Adak, C 2014, 'OPTICS Based Coverage in Wireless Sensor Network'.
View description>>
This paper deals with the coverage problem of wireless sensor network. We usethe density based clustering technique - OPTICS to cover a target region withless number of sensor nodes. OPTICS works well to identify the outliers, corepoints and it obtains the denser regions. We define a level of acceptance tofind next appropriate sensor in the region. We eliminate overlapped area andobtain a decision tree to minimally cover up the target region.
Adak, C 2014, 'Rough Clustering Based Unsupervised Image Change Detection'.
View description>>
This paper introduces an unsupervised technique to detect the changed regionof multitemporal images on a same reference plane with the help of roughclustering. The proposed technique is a soft-computing approach, based on theconcept of rough set with rough clustering and Pawlak's accuracy. It is lessnoisy and avoids pre-deterministic knowledge about the distribution of thechanged and unchanged regions. To show the effectiveness, the proposedtechnique is compared with some other approaches.
Agarwal, N, Zhou, A & Xu, G 2014, 'Social cyber systems—Challenges, opportunities, and beyond', Journal of Systems and Software, vol. 94, pp. 1-3.
View/Download from: Publisher's site
Al-Jaafreh, A, Al-adaileh, R, Gill, A, Al-Ani, A & alzoubi, Y 2014, 'A Review of Literature of Initial Trust in E-Services: The Case of Internet Banking Services in Jordanian Context', Journal of Electronic Banking Systems, vol. 2014, pp. 1-10.
View/Download from: Publisher's site
Alqahtani, A, Lu, H & Lu, J 2014, 'Knowledge-based life event model for e-government service integration with illustrative examples', Intelligent Decision Technologies, vol. 8, no. 3, pp. 189-205.
View/Download from: Publisher's site
View description>>
The advancement of information and communications technology and web services offers an opportunity for e-government service integration, which can help improve the availability and quality of services offered. However, few of the potential service integration applications have been adopted by governments to increase the accessibility of and satisfaction with government services and information for citizens. Recently, the 'life event' concept was introduced as the core element of integrating complexity of service delivery to improve the efficiency and reusability of e-government services, web-based information management systems. In addition, a semantic web-based ontology is considered to be the most powerful conceptual approach for dealing with challenges associated with developing seamless systems in distributed environments. Among these challenges are interoperability, which can be loosely defined as the technical capability for interoperation. Despite the conceptual emergence of semantic web-based ontology for life events, the question remains of what methodology to use when designing a semantic web-based ontology for life events. This paper proposes a semantic web-based ontology model for life events for e-government service integration created using a methodology that implements the model using the ontology modelling tool Protégé and evaluates the model using Pellet Reasoner and the SPARQL query language. In addition, this model is illustrated by two examples, the Saudi Arabia King Abdullah Scholarship and Hafiz, to show the advantages of integrated systems compared with standalone systems. These examples show that the new model can effectively support the integration of standalone e-government services automatically so that citizens do not need to manually execute individual services. This can significantly improve the accessibility of e-government services and citizen's satisfaction. © 2014-IOS Press.
Arodudu, O, Ibrahim, E, Voinov, A & van Duren, I 2014, 'Exploring bioenergy potentials of built-up areas based on NEG-EROEI indicators', Ecological Indicators, vol. 47, pp. 67-79.
View/Download from: Publisher's site
Ashraf, J, Hussain, OK & Hussain, FK 2014, 'Empirical analysis of domain ontology usage on the Web: eCommerce domain in focus', CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, vol. 26, no. 5, pp. 1157-1184.
View/Download from: Publisher's site
View description>>
In the recent past, there has been an exponential growth in Resource Description Framework data on the web known as web of data. The emergence of the web of data is transforming the existing web from a document-sharing medium to a decentralized knowledge platform for publishing and sharing information between humans and computers. To enable common understanding between different users, domain ontologies are being developed and deployed to annotate information on the web. This semantically annotated information is then accessed by machines to extract and aggregate information, on the basis of the underlying ontologies used. To effectively and efficiently access data on the web, insight into the usage of ontology is pivotal, because this assists users in experiencing the benefits offered by the Semantic Web. However, such an approach has not been proposed in the literature. In this paper, we present a pragmatic approach to the analysis of domain ontology usage on the web. We propose metrics to measure the use of domain ontology constructs on the web from different aspects. To comprehensively understand the usage patterns of conceptual knowledge, instance data, and ontology co-usability, we considered GoodRelations ontology as the domain ontology and built a dataset by collecting structured data from 211 web-based data sources that have published information using the domain ontology. The dataset is analyzed by using the proposed metrics and observations along with their usability and applicability to the different users of the Semantic Web. Copyright © 2013 John Wiley & Sons, Ltd.
Azadeh, A, Darivandi Shoushtari, K, Saberi, M & Teimoury, E 2014, 'An Integrated Artificial Neural Network and System Dynamics Approach in Support of the Viable System Model to Enhance Industrial Intelligence: The Case of a Large Broiler Industry', Systems Research and Behavioral Science, vol. 31, no. 2, pp. 236-257.
View/Download from: Publisher's site
View description>>
Organizational cybernetics is one of the powerful systems approaches that benefits from the viable system model (VSM). The model is very general and is usually in need of complementary methods. In this article, one of artificial intelligence methods, artificial neural networks (ANNs), and system dynamics simulation have been used in support of the VSM. Iran broiler industry is conceived as a complex economic system and has been modelled using VSM. Operational elements, coordination, control, development, policy functions and environment of the industry are identified. ANN has been utilized in service of the controller (system 3) and the intelligence function (system 4) of the industry. ANN helps system 3 to anticipate market deviation from defined targets and reduce action delays for feeding the system back. A model in which ANN and system dynamics simulation are combined helps systems 4 and 5 manage external relationships by facilitation of defining imports tariff for maize and soybean, which are detected as critical environmental elements in identifying the industry environment. Maize and soybean cost contribute to more than 60% of chicken meat cost in Iran. Chicken meat is a high‐consumed product all over the world and one of the main sources of protein. Suitable price of chicken meat is an important factor for the industry managers in Iran. As illustrated in the paper, artificial intelligence can improve VSM subsystems functioning and enhance the industry intelligence and regulation against internal and external oscillations. Copyright © 2013 John Wiley & Sons, Ltd.
Azadeh, A, Rouzbahman, M, Saberi, M & Valianpour, F 2014, 'An adaptive algorithm for assessment of operators with job security and HSEE indicators', Journal of Loss Prevention in the Process Industries, vol. 31, pp. 26-40.
View/Download from: Publisher's site
Azadeh, A, Salehi, V, Ashjari, B & Saberi, M 2014, 'Performance evaluation of integrated resilience engineering factors by data envelopment analysis: The case of a petrochemical plant', Process Safety and Environmental Protection, vol. 92, no. 3, pp. 231-241.
View/Download from: Publisher's site
Bano, M, Zowghi, D, Ikram, N & Niazi, M 2014, 'What makes service oriented requirements engineering challenging? A qualitative study', IET SOFTWARE, vol. 8, no. 4, pp. 154-160.
View/Download from: Publisher's site
View description>>
The focus of Service Oriented Software Development (SOSD) is to develop software by integrating reusable services to lower the required cost, time and effort of development and increase reusability, agility, quality and customer satisfaction. It has been recognised in the literature that SOSD faces various challenges especially in requirements engineering (RE). The objective of this study is to investigate these challenges of Service Oriented RE (SORE) from practitioners' perspectives in order to gain a deeper understanding of the related issues and to reveal potential gaps between research and practice in SORE. They present a qualitative study of the challenges and issues in SORE. The data were collected by conducting interviews with practitioners working in IT companies in Sydney, who have had substantial experience with service oriented software projects. The authors findings reveal that most of the challenges of SORE are similar to those that are faced during RE in traditional or component-based software development. According to the practitioners, the research and practice has made some advances in the technical direction but the human related issues in SORE have not been addressed adequately. © The Institution of Engineering and Technology 2014.
Behbood, V, Lu, J & Zhang, G 2014, 'Fuzzy Refinement Domain Adaptation for Long Term Prediction in Banking Ecosystem', IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 10, no. 2, pp. 1637-1646.
