This tool employs the formula style model as the input, automatically promotes the reasoning process till the root node, and returns all the satisficing statuses and the complete rationale as the output. We have applied rΣ into the real practice and to evaluate its efficiency.
Wijnen, J & van den Hoven, E 1970, 'Connected sketchbook', Procedings of the Second Conference on Creativity and Innovation in Design, DESIRE '11: Creativity and Innovation in Design, ACM, Eindhoven, The Netherlands, pp. 43-46.
View/Download from: Publisher's site
View description>>
A lot of designers carry around sketchbooks, also called design journals, to record everyday inspirations. This paper describes a concept in which digital files are connected to specific pages of such a physical sketchbook. This way initial notes, drawings or other types of recordings can be united with their digital equivalents, related files or end results (like digital drawings and presentations). Our informal user evaluation points out that indicating file types is preferred over indicating number of files, since it helps users to recollect the digital files that are related to the work described on the physical pages.
Wu, Z, Xu, G, Pan, R, Zhang, Y, Hu, Z & Lu, J 1970, 'Leveraging Wikipedia concept and category information to enhance contextual advertising', Proceedings of the 20th ACM international conference on Information and knowledge management, CIKM '11: International Conference on Information and Knowledge Management, ACM, Glasgow, Scotland, UK, pp. 2105-2108.
View/Download from: Publisher's site
Xu, G, Gu, Y, Dolog, P, Zhang, Y & Kitsuregawa, M 1970, 'SemRec: A semantic enhancement framework for tag based recommendation', Proceedings of the National Conference on Artificial Intelligence, AAAI Conference on Artificial Intelligence, AAAI Press, San Francisco, California, pp. 1267-1272.
View description>>
Collaborative tagging services provided by various social web sites become popular means to mark web resources for different purposes such as categorization, expression of a preference and so on. However, the tags are of syntactic nature, in a free style and do not reflect semantics, resulting in the problems of redundancy, ambiguity and less semantics. Current tag-based recommender systems mainly take the explicit structural information among users, resources and tags into consideration, while neglecting the important implicit semantic relationships hidden in tagging data. In this study, we propose a Semantic Enhancement Recommendation strategy (SemRec), based on both structural information and semantic information through a unified fusion model. Extensive experiments conducted on two real datasets demonstrate the effectiveness of our approaches. Copyright © 2011, Association for the Advancement of Artificial Intelligence. All rights reserved.
Xu, G, Gu, Y, Zhang, Y, Yang, Z & Kitsuregawa, M 1970, 'TOAST: A Topic-Oriented Tag-Based Recommender System', Web Information Systems Engineering - Wise 2011, 12th International Conference on Web Information Systems Engineering (WISE 2011), Springer Berlin Heidelberg, Sydney, AUSTRALIA, pp. 158-171.
View/Download from: Publisher's site
View description>>
Social Annotation Systems have emerged as a popular application with the advance of Web 2.0 technologies. Tags generated by users using arbitrary words to express their own opinions and perceptions on various resources provide a new intermediate dimensio
Xu, G, Lee, W, Chen, L & Chen, L 1970, 'Message from CSN 2011 Workshop Co-chairs', 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE.
View/Download from: Publisher's site
Xu, G, Zong, Y, Pan, R, Dolog, P & Jin, P 1970, 'On Kernel Information Propagation for Tag Clustering in Social Annotation Systems', Knowlege-Based and Intelligent Information and Engineering Systems Lecture Notes in Computer Science, International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Kaiserslautern, Germany, pp. 505-514.
View/Download from: Publisher's site
View description>>
In social annotation systems, users label digital resources by using tags which are freely chosen textual descriptors. Tags are used to index, annotate and retrieve resource as an additional metadata of re- source. Poor retrieval performance remains a major challenge of most social annotation systems resulting from the severe problems of ambigu- ity, redundancy and less semantic nature of tags. Clustering method is a useful approach to handle these problems in the social annotation sys- tems. In this paper, we propose a novel clustering algorithm named kernel information propagation for tag clustering. This approach makes use of the kernel density estimation of the KNN neighbor directed graph as a start to reveal the prestige rank of tags in tagging data. The random walk with restart algorithm is then employed to determine the center points of tag clusters. The main strength of the proposed approach is the capability of partitioning tags from the perspective of tag prestige rank rather than the intuitive similarity calculation itself. Experimental studies on three real world datasets demonstrate the effectiveness and superiority of the proposed method.
Ye, D, Zhang, M & Bai, Q 1970, 'A Composite Self-organisation Mechanism in an Agent Network', WEB INFORMATION SYSTEMS ENGINEERING - WISE 2011, 12th International Conference on Web Information Systems Engineering (WISE 2011), Springer Berlin Heidelberg, Sydney, AUSTRALIA, pp. 249-256.