View/Download from: Publisher's site
View description>>
Long-term bank failure prediction is a challenging real world problem in banking ecosystem and machine learning methods have been recently applied to improve the prediction accuracy. However, traditional machine learning methods assume that the training data and the test data are drawn from the same distribution, which is hard to be met in real world banking applications. This paper proposes a novel algorithm known as fuzzy refinement domain adaptation to solve this problem based on the ecosystem-oriented architecture. The algorithm utilizes the fuzzy system and similarity/dissimilarity concepts to modify the target instances' labels which were initially predicted by a shift-unaware prediction model. It employs a classifier to modify the label values of target instances based on their similarity/dissimilarity to the candidate positive and negative instances in mixture domains. Thirty six experiments are performed using three different shift-unaware prediction models. In these experiments bank failure financial data is used to evaluate the algorithm. The results demonstrate that the proposed algorithm significantly improves predictive accuracy and outperforms other refinement algorithms. © 2012 IEEE.
Belles-Sampera, J, Merigó, JM, Guillén, M & Santolino, M 2014, 'Indicators for the characterization of discrete Choquet integrals', Information Sciences, vol. 267, pp. 201-216.
View/Download from: Publisher's site
Bianchini, S, Maxwell, T & Dovey, K 2014, 'Rethinking leadership in the academy: an Australian case', Innovations in Education and Teaching International, vol. 51, no. 5, pp. 556-567.
View/Download from: Publisher's site
View description>>
As with higher education institutions in other Organisation for Economic Cooperation and Development countries, Australian universities are facing significant challenges. One particular challenge is that of the declining quality of the teaching and learning experience within the academy. This paper describes an attempt to sustain the quality of a `flagship postgraduate academic programme through an action research initiative intended to distribute the programme's leadership across its stakeholder community. One year into the intervention, while its achievements include new collaborative arrangements with the university, as well as unconventional teaching/learning partnerships and enriched stakeholder learning, its standing within the university remains uncertain.
Cao, L, Joachims, T, Wang, C, Gaussier, E, Li, J, Ou, Y, Luo, D, Zafarani, R, Liu, H, Xu, G, Wu, Z, Pasi, G, Zhang, Y, Yang, X, Zha, H, Serra, E & Subrahmanian, VS 2014, 'Behavior Informatics: A New Perspective', IEEE Intelligent Systems, vol. 29, no. 4, pp. 62-80.
View/Download from: Publisher's site
View description>>
© 2001-2011 IEEE. This installment of Trends & Controversies provides an array of perspectives on the latest research in behavior informatics. Longbing Cao introduces the work in 'Behavior Informatics: A New Perspective.' Then, in 'Behavior Computing,' Longbing Cao and Thorsten Joachims provide a basic overview of the topic. Next is 'Coupled Behavior Representation, Modeling, Analysis, and Reasoning' by Can Wang, Longbing Cao, Eric Gaussier, Jinjiu Li, Yuming Ou, and Dan Luo. The fourth article is 'Behavior Analysis in Social Media,' by Reza Zafarani and Huan Liu. The fifth article is 'Group Recommendation and Behavior,' by Guandong Xu and Zhiang Wu. Gabriella Pasi wrote the sixth article, 'Web Search and Behavior.' The seventh article, 'Behaviors of IPTV Users,' is by Ya Zhang, Xiaokang Yang, and Hongyuan Zha. Finally, 'Should Behavioral Models of Terror Groups Be Disclosed?' is by Edoardo Serra and V.S. Subrahmanian.
Cetindamar, D 2014, 'Understanding the Turkish biotechnology system through the functions of an innovation system', International Journal of Biotechnology, vol. 13, no. 1/2/3, pp. 105-105.
View/Download from: Publisher's site
View description>>
The paper empirically examines biotechnology innovation system in order to present the concerns of developing countries. Through mapping innovation processes/functions over time, it is possible to develop insights of the dynamics of innovation systems. This mapping is carried out for the Turkish biotechnology system, and the findings are summarised. © 2014 Inderscience Enterprises Ltd.
Chen, X, Liu, L, Luo, D, Xu, G, Lu, Y, Liu, M & Gao, R 2014, 'A Spectral Clustering Algorithm Based on Hierarchical Method', pp. 111-123.
View/Download from: Publisher's site
View description>>
Most of the clustering algorithms were designed to cluster the data in convex spherical sample space, but their ability was poor for clustering more complex structures. In the past few years, several spectral clustering algorithms were proposed to cluster arbitrarily shaped data in various real applications including image processing and web analysis. However, most of these algorithms were based on k-means, which is a randomized algorithm and makes the algorithm easy to fall into local optimal solutions. Hierarchical method could handle the local optimum well because it organizes data into different groups at different levels. In this paper, we propose a novel clustering algorithm called spectral clustering algorithm based on hierarchical clustering (SCHC), which combines the advantages of hierarchical clustering and spectral clustering algorithms to avoid the local optimum issues. The experiments on both synthetic data sets and real data sets show that SCHC outperforms other six popular clustering algorithms. The method is simple but is shown to be efficient in clustering both convex shaped data and arbitrarily shaped data.
Chew, E & Anthony Dovey, K 2014, 'Learning to create sustainable value in turbulent operational contexts: the role of leadership practices', The Learning Organization, vol. 21, no. 4, pp. 243-257.
View/Download from: Publisher's site
View description>>
Purpose – This paper aims to report on case-study research that explores the role of leadership practices, in particular, in enhancing the capacity of an enterprise to learn to create new value from a diverse range of sources. The capacity to sustain value creation over time, and across turbulent environments, increasingly differentiates enterprise performance. Under the umbrella term of “dynamic capabilities”, a range of practices have been identified in the literature as contributing to an enterprise’s ability to learn to perform this task successfully. Design/methodology/approach – The paper is based on case studies of three enterprises whose founders have sustained the creation of new value for customers over decades. Through a series of unstructured interviews with each founder, the tacit knowledge gained from years of learning how to create, and re-create, value, is made explicit through hermeneutic analysis of the interview transcripts. Findings – The data identify four key areas of leadership practice that underpin the capacity to learn to continuously create new value over significant periods of time. The most important of these are the social practices that generate and leverage the intangible capital resources (in particular, the resource of trust) that underpin the collaborative learning on which value creation processes depend. Research limitations/implications – As interpretive resear...
Chuang, C-H, Ko, L-W, Lin, Y-P, Jung, T-P & Lin, C-T 2014, 'Independent Component Ensemble of EEG for Brain–Computer Interface', IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 22, no. 2, pp. 230-238.
View/Download from: Publisher's site
View description>>
Recently, successful applications of independent component analysis (ICA) to electroencephalographic (EEG) signals have yielded tremendous insights into brain processes that underlie human cognition. Many studies have further established the feasibility of using independent processes to elucidate human cognitive states. However, various technical problems arise in the building of an online brain-computer interface (BCI). These include the lack of an automatic procedure for selecting independent components of interest (ICi) and the potential risk of not obtaining a desired ICi. Therefore, this study proposes an ICi-ensemble method that uses multiple classifiers with ICA processing to improve upon existing algorithms. The mechanisms that are used in this ensemble system include: 1) automatic ICi selection; 2) extraction of features of the resultant ICi; 3) the construction of parallel pipelines for effectively training multiple classifiers; and a 4) simple process that combines the multiple decisions. The proposed ICi-ensemble is demonstrated in a typical BCI application, which is the monitoring of participants' cognitive states in a realistic sustained-attention driving task. The results reveal that the proposed ICi-ensemble outperformed the previous method using a single ICi with ∼ 7% (91.6% versus 84.3%) in the cognitive state classification. Additionally, the proposed ICi-ensemble method that characterizes the EEG dynamics of multiple brain areas favors the application of BCI in natural environments. © 2013 IEEE.
Cignoni, P, Pietroni, N, Malomo, L & Scopigno, R 2014, 'Field-aligned mesh joinery.', ACM Trans. Graph., vol. 33, pp. 11:1-11:1.
View/Download from: Publisher's site
Dayong Ye, Minjie Zhang & Sutanto, D 2014, 'Cloning, Resource Exchange, and RelationAdaptation: An Integrative Self-Organisation Mechanism in a Distributed Agent Network', IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 887-897.
View/Download from: Publisher's site
Deng, S, Huang, L & Xu, G 2014, 'Social network-based service recommendation with trust enhancement', Expert Systems with Applications, vol. 41, no. 18, pp. 8075-8084.
View/Download from: Publisher's site
View description>>
Given the increasing applications of service computing and cloud computing, a large number of Web services are deployed on the Internet, triggering the research of Web service recommendation. Despite of service QoS, the use of user feedback is becoming the current trend in service recommendation. Likewise in traditional recommender systems, sparsity, cold-start and trustworthiness are major issues challenging service recommendation in adopting similarity-based approaches. Meanwhile, with the prevalence of social networks, nowadays people become active in interacting with various computers and users, resulting in a huge volume of data available, such as service information, user-service ratings, interaction logs, and user relationships. Therefore, how to incorporate the trust relationship in social networks with user feedback for service recommendation motivates this work. In this paper, we propose a social network-based service recommendation method with trust enhancement known as RelevantTrustWalker. First, a matrix factorization method is utilized to assess the degree of trust between users in social network. Next, an extended random walk algorithm is proposed to obtain recommendation results. To evaluate the accuracy of the algorithm, experiments on a real-world dataset are conducted and experimental results indicate that the quality of the recommendation and the speed of the method are improved compared with existing algorithms. © 2014 Elsevier Ltd. All rights reserved.
Devitt, SJ, Greentree, AD, Stephens, AM & Meter, RV 2014, 'High-speed quantum networking by ship', Sci. Rep, vol. 6, no. 1, p. 36163.
View/Download from: Publisher's site
View description>>
Networked entanglement is an essential component for a plethora of quantumcomputation and communication protocols. Direct transmission of quantum signalsover long distances is prevented by fibre attenuation and the no-cloningtheorem, motivating the development of quantum repeaters, designed to purifyentanglement, extending its range. Quantum repeaters have been demonstratedover short distances, but error-corrected, global repeater networks with highbandwidth require new technology. Here we show that error corrected quantummemories installed in cargo containers and carried by ship can provide aflexible connection between local networks, enabling low-latency, high-fidelityquantum communication across global distances at higher bandwidths thanpreviously proposed. With demonstrations of technology with sufficient fidelityto enable topological error-correction, implementation of the quantum memoriesis within reach, and bandwidth increases with improvements in fabrication. Ourapproach to quantum networking avoids technological restrictions of repeaterdeployment, providing an alternate path to a worldwide Quantum Internet.
Dong, H & Hussain, FK 2014, 'Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery', IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 10, no. 2, pp. 1616-1626.
View/Download from: Publisher's site
Dovey, KA & McCabe, B 2014, 'The Politics of Innovation: Realising the Value of Intrapreneurs', INTERNATIONAL JOURNAL OF LEARNING AND INTELLECTUAL CAPITAL, vol. 11, no. 3, pp. 185-201.
View description>>
This paper offers three cases, from very different industries, where an organisation failed to realise the value of the talent that was recruited at significant cost to lead an attempt at innovation. In each case, the recruited talent was forced into an intrapreneurial role - one in which they had to operate below the management radar - in order to attempt to progress the project for which they were employed. Furthermore, in each case, senior management at the company failed to scrutinise its management practices with respect to the constraints they unwittingly imposed upon the newly recruited person. Through its analysis of the reasons for each of these failures, the paper highlights the dynamics of effective talent management in the knowledge era, and points to alternative leadership practices through which to realise the value offered by talented staff recruited specifically to lead an organisation's strategic intent to innovate.
Durao, F, Bayyapu, K, Xu, G, Dolog, P & Lage, R 2014, 'Expanding user’s query with tag-neighbors for effective medical information retrieval', Multimedia Tools and Applications, vol. 71, no. 2, pp. 905-929.
View/Download from: Publisher's site
Dyson, LE, Frawley, JK, Tyler, J & Wakefield, J 2014, 'Facilitating Enhanced Learning in Tutorials through Tablet Computing Enabled Sharing and Annotation Technologies', Transactions on Mobile Learning, vol. 3, pp. 22-26.
View description>>
The purpose of this study is report on a trial of tablet computing enabled sharing and annotation technologies in an Introductory Accounting subject. These technologies allow student homework to be photographed using a tablet computer (iPad in our study), shown to the class instantaneously through a data projector and annotated live by the tutor, along with student participation, using the tablet computer. These technologies are intended to address calls for more student–centred approaches to learning, moving away from the didactic approach that dominates much of accountingeducation. Two focus group sessions were conducted to explore the effectiveness of the technologies, with the first group from a class where the tutor used the iPad and the second from a class wherethere was no iPad use. The findings from the focus groups suggest that in the class where the iPadwas used, there was a far greater ability to focus on the questions and problems students were facing,a lot more material could be covered, student felt more comfortable participating because they couldsee their fellow students faced similar challenges and they were far more likely to completehomework prior to class. Overall this indicates there were significant benefits for students.
Erfani, SS & Abedin, B 2014, 'Effects of Web based cancer support resources use on cancer affected people: A systematic literature review', The International Technology Management Review, vol. 4, no. 4, pp. 201-201.
View/Download from: Publisher's site
Everitt, MS, Devitt, S, Munro, WJ & Nemoto, K 2014, 'High-fidelity gate operations with the coupled nuclear and electron spins of a nitrogen-vacancy center in diamond', Physical Review A, vol. 89, no. 5.
View/Download from: Publisher's site
Firrisa, MT, van Duren, I & Voinov, A 2014, 'Energy efficiency for rapeseed biodiesel production in different farming systems', Energy Efficiency, vol. 7, no. 1, pp. 79-95.
View/Download from: Publisher's site
Frawley, JK & Dyson, LE 2014, 'mStories: exploring semiotics and praxis of user-generated mobile stories', SOCIAL SEMIOTICS, vol. 24, no. 5, pp. 561-581.
View/Download from: Publisher's site
View description>>
Innovations in information and communication technologies have allowed people to actively author multimodal content and engage in new meaning-making practices. New Literacies research has gone some way to understanding new meaning-making behaviours. However, this research often derives its understandings from studies undertaken with students enrolled in formal educational settings. Mobile technologies are increasingly situated outside such domains; the informal use of these devices by adults remains on the periphery of scholarly focus. mStories is a creative participatory digital mobile storytelling project. Taking a multidimensional perspective, this article presents the in-depth case analysis of one participant and their mStory. A semiotic analysis found that the user-generated content demonstrated complex and sophisticated multimodal sense relations. However, control over the textual or compositional meta-function of the text was determined largely by the computer interface, with users habituated to relinquishing authorial control over this element. Within this study, mobile literacy praxis was characteristically ad hoc and contextually embedded, and though mobile technology invites such practices, users were neither determined nor limited by this, and happily turned to other devices where necessary.
Fu, B, Wang, Z, Xu, G & Cao, L 2014, 'Multi-label learning based on iterative label propagation over graph', PATTERN RECOGNITION LETTERS, vol. 42, pp. 85-90.
View/Download from: Publisher's site
View description>>
One key challenge in multi-label learning is how to exploit label dependency effectively, and existing methods mainly address this issue via training a prediction model for each label based on the combination of original features and the labels on which it depends on. However, the influence of label dependency might be depressed due to the significant imbalance in dimensionality of feature set and dependent label set in this way, also the dynamic interaction between labels cannot be utilized effectively. In this paper, we propose a new framework to exploit the dependencies between labels iteratively and interactively. Every label’s prediction will be updated through iterative process of propagation, other than being determined directly by a prediction model. Specifically, we utilize a graph model to encode the dependencies between labels, and employ the random-walk with restart (RWR) strategy to propagate the dependency among all labels iteratively until the predictions for all the labels converge. We validate our approach by experiments, and the results demonstrate that it yields significant improvements compared with several state-of-the-art algorithms.
Gaddis, EJB, Voinov, A, Seppelt, R & Rizzo, DM 2014, 'Spatial Optimization of Best Management Practices to Attain Water Quality Targets', Water Resources Management, vol. 28, no. 6, pp. 1485-1499.
View/Download from: Publisher's site
Gao, Y, Zhang, G, Lu, J & Ma, J 2014, 'A BI-LEVEL DECISION MODEL FOR CUSTOMER CHURN ANALYSIS', COMPUTATIONAL INTELLIGENCE, vol. 30, no. 3, pp. 583-599.