View/Download from: Publisher's site
Yu, JX, Lei Chen, Sakr, S & Lei Zou 1970, 'Preface', 2011 IEEE 27th International Conference on Data Engineering Workshops, 2011 IEEE International Conference on Data Engineering Workshops (ICDEW), IEEE, p. 87.
View/Download from: Publisher's site
View description>>
Recently, there has been a lot of interest in the application of graphs in different domains. They have been widely used for data modeling of different application domains such as chemical compounds, multimedia databases, protein networks, social networks and semantic web. With the continued emergence and increase of massive and complex structural graph data, a graph database that efficiently supports elementary data management mechanisms is crucially required to effectively understand and utilize any collection of graphs. This workshop focuses on issues related to graph databases. GDM 2011 will be held in conjunction with the IEEE International Conference on Data Engineering (ICDE 2011) in Hannover, Germany. GDM 2011 aims at bringing together researchers in different fields related to graph databases who have common interests in interdisciplinary research. The workshop provides a forum where researchers and practitioners can share and exchange their knowledge and experience. © 2011 IEEE.
Yu, PS, Fan, W, Nejdl, W, Chen, L, Sun, A, Simovici, D, Baralis, E, Nguifo, EM, Xu, G, Yin, J, Ceci, M, Cortez, P, Christen, P, Berka, P, Alves, R, Xu, S, Elomaa, T, Kosters, W, Graco, W, Wang, W, Balke, WT & Zhao, Y 1970, 'Preface to the Workshop on Domain Driven Data Mining', 2011 IEEE 11th International Conference on Data Mining Workshops, 2011 IEEE International Conference on Data Mining Workshops (ICDMW), IEEE.
View/Download from: Publisher's site
Yu, S, Guofeng Zhao, Song Guo, Yang Xiang & Vasilakos, AV 1970, 'Browsing behavior mimicking attacks on popular web sites for large botnets', 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE INFOCOM 2011 - IEEE Conference on Computer Communications Workshops, IEEE, pp. 947-951.
View/Download from: Publisher's site
View description>>
With the significant growth of botnets, application layer DDoS attacks are much easier to launch using large botnet, and false negative is always a problem for intrusion detection systems in real practice. In this paper, we propose a novel application layer DDoS attack tool, which mimics human browsing behavior following three statistical distributions, the Zipf-like distribution for web page popularity, the Pareto distribution for page request time interval for an individual browser, and the inverse Gaussian distribution for length of browsing path. A Markov model is established for individual bot to generate attack request traffic. Our experiments indicated that the attack traffic that generated by the proposed tool is pretty similar to the real traffic. As a result, the current statistics based detection algorithms will result high false negative rate in general. In order to counter this kind of attacks, we discussed a few preliminary solutions at the end of this paper. © 2011 IEEE.
Zawawi, RA, Akpolat, H & Bagia, R 1970, 'Managing Knowledge in Aircraft Engineering', The 3rd International Conference on Logistics and Transport & 4th International Conference on Operations and Supply Chain Management, 3rd ICLT 2011 & 4th OSCM 2011 'Creating the Future Logistics and Supply Chain in the Asia-Pacific Region', UP Organizer and Publication Co., Ltd., Male, Maldives, pp. 1027-1034.
Zawawi, RA, Akpolat, H & Bagia, R 1970, 'Operations-Based Knowledge Management', 2nd International Conference on Industrial Engineering and Operations Management (IEOM 2011), International Conference on Industrial Engineering and Operations Management, IEOM Research Solutions Pty Ltd, Kuala Lumpur, Malaysia, pp. 164-169.
View description>>
This paper is about knowledge management (KM) in Aircraft Engineering (AE). This industry is highly technology dependant; thus, enhanced KM in AE is a key success factor. This paper analyses KM literature, and offers insights into the existing KM practices in AE using a case study in the Saudi Arabian Aviation industry (SAAI). The KM practices were ascertained by interviewing senior aircraft engineers as well as through observations during one of the author's 6-year employment as aircraft engineer in the SAAI. Synthesis of these results with the KM literature identified gaps between the KM theory and current practices in AE. Finally, an operations-based knowledge management (OBKM) system framework was developed to address these gaps and overcome ineffectiveness in current practices.
Zeng, D, Guo, S, Jin, H & Yu, S 1970, 'On the maximum throughput of two-hop wireless network coding', 2011 IEEE Wireless Communications and Networking Conference, 2011 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, Cancun, MEXICO, pp. 416-421.
View/Download from: Publisher's site
Zhang, L, Yu, S, Wu, D & Watters, P 1970, 'A Survey on Latest Botnet Attack and Defense', 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, Changsha, PEOPLES R CHINA, pp. 53-60.
View/Download from: Publisher's site
Zong, Y, Xu, G, Jin, P, Dolog, P & Jiang, S 1970, 'A Local Information Passing Clustering Algorithm for Tagging Systems', Database Systems for Adanced Applications, Lecture Notes in Computer Science, Database Systems for Advanced Applications, Springer Berlin Heidelberg, Hong Kong, China, pp. 333-343.