View/Download from: Publisher's site
View description>>
This paper develops a bi-level decision model and a solution approach to optimizing service features for a company to reduce its customer churn rate. First, a bi-level decision model, together with its modeling approach, are developed to describe the gaming relationship between decision makers in a company (service provider) and its customers. Then, a practical solution approach to reaching solutions for the bi-level-modeled customer churn problem is developed. Finally, experiments and case studies are conducted to illustrate the bi-level decision model and the solution approach. © 2013 Wiley Periodicals, Inc.
Ghous, H, Kennedy, PJ, Ho, N & Catchpoole, DR 2014, 'Comparing Functional Visualisations of Lists of Genes using Singular Value Decomposition', Journal of Research and Practice in Information Technology, vol. 47, no. 1, pp. 47-76.
View description>>
Progress in understanding core pathways of cancer requires analysis of many genes. New insights arehampered due to the lack of tools to make sense of large lists of genes identifi ed using high throughputtechnology. Data mining, particularly visualisation that fi nds relationships between genes and the GeneOntology (GO), can assist in functional understanding. This paper addresses the question using GOannotations for functional understanding of genes. We augment genes with GO terms using two similaritymeasures: a Hop-based measure and an Information Content based measure, and visualise with SingularValue Decomposition (SVD). The results demonstrate that SVD visualisation of GO augmented genesmatches the biological understanding expected in simulated and real-life data. Diff erences are observed invisualisation of GO terms, where the information content method produces more tightly-packed clustersthan the hop-based method.
Gill, AQ 2014, 'Applying Agility and Living Service Systems Thinking to Enterprise Architecture.', Int. J. Intell. Inf. Technol., vol. 10, no. 1, pp. 1-15.
View/Download from: Publisher's site
View description>>
Copyright © 2014, IGI Global. Adaptive enterprise architecture capability plays an important role in enabling complex enterprise transformations. One of the key challenges when establishing an adaptive enterprise architecture capability is identifying the enterprise context and the scope of the enterprise architecture. The objective of this paper is to develop and present an adaptive enterprise service system (AESS) conceptual model, which is a part of The Gill Framework for Adaptive Enterprise Service Systems. This model has been developed using a 'Design Research' approach. The AESS conceptual model assimilates agility, service, and living systems thinking (following multi-agent system modelling) for describing and analyzing the enterprise context and scope for establishing an adaptive enterprise architecture capability. The target audience of this AESS model driven approach includes both, enterprise architecture researchers and practitioners.
Gill, AQ 2014, 'Hybrid Adaptive Software Development Capability: An Empirical Study.', J. Softw., vol. 9, no. 10, pp. 2614-2621.
View/Download from: Publisher's site
View description>>
Software intensive organisations require the integration of agility, people, process, product and tool elements for establishing a hybrid adaptive software development capability. This paper presents the results of the empirical study that has been conducted to identify the important underlying characteristics of the hybrid adaptive software development capability elements. Based on this investigation, the most critical and the least critical characteristics of the hybrid adaptive software development capability elements have been identified. The findings of this empirical study have several implications, and can be re-casted into making practical recommendations for establishing a situation-specific hybrid adaptive software development capability.
Gil-Lafuente, AM, Merigó, JM & Vizuete, E 2014, 'Analysis of luxury resort hotels by using the Fuzzy Analytic Hierarchy Process and the Fuzzy Delphi Method', Economic Research-Ekonomska Istraživanja, vol. 27, no. 1, pp. 244-266.
View/Download from: Publisher's site
Golsteijn, C, van den Hoven, E, Frohlich, D & Sellen, A 2014, 'Hybrid crafting: towards an integrated practice of crafting with physical and digital components', PERSONAL AND UBIQUITOUS COMPUTING, vol. 18, no. 3, pp. 593-611.
View/Download from: Publisher's site
View description>>
With current digital technologies, people have large archives of digital media, such as images and audio files, but there are only limited means to include these media in creative practices of crafting and making. Nevertheless, studies have shown that crafting with digital media often makes these media more cherished and that people enjoy being creative with their digital media. This paper aims to open up the way for novel means for crafting, which include digital media in integrations with physical construction, here called 'hybrid crafting'. Notions of hybrid crafting were explored to inform the design of products or systems that may support these new crafting practices. We designed 'Materialise' a building set that allows for the inclusion of digital images and audio files in physical constructions by using tangible building blocks that can display images or play audio files, alongside a variety of other physical components-and used this set in four hands-on creative workshops to gain insight into how people go about doing hybrid crafting; whether hybrid crafting is desirable; what the characteristics of hybrid crafting are; and how we may design to support these practices. By reflecting on the findings from these workshops, we provide concrete guidelines for the design of novel hybrid crafting products or systems that address craft context, process and result. We aim to open up the design space to designing for hybrid crafting because these new practices provide interesting new challenges and opportunities for future crafting that can lead to novel forms of creative expression.
Goodswen, SJ, Kennedy, PJ & Ellis, JT 2014, 'Discovering a vaccine against neosporosis using computers: is it feasible?', TRENDS IN PARASITOLOGY, vol. 30, no. 8, pp. 401-411.
View/Download from: Publisher's site
Goodswen, SJ, Kennedy, PJ & Ellis, JT 2014, 'Enhancing In Silico Protein-Based Vaccine Discovery for Eukaryotic Pathogens Using Predicted Peptide-MHC Binding and Peptide Conservation Scores', PLOS ONE, vol. 9, no. 12.
View/Download from: Publisher's site
Goodswen, SJ, Kennedy, PJ & Ellis, JT 2014, 'Vacceed: a high-throughput in silico vaccine candidate discovery pipeline for eukaryotic pathogens based on reverse vaccinology', BIOINFORMATICS, vol. 30, no. 16, pp. 2381-2383.
View/Download from: Publisher's site
View description>>
Summary: We present Vacceed, a highly configurable and scalable framework designed to automate the process of high-throughput in silico vaccine candidate discovery for eukaryotic pathogens. Given thousands of protein sequences from the target pathogen as input, the main output is a ranked list of protein candidates determined by a set of machine learning algorithms. Vacceed has the potential to save time and money by reducing the number of false candidates allocated for laboratory validation. Vacceed, if required, can also predict protein sequences from the pathogen's genome. © The Author 2014.
Gu, Y, Yang, Z, Xu, G, Nakano, M, Toyoda, M & Kitsuregawa, M 2014, 'Exploration on efficient similar sentences extraction', World Wide Web, vol. 17, no. 4, pp. 595-626.
View/Download from: Publisher's site
View description>>
Measuring the semantic similarity between sentences is an essential issue for many applications, such as text summarization, Web page retrieval, question-answer model, image extraction, and so forth. A few studies have explored on this issue by several techniques, e.g., knowledge-based strategies, corpus-based strategies, hybrid strategies, etc. Most of these studies focus on how to improve the effectiveness of the problem. In this paper, we address the efficiency issue, i.e., for a given sentence collection, how to efficiently discover the top-k semantic similar sentences to a query. The previous methods cannot handle the big data efficiently, i.e., applying such strategies directly is time consuming because every candidate sentence needs to be tested. In this paper, we propose efficient strategies to tackle such problem based on a general framework. The basic idea is that for each similarity, we build a corresponding index in the preprocessing. Traversing these indices in the querying process can avoid to test many candidates, so as to improve the efficiency. Moreover, an optimal aggregation algorithm is introduced to assemble these similarities. Our framework is general enough that many similarity metrics can be incorporated, as will be discussed in the paper. We conduct extensive experimental evaluation on three real datasets to evaluate the efficiency of our proposal. In addition, we illustrate the trade-off between the effectiveness and efficiency. The experimental results demonstrate that the performance of our proposal outperforms the state-of-the-art techniques on efficiency while keeping the same high precision as them. © 2013 Springer Science+Business Media New York.
Guo, S, Guo, M, Leung, V, Yu, S & Xiang, Y 2014, 'On the Multicast Lifetime of WANETs with Multibeam Antennas: Formulation, Algorithms, and Analysis', IEEE Transactions on Computers, pp. 1-1.
View/Download from: Publisher's site
Guo, S, Guo, M, Leung, VCM, Yu, S & Xiang, Y 2014, 'On the Multicast Lifetime of WANETs with Multibeam Antennas: Formulation, Algorithms, and Analysis', IEEE Transactions on Computers, vol. 63, no. 8, pp. 1988-2001.
View/Download from: Publisher's site
Guo, Y, Zhu, J, Lu, H, Li, Y & Jin, J 2014, 'Core Loss Computation in a Permanent Magnet Transverse Flux Motor With Rotating Fluxes', IEEE Transactions on Magnetics, vol. 50, no. 11, pp. 1-4.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. This paper presents the core loss computation in a permanent magnet transverse flux motor (TFM) with soft magnetic composite stator core and mild steel rotor yoke, in which the magnetic fluxes rotate. The computation is based on modified core loss models and finite element magnetic field analysis [finite element analysis (FEA)]. The coefficients for the core loss models are obtained by curve-fitting measurements on samples, and the magnetic flux density patterns in the motor are obtained by time-stepping FEA while operating conditions are considered. The computations of the motor core losses agree with the measured values on the TFM prototype.
Gupta, A, Kayal, N & Qiao, Y 2014, 'Random arithmetic formulas can be reconstructed efficiently', computational complexity, vol. 23, no. 2, pp. 207-303.
View/Download from: Publisher's site
View description>>
Informally stated, we present here a randomized algorithm that given black-box access to the polynomial f computed by an unknown/hidden arithmetic formula φ reconstructs, on the average, an equivalent or smaller formula φ̌ in time polynomial in the size of its output φ̌. Specifically, we consider arithmetic formulas wherein the underlying tree is a complete binary tree, the leaf nodes are labeled by affine forms (i.e., degree one polynomials) over the input variables and where the internal nodes consist of alternating layers of addition and multiplication gates. We call these alternating normal form (ANF) formulas. If a polynomial f can be computed by an arithmetic formula μ of size s, it can also be computed by an ANF formula φ, possibly of slightly larger size s O(1). Our algorithm gets as input black-box access to the output polynomial f (i.e., for any point x in the domain, it can query the black box and obtain f(x) in one step) of a random ANF formula φ of size s (wherein the coefficients of the affine forms in the leaf nodes of φ are chosen independently and uniformly at random from a large enough subset of the underlying field). With high probability (over the choice of coefficients in the leaf nodes), the algorithm efficiently (i.e., in time s O(1)) computes an ANF formula φ̌ of size s computing f. This then is the strongest model of arithmetic computation for which a reconstruction algorithm is presently known, albeit efficient in a distributional sense rather than in the worst case. © 2014 Springer Basel.
He, W, Xu, G & Kruck, SE 2014, 'Online is education for the 21st century', Journal of Information Systems Education, vol. 25, no. 2, pp. 101-105.
View description>>
Online teaching and learning have become increasingly common in higher educational institutions. These higher educational institutions realize the growing importance of online learning in information systems/information technology (IS/IT) education and are now offering online IS/IT courses and programs to students. However, designing, developing, teaching, and assessing an online IS/IT course effectively is often a challenge. Many IS/IT instructors are new to online teaching and need orientation and training for their own readiness in designing, developing, teaching, and assessing IS/IT courses in the online environment. It is recognized that effective faculty are key to student success in online courses and to the success of online programs (Meyer and Jones, 2012). Therefore, it is imperative that administrators and instructors of IS/IT courses and programs learn more of the best practices of online teaching for high student success. This support to instructors and administrators is the purpose of the Special Issue of the Journal of Information Systems Education.
Howsawi, E 2014, 'The Use of Video Data in Project Management Research', Science Journal of Business and Management, vol. 2, no. 1, pp. 10-10.
View/Download from: Publisher's site
View description>>
Abstract In project management research, on site involvement is recognized as being effective practice for getting primary data, understanding the project tasks being examined and gaining context awareness. However, it is impossible for investigators to be present on site for every project they intend to investigate since project can be difficult to access, or may be undisclosed during the implementation stage, or may have been completed a long time ago. Reading the project reports and documents will provide a substantial amount of information, but there is always more to any project than written information alone; project practitioners are well aware of this fact. Advancements in technology since the beginning of the 20th century enable the film making of projects; possibly the main purpose of that film making is to produce documentaries. Based on the facts that the camera can capture a wealth of details and rich complexity that it is impossible or very difficult to capture by other means and the eye and ear can acquire a great deal of information that it is practically impossible to write simultaneously a question arises, can the use of video data be beneficial in project management research? This article reports the experience of the authors in employing video data in historic project management research. In researching British aviation projects during the period of the Second World War the authors uses the approach of content analysis to examine more than 250 hours of video data. A classification scheme of video data is presented in this paper. The advantages of and suggestions managing the usage of video are data also shown in this paper, in addition to caution concerning what may influence the effective usage of video data.
Howsawi, E, Eager, D, Bagia, R & Niebecker, K 2014, 'The four-level project success framework: application and assessment', Organisational Project Management, vol. 1, no. 1, pp. 1-1.
View/Download from: Publisher's site
View description>>
Success is one of the ultimate goals of any project endeavour. Thus, clarifying the meaning of success is a vital step in achieving the desired success. In this study, the authors reviewed the project success literature and provided a framework for defining and evaluating project success. The framework consists of four levels that contain the possible criteria for assessing and evaluating success. The authors demonstrate the framework by case application. Further, experts in the field of project management conducted an external evaluation of the framework to assess its merits.
Howsawi, EM, Eager, DM, Bagia, R & Niebecker, KD 2014, 'Delivering a Mega Construction Project Successfully During a National Crisis: Lessons Learned From The Aswan High Dam Construction Project', International Review of Management and Business Research, vol. 3, no. 2, pp. 625-647.
View description>>
Abstract Project success is a key topic in project management research. This study contributes to this topic by presenting how projects succeed during difficult circumstances of national crises. The occurrence of a crisis leads to the emergence of new dynamics and constraints that affect projects. Success strategies pursued then are different from those employed during peacetime. This research takes the Aswan High Dam project in Egypt in the 1960s as a case study and reveals four strategies supporting ten success factors that helped that project to succeed during a period of national crises. Links to contemporary projects are presented, together with recommendations to enhance the understanding and likelihood of successful project delivery during a national crisis period.
Howsawi, EM, Eager, DM, Bagia, R & Niebecker, KD 2014, 'Project Management During National Crisis: Concept Development', International Review of Management and Business Research, vol. 3, no. 1, pp. 412-422.
View description>>
Abstract National crises such as wars, economic crises and natural disasters are increasing in number and frequency worldwide. The context of a national crisis is unique and contains many abnormal challenges. Despite these challenges, projects are being commenced and executed during these events. Due to the abnormality of a national crisis context, the authors attempted, in this theoretical work, to propose the concept of project management during national crisis. Through literature synthesis and the content analysis of several data sets, the authors proposed a definition of the concept of crisis project management. This includes points of differences from peacetime project management and the common characteristics of a national crisis, with impact on project management processes. The authors discussed the results and provided some suggestions for further research.
Howsawi, EM, Eager, DM, Bagia, R & Niebecker, KD 2014, 'Success Strategies For Project Management During National Crises: Insights From The British Aviation Industry During World War Two', International Review of Management and Business Research, vol. 3, no. 1, pp. 533-556.
View description>>
Abstract Success is a fundamental imperative in the field of project management. The authors contributed to the theme of success by exploring the strategies that assisted in the delivery of successful projects during national crises. The occurrence of these crises stimulates the emergence of different dynamics and constraints that affect every aspect of the socioeconomic system, including projects. The success strategies needed in such contexts are different from those employed during times of peace. This paper reported the results of an introspective study of 24 British aviation projects undertaken during World War Two. The authors revealed six effective strategies that support the delivery of successful projects during a national crisis period. The authors discussed the results and made Links to contemporary projects together with practical recommendations that will enhance the understanding of successful project delivery during national crises.
Huang, C-S, Lin, C-L, Ko, L-W, Liu, S-Y, Su, T-P & Lin, C-T 2014, 'Knowledge-based identification of sleep stages based on two forehead electroencephalogram channels', Frontiers in Neuroscience, vol. 8, no. SEP, pp. 1-12.