View/Download from: Publisher's site
View description>>
Under social tagging systems, a typical Web2.0 application, users label digital data sources by using tags which are freely chosen textual descriptions. Tags are used to index, annotate and retrieve resource as an additional metadata of resource. Poor retrieval performance remains a major problem of most social tagging systems resulting from the severe difficulty of ambiguity, redundancy and less semantic nature of tags. Clustering method is a useful tool to increase the ability of information retrieval in the aforementioned systems. In this paper, we propose a novel clustering algorithm named LIPC (Local Information Passing Clustering algorithm). The main steps of LIPC are: (1) we estimate a KNN neighbor directed graph G of tags and calculate the kernel density of each tag in its neighborhood; (2) we generate local information, local coverage and local kernel of each tag; (3) we pass the local information on G by I and O operators until they are converged and tag priory are generated; (4) we use tag priory to find out the clusters of tags. Experimental results on two real world datasets namely MedWorm and MovieLens demonstrate the efficiency and the superiority of the proposed method.
Zong, Y, Xu, G, Jin, P, Zhang, Y, Chen, E & Pan, R 1970, 'APPECT: An Approximate Backbone-Based Clustering Algorithm for Tags', Advanced Data Mining and Applications, Lecture Notes in Computer Science, International Conference on Advanced Data Mining and Applications, Springer Berlin Heidelberg, Beijing, China, pp. 175-189.
View/Download from: Publisher's site
View description>>
In social annotation systems, users label digital resources by using tags which are freely chosen textual descriptions. Tags are used to index, anno- tate and retrieve resource as an additional metadata of resource . Poor retrieval performance remains a major problem of most social tagging systems resulting from the severe difficulty of ambiguity, redundancy and less semantic nature of tags. Clustering method is a useful tool to address the aforementioned difficul- ties. Most of the researches on tag cluste ring are directly using traditional clus- tering algorithms such as K-means or Hierarchical Agglomerative Clustering on tagging data, which possess the inherent drawbacks, such as the sensitivity of initialization. In this paper, we instead make use of the approximate backbone of tag clustering results to find out better tag clusters. In particular, we propose an APProximate backbonE-based Clustering algorithm for Tags (APPECT). The main steps of APPECT are: (1) we execute the K-means algorithm on a tag similarity matrix for M times and collect a set of tag clustering results Z={C 1 ,C 2 ,...,C m } ; (2) we form the approximate backbone of Z by executing a greedy search; (3) we fix the approximate backbone as the initial tag clustering result and then assign the rest tags into the corresponding clusters based on the similarity. Experimental results on three real world datasets namely MedWorm, MovieLens and Dmoz demonstrate the effectiveness and the superiority of the proposed method against the traditional approaches.
Zowghi, D 1970, 'What is Requirements Volatility and How Does it Impact on Software Development?', NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 10th International Conference on New Trends in Software Methodologies, Tools and Techniques, IOS Press BV, St Petersburg, Russia, pp. 3-4.
View/Download from: Publisher's site
View description>>
Software development is a dynamic process where demands for change have been recognized to be inevitable. All forms of modifications to the user requirements cause software to change. The sources of changes could vary considerably and come from the users, business, techlonogy, and organizations. Changes to requirements give rise to an intrinsic volatility, which is claimed to impact on many aspects of software development. Requirements Volatility (RV) is claimed to be a major source of risk to the management of software projects. Investigating the sources of , reasons for, and impacts of requirements changes is an important prerequisite for understanding the characteristics of requirements volatility. In this talk, I will discuss the nature of requirements changes and describe the results of our longitudinal study of requirements volatility. The results of this study have improved our understanding of this complex and multifaceted phenomenon and have provided valuable empirical evidence for the impacts of RV resulting in important insights for more effective management of requirements.
Zowghi, D & Bargi, A 1970, 'Software versus IT Service: A Comparative Study from Requirements Engineering Perspective', 2011 22nd International Workshop on Database and Expert Systems Applications, 2011 22nd International Conference on Database and Expert Systems Applications (DEXA), IEEE, Toulouse, France, pp. 31-35.
View/Download from: Publisher's site
View description>>
Service are ubiquitous and are a critical element of the mordern world economies. They play an increasingly important role in most industry sectors including Information Technology (IT). The essential differences between a software product and an IT Service are unclear. IT services are seldom offered in isolation and are often packaged and provided with software products. More so than before, IT service providers need to conduct a rigorous and systematic elicitation, and analysis of the needs and requirements of the intended users so that the resulting IT services are closly aligned with the enterprise business needs. This paper presents a comparative study of software and IT services form the Requirements Engineer(RE) perspective; both from process and product viewpoint. THe overall aim of the compare and contrast is to investigate key similarities and differentces between software and IT services in order to ascertain the applicability and relevance of RE research and practice results for eliciting, analyzing, documenting and managing IT services.