View/Download from: Publisher's site
View description>>
© 2014 Huang, Lin, Ko, Liu, Su and Lin. Sleep quality is important, especially given the considerable number of sleep-related pathologies. The distribution of sleep stages is a highly effective and objective way of quantifying sleep quality. As a standard multi-channel recording used in the study of sleep, polysomnography (PSG) is a widely used diagnostic scheme in sleep medicine. However, the standard process of sleep clinical test, including PSG recording and manual scoring, is complex, uncomfortable, and time-consuming. This process is difficult to implement when taking the whole PSG measurements at home for general healthcare purposes. This work presents a novel sleep stage classification system, based on features from the two forehead EEG channels FP1 and FP2. By recording EEG from forehead, where there is no hair, the proposed system can monitor physiological changes during sleep in a more practical way than previous systems. Through a headband or self-adhesive technology, the necessary sensors can be applied easily by users at home. Analysis results demonstrate that classification performance of the proposed system overcomes the individual differences between different participants in terms of automatically classifying sleep stages. Additionally, the proposed sleep stage classification system can identify kernel sleep features extracted from forehead EEG, which are closely related with sleep clinician's expert knowledge. Moreover, forehead EEG features are classified into five sleep stages by using the relevance vector machine. In a leave-one-subject-out cross validation analysis, we found our system to correctly classify five sleep stages at an average accuracy of 76.7 ± 4.0 (SD) % [average kappa 0.68 ± 0.06 (SD)]. Importantly, the proposed sleep stage classification system using forehead EEG features is a viable alternative for measuring EEG signals at home easily and conveniently to evaluate sleep quality reliably, ultimately improving public healthcare.
Islam, MR, Youguang Guo, Jianguo Zhu, Haiyan Lu & Jian Xun Jin 2014, 'High-Frequency Magnetic-Link Medium-Voltage Converter for Superconducting Generator-Based High-Power Density Wind Generation Systems', IEEE Transactions on Applied Superconductivity, vol. 24, no. 5, pp. 1-5.
View/Download from: Publisher's site
Jansen, M, van den Hoven, E & Frohlich, D 2014, 'Pearl: living media enabled by interactive photo projection', PERSONAL AND UBIQUITOUS COMPUTING, vol. 18, no. 5, pp. 1259-1275.
View/Download from: Publisher's site
View description>>
People capture more and more photographs leading to large personal photo collections that require much time and effort to organize. A lack of organization can have a negative effect on photo retrieval and photo sharing. In this user-centred design case study, we have explored new possibilities for organizing and sharing photographs. To organize photographs, the concept living media was created; automatic positive selection based on which photographs are viewed more often and viewed for a longer time. These photographs are apparently more interesting, and therefore, they will keep their appearance; less popular photographs will slowly fade to black over time. To share living media away from the computer, the device Pearl was designed. Pearl has an integrated pico projector that projects an interactive collage of living media in a living room. Interaction with the collage, such as deleting unwanted photographs from the collage, gives input to the selection procedure of living media. Placing Pearl at a distance creates a larger projection size, suitable for sharing photographs with a group of people. Our design is evaluated in two small-user studies, where we found benefits and challenges of using a combination of positive selection and pico projectors for photowork and photo sharing.
Kennedy, PJ 2014, 'Redesign of Data Analytics Major: Challenges and Lessons Learned', Procedia - Social and Behavioral Sciences, vol. 116, pp. 1373-1377.
View/Download from: Publisher's site
Kieferová, M & Wiebe, N 2014, 'On the power of coherently controlled quantum adiabatic evolutions', New Journal of Physics, vol. 16, no. 12, pp. 123034-123034.
View/Download from: Publisher's site
Law, YZ, Thinh, LP, Bancal, J-D & Scarani, V 2014, 'Quantum randomness extraction for various levels of characterization of the devices', Journal of Physics A: Mathematical and Theoretical, vol. 47, no. 42, pp. 424028-424028.
View/Download from: Publisher's site
Li, D, Liu, F, Li, Y, Zhao, Z, Zhang, C & Yang, Q 2014, 'Magnetic properties modeling of soft magnetic composite materials using two-dimensional vector hybrid hysteresis model', Journal of Applied Physics, vol. 115, no. 17, pp. 17D117-17D117.
View/Download from: Publisher's site
View description>>
Thanks to the unique magnetic properties, soft magnetic composite (SMC) materials and their application in electromagnetic devices have achieved significant development. The typical application example of SMC is the electrical machine with complex structure, such as claw pole and transverse flux machines, in which the magnetic field is basically rotary. To design and analyze such a device, vector magnetic properties of the core material should be properly determined, modeled and applied. This paper presents the modeling of vector magnetic hysteresis of SMC based on a Stoner-Wohlfarh (S-W) elemental operator. A phenomenological mean-field approximation is used to consider the interaction between particles. With the presented model, the magnetization processes of SMC under both alternating and rotating fluxes are numerically simulated. The simulations have been verified by experimental measurements.
Li, P, Guo, S, Yu, S & Vasilakos, AV 2014, 'Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing', IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 12, pp. 3264-3273.
View/Download from: Publisher's site
Lin, C-T, Lin, B-S, Lin, F-C & Chang, C-J 2014, 'Brain Computer Interface-Based Smart Living Environmental Auto-Adjustment Control System in UPnP Home Networking', IEEE Systems Journal, vol. 8, no. 2, pp. 363-370.
View/Download from: Publisher's site
View description>>
A brain computer interface-based smart living environmental auto-adjustment control system (BSLEACS) is proposed in this paper. Recently, many environmental control systems have been proposed to improve human quality of life. However, little research has focused on environmental control directly using the human physiological state. Based on the advantage of our technique on brain computer interface (BCI), we integrated the BCI technique with universal plug and play (UPnP) home networking for smart house applications. BSLEACS mainly consists of a wireless physiological signal acquisition module, an embedded signal processing module, a simple control protocol/power line communication environmental controller, and a host system. Here, the physiological signal acquisition module and embedded signal processing module were designed for long-term electroencephalogram (EEG) monitoring and backend analysis, respectively. The advantages of low power consumption and small volume of the above modules are suitable for smart house applications in daily life. Moreover, different from other BCI systems, the property of using only a single EEG channel to monitor cognitive state also makes BSLEACS become more practicable. BSLEACS has been verified in a practical demo room, and the environmental adjustment can be automatically controlled by the change of the user's cognitive state. BSLEACS provides a novel system prototype for environmental control, and can be simply extended and integrated with the UPnP home networking for other applications. © 2012 IEEE.
Liu, B, Li, Y, Rong, B, Gui, L & Wu, Y 2014, 'LDPC-RS Product Codes for Digital Terrestrial Broadcasting Transmission System', IEEE Transactions on Broadcasting, vol. 60, no. 1, pp. 38-49.
View/Download from: Publisher's site
Liu, B, Liu, S, Rui, Y, Gui, L & Wang, Y 2014, 'A Low-Complexity Compressive Sensing Algorithm for PAPR Reduction', Wireless Personal Communications, vol. 78, no. 1, pp. 283-295.
View/Download from: Publisher's site
Llopis-Albert, C, Palacios-Marqués, D & Merigó, JM 2014, 'A coupled stochastic inverse-management framework for dealing with nonpoint agriculture pollution under groundwater parameter uncertainty', Journal of Hydrology, vol. 511, pp. 10-16.
View/Download from: Publisher's site
Lu, N, Lin, H, Lu, J & Zhang, G 2014, 'A Customer Churn Prediction Model in Telecom Industry Using Boosting', IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 10, no. 2, pp. 1659-1665.
View/Download from: Publisher's site
View description>>
With the rapid growth of digital systems and associated information technologies, there is an emerging trend in the global economy to build digital customer relationship management (CRM) systems. This trend is more obvious in the telecommunications industry, where companies become increasingly digitalized. Customer churn prediction is a main feature of in modern telecomcommunication CRM systems. This research conducts a real-world study on customer churn prediction and proposes the use of boosting to enhance a customer churn prediction model. Unlike most research that uses boosting as a method to boost the accuracy of a given basis learner, this paper tries to separate customers into two clusters based on the weight assigned by the boosting algorithm. As a result, a higher risk customer cluster has been identified. Logistic regression is used in this research as a basis learner, and a churn prediction model is built on each cluster, respectively. The result is compared with a single logistic regression model. Experimental evaluation reveals that boosting also provides a good separation of churn data; thus, boosting is suggested for churn prediction analysis. © 2012 IEEE.
Lu, N, Zhang, G & Lu, J 2014, 'Concept drift detection via competence models', ARTIFICIAL INTELLIGENCE, vol. 209, no. 1, pp. 11-28.
View/Download from: Publisher's site
View description>>
Detecting changes of concepts, such as a change of customer preference for telecom services, is very important in terms of prediction and decision applications in dynamic environments. In particular, for case-based reasoning systems, it is important to know when and how concept drift can effectively assist decision makers to perform smarter maintenance operations at an appropriate time. This paper presents a novel method for detecting concept drift in a case-based reasoning system. Rather than measuring the actual case distribution, we introduce a new competence model that detects differences through changes in competence. Our competence-based concept detection method requires no prior knowledge of case distribution and provides statistical guarantees on the reliability of the changes detected, as well as meaningful descriptions and quantification of these changes. This research concludes that changes in data distribution do reflect upon competence. Eight sets of experiments under three categories demonstrate that our method effectively detects concept drift and highlights drifting competence areas accurately. These results directly contribute to the research that tackles concept drift in case-based reasoning, and to competence model studies. © 2014 Elsevier B.V.
Ma, J, Lu, J & Zhang, G 2014, 'A three-level-similarity measuring method of participant opinions in multiple-criteria group decision supports', DECISION SUPPORT SYSTEMS, vol. 59, no. 1, pp. 74-83.
View/Download from: Publisher's site
View description>>
Measuring opinion similarity between participants is an important strategy to reduce the chance of making and applying inappropriate decisions in multi-criteria group decision making applications. Due to the small-sized opinion data and the varieties of opinion representations, measuring the similarity between opinions is difficult and has not been well-studied in developing decision support. Considering that the similarity changes with the number of concerned criteria, this paper develops a gradual aggregation algorithm and establishes a three-level-similarity measuring (TLSM) method based on it to measure the opinion similarity at the assessment level, the criterion level and the problem level. Two applications of the TLSM method on social policy selection and energy policy evaluation are conducted. The study indicates that the TLSM method can effectively measure the similarity between opinions in small-size with possibly missing values and simulate the dynamic generation of a decision. © 2013 Elsevier B.V. All rights reserved.
Marchand, J & Sood, S 2014, 'The alchemy of student entrepreneurs: towards a model of entrepreneurial maturity', International Journal of Entrepreneurship and Innovation Management, vol. 18, no. 1, pp. 75-75.
View/Download from: Publisher's site
Marin, L, Valls, A, Isern, D, Moreno, A & Merigó, JM 2014, 'Induced Unbalanced Linguistic Ordered Weighted Average and Its Application in Multiperson Decision Making', The Scientific World Journal, vol. 2014, pp. 1-19.
View/Download from: Publisher's site
View description>>
Linguistic variables are very useful to evaluate alternatives in decision making problems because they provide a vocabulary in natural language rather than numbers. Some aggregation operators for linguistic variables force the use of a symmetric and uniformly distributed set of terms. The need to relax these conditions has recently been posited. This paper presents the induced unbalanced linguistic ordered weighted average (IULOWA) operator. This operator can deal with a set of unbalanced linguistic terms that are represented using fuzzy sets. We propose a new order-inducing criterion based on the specificity and fuzziness of the linguistic terms. Different relevancies are given to the fuzzy values according to their uncertainty degree. To illustrate the behaviour of the precision-based IULOWA operator, we present an environmental assessment case study in which a multiperson multicriteria decision making model is applied.
McGregor, C 2014, 'Riding the medical technology wave to empower your career in medicine', University of Toronto Medical Journal, vol. 92, no. 1, pp. 5-6.
Merigó, JM 2014, 'DECISION-MAKING UNDER RISK AND UNCERTAINTY AND ITS APPLICATION IN STRATEGIC MANAGEMENT', Journal of Business Economics and Management, vol. 16, no. 1, pp. 93-116.
View/Download from: Publisher's site
View description>>
We introduce a new decision-making model that unifies risk and uncertain environments in the same formulation. For doing so, we present the induced probabilistic ordered weighted averaging (IPOWA) operator. It is an aggregation operator that unifies the probability with the OWA operator in the same formulation and considering the degree of importance of each concept in the aggregation. Moreover, it also uses induced aggregation operators that provide a more general representation of the attitudinal character of the decision-maker. We study its applicability and we see that it is very broad because all the previous studies that use the probability or the OWA operator can be revised and extended with this new approach. We briefly analyze some basic applications in statistics such as the implementation of this approach with the variance, the covariance, the Pearson coefficient and in a simple linear regression model. We focus on a multi-person decision-making problem in strategic management. Thus, we are able to construct a new aggregation operator that we call the multi-person IPOWA operator. Its main advantage is that it can deal with the opinion of several persons in the analysis so we can represent the information in a more complete way.
Merigo, JM & Gil-Lafuente, AM 2014, 'Computational Intelligence in Business Administration', COMPUTER SCIENCE AND INFORMATION SYSTEMS, vol. 11, no. 2.
Merigó, JM & Peris-Ortiz, M 2014, 'Entrepreneurship and Decision- Making in Latin America', Innovar, vol. 24, no. 1Spe, pp. 101-111.
View/Download from: Publisher's site
View description>>
The principal purpose of this paper is to analyze different methods for decision making, with a focus on entrepreneurship in Latin America. Decision-making methods may be informed by aggregation operators that are based on the use of probabilities, weighted averages (WAs) and generalized aggregation operators. The paper presents a new generalized probabilistic weighted averaging (GPWA) operator that unifies WAs and probability in the same formulation, considering the degree of importance of each concept used in the analysis. The fundamental advantage of this approach is that it includes a wide range of particular cases including the probabilistic weighted averaging (PWA) operator, the probabilistic weighted geometric averaging (PWGA) operator and the probabilistic weighted quadratic averaging (PWQA) operator. Quasi-arithmetic means are used to obtain the Quasi-PWA operator and to generalize the approach, which is then applied to a set of hypothetical entrepreneurial investment decisions in a politically unified Latin American region.
Merigó, JM, Casanovas, M & Liu, P 2014, 'Decision making with fuzzy induced heavy ordered weighted averaging operators', International Journal of Fuzzy Systems, vol. 16, no. 3, pp. 277-289.
View description>>
This paper presents the fuzzy induced heavy ordered weighted averaging (FIHOWA) operator. It is an aggregation operator that uses the main characteristics of three well known aggregation operators: the heavy OWA, the induced OWA and the fuzzy OWA operator. Therefore, this operator provides a parameterized family of aggregation operators that includes the OWA operator and the total operator as special cases. It uses order inducing variables in the reordering of its arguments and it deals with uncertain information represented in the form of fuzzy numbers. Some of the main properties of this operator are studied including a wide range of families of FIHOWA operators such as the fuzzy heavy weighted average and the fuzzy heavy average. An illustrative example in investment selection is also presented.
Merigó, JM, Casanovas, M & Palacios-Marqués, D 2014, 'Linguistic group decision making with induced aggregation operators and probabilistic information', Applied Soft Computing, vol. 24, pp. 669-678.
View/Download from: Publisher's site
Merigó, JM, Casanovas, M & Yang, J-B 2014, 'Group decision making with expertons and uncertain generalized probabilistic weighted aggregation operators', European Journal of Operational Research, vol. 235, no. 1, pp. 215-224.
View/Download from: Publisher's site
Merigó, JM, Casanovas, M & Zeng, S 2014, 'Distance measures with heavy aggregation operators', Applied Mathematical Modelling, vol. 38, no. 13, pp. 3142-3153.
View/Download from: Publisher's site
Merigo, JM, Engemann, KJ & Palacios-Marques, D 2014, 'DECISION MAKING WITH DEMPSTER-SHAFER BELIEF STRUCTURE AND THE OWAWA OPERATOR', Technological and Economic Development of Economy, vol. 19, no. Supplement_1, pp. S100-S118.
View/Download from: Publisher's site
View description>>
A new decision making model that uses the weighted average and the ordered weighted averaging (OWA) operator in the Dempster-Shafer belief structure is presented. Thus, we are able to represent the decision making problem considering objective and subjective information and the attitudinal character of the decision maker. For doing so, we use the ordered weighted averaging – weighted average (OWAWA) operator. It is an aggregation operator that unifies the weighted average and the OWA in the same formulation. This approach is generalized by using quasi-arithmetic means and group decision making techniques. An application of the new approach in a group decision making problem concerning political management of a country is also developed.
Musial, K, Bródka, P, Kazienko, P & Gaworecki, J 2014, 'Extraction of Multi-layered Social Networks from Activity Data', The Scientific World Journal, vol. 2014, p. 3.
View/Download from: Publisher's site
View description>>
The data gathered in all kind of web-based systems, which enable users tointeract with each other, provides an opportunity to extract social networksthat consist of people and relationships between them. The emerging structuresare very complex due to the number and type of discovered connections. Inwebbased systems, the characteristic element of each interaction between usersis that there is always an object that serves as a communication medium. Thiscan be e.g. an email sent from one user to another or post at the forumauthored by one user and commented by others. Based on these objects andactivities that users perform towards them, different kinds of relationshipscan be identified and extracted. Additional challenge arises from the fact thathierarchies can exist between objects, e.g. a forum consists of one or moregroups of topics, and each of them contains topics that finally include posts.In this paper, we propose a new method for creation of multi-layered socialnetwork based on the data about users activities towards different types ofobjects between which the hierarchy exists. Due to the flattening,preprocessing procedure new layers and new relationships in the multi-layeredsocial network can be identified and analysed.
Myles, A, Pietroni, N & Zorin, D 2014, 'Robust field-aligned global parametrization.', ACM Trans. Graph., vol. 33, pp. 135:1-135:1.
View/Download from: Publisher's site
Naderpour, M, Lu, J & Zhang, G 2014, 'A situation risk awareness approach for process systems safety', SAFETY SCIENCE, vol. 64, pp. 173-189.
View/Download from: Publisher's site
View description>>
Promoting situation awareness is an important design objective for a wide variety of domains, especially for process systems where the information flow is quite high and poor decisions may lead to serious consequences. In today's process systems, operators are often moved to a control room far away from the physical environment, and increasing amounts of information are passed to them via automated systems, they therefore need a greater level of support to control and maintain the facilities in safe conditions. This paper proposes a situation risk awareness approach for process systems safety where the effect of ever-increasing situational complexity on human decision-makers is a concern. To develop the approach, two important aspects - addressing hazards that arise from hardware failure and reducing human error through decision-making - have been considered. The proposed situation risk awareness approach includes two major elements: an evidence preparation component and a situation assessment component. The evidence preparation component provides the soft evidence, using a fuzzy partitioning method, that is used in the subsequent situation assessment component. The situation assessment component includes a situational network based on dynamic Bayesian networks to model the abnormal situations, and a fuzzy risk estimation method to generate the assessment result. A case from US Chemical Safety Board investigation reports has been used to illustrate the application of the proposed approach. © 2013 Elsevier Ltd.
Naderpour, M, Lu, J & Zhang, G 2014, 'An intelligent situation awareness support system for safety-critical environments', DECISION SUPPORT SYSTEMS, vol. 59, no. 1, pp. 325-340.
View/Download from: Publisher's site
View description>>
Operators handling abnormal situations in safety-critical environments need to be supported from a cognitive perspective to reduce their workload, stress, and consequent error rate. Of the various cognitive activities, a correct understanding of the situation, i.e. situation awareness (SA), is a crucial factor in improving performance and reducing error. However, existing system safety researches focus mainly on technical issues and often neglect SA. This study presents an innovative cognition-driven decision support system called the situation awareness support system (SASS) to manage abnormal situations in safety-critical environments in which the effect of situational complexity on human decision-makers is a concern. To achieve this objective, a situational network modeling process and a situation assessment model that exploits the specific capabilities of dynamic Bayesian networks and risk indicators are first proposed. The SASS is then developed and consists of four major elements: 1) a situation data collection component that provides the current state of the observable variables based on online conditions and monitoring systems, 2) a situation assessment component based on dynamic Bayesian networks (DBN) to model the hazardous situations in a situational network and a fuzzy risk estimation method to generate the assessment result, 3) a situation recovery component that provides a basis for decision-making to reduce the risk level of situations to an acceptable level, and 4) a human-computer interface. The SASS is partially evaluated by a sensitivity analysis, which is carried out to validate DBN-based situational networks, and SA measurements are suggested for a full evaluation of the proposed system. The performance of the SASS is demonstrated by a case taken from US Chemical Safety Board reports, and the results demonstrate that the SASS provides a useful graphical, mathematically consistent system for dealing with incomplete and uncertain info...
Naderpour, M, Lu, J & Zhang, G 2014, 'The explosion at institute: Modeling and analyzing the situation awareness factor', ACCIDENT ANALYSIS AND PREVENTION, vol. 73, pp. 209-224.
View/Download from: Publisher's site
View description>>
In 2008 a runaway chemical reaction caused an explosion at a methomyl unit in West Virginia, USA, killing two employees, injuring eight people, evacuating more than 40,000 residents adjacent to the facility, disrupting traffic on a nearby highway and causing significant business loss and interruption. Although the accident was formally investigated, the role of the situation awareness (SA) factor, i.e., a correct understanding of the situation, and appropriate models to maintain SA, remain unexplained. This paper extracts details of abnormal situations within the methomyl unit and models them into a situational network using dynamic Bayesian networks. A fuzzy logic system is used to resemble the operator's thinking when confronted with these abnormal situations. The combined situational network and fuzzy logic system make it possible for the operator to assess such situations dynamically to achieve accurate SA. The findings show that the proposed structure provides a useful graphical model that facilitates the inclusion of prior background knowledge and the updating of this knowledge when new information is available from monitoring systems.
Nemoto, K, Trupke, M, Devitt, SJ, Stephens, AM, Scharfenberger, B, Buczak, K, Nöbauer, T, Everitt, MS, Schmiedmayer, J & Munro, WJ 2014, 'Photonic Architecture for Scalable Quantum Information Processing in Diamond', Physical Review X, vol. 4, no. 3.
View/Download from: Publisher's site
Nguyen, TTS, Lu, HY & Lu, J 2014, 'Web-Page Recommendation Based on Web Usage and Domain Knowledge', IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol. 26, no. 10, pp. 2574-2587.
View/Download from: Publisher's site
Oberst, S, Baro, EN, Lai, JCS & Evans, TA 2014, 'Quantifying Ant Activity Using Vibration Measurements', PLoS ONE, vol. 9, no. 3, pp. e90902-e90902.
View/Download from: Publisher's site
Oberst, S, Evans, TA & Lai, JCS 2014, 'Novel Method for Pairing Wood Samples in Choice Tests', PLoS ONE, vol. 9, no. 2, pp. e88835-e88835.
View/Download from: Publisher's site
Paler, A, Devitt, SJ, Nemoto, K & Polian, I 2014, 'Mapping of Topological Quantum Circuits to Physical Hardware', Sci. Rep., vol. 4, p. 4657.
View/Download from: Publisher's site
View description>>
Topological quantum computation is a promising technique to achievelarge-scale, error-corrected computation. Quantum hardware is used to create alarge, 3-dimensional lattice of entangled qubits while performing computationrequires strategic measurement in accordance with a topological circuitspecification. The specification is a geometric structure that defines encodedinformation and fault-tolerant operations. The compilation of a topologicalcircuit is one important aspect of programming a quantum computer, another isthe mapping of the topological circuit into the operations performed by thehardware. Each qubit has to be controlled, and measurement results are neededto propagate encoded quantum information from input to output. In this work, weintroduce an algorithm for mapping an topological circuit to the operationsneeded by the physical hardware. We determine the control commands for eachqubit in the computer and the relevant measurements that are needed to trackinformation as it moves through the circuit.
Peng, S, Wu, M, Wang, G & Yu, S 2014, 'Containing smartphone worm propagation with an influence maximization algorithm', Computer Networks, vol. 74, pp. 103-113.
View/Download from: Publisher's site
Peng, S, Wu, M, Wang, G & Yu, S 2014, 'Propagation model of smartphone worms based on semi-Markov process and social relationship graph', Computers & Security, vol. 44, pp. 92-103.
View/Download from: Publisher's site
Peng, S, Yu, S & Yang, A 2014, 'Smartphone Malware and Its Propagation Modeling: A Survey', IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 925-941.
View/Download from: Publisher's site
Purba, JH, Lu, J, Zhang, G & Pedrycz, W 2014, 'A fuzzy reliability assessment of basic events of fault trees through qualitative data processing', FUZZY SETS AND SYSTEMS, vol. 243, no. 16, pp. 50-69.
View/Download from: Publisher's site
View description>>
Probabilistic approaches are common in the analysis of reliability of complex engineering systems. However, they require quantitative historical failure data for determining reliability characteristics. In many real-world areas, such as e.g., nuclear engineering, quantitative historical failure data are unavailable or become inadequate and only qualitative data such as expert opinions, which are described in linguistic terms, can be collected and then used to assess system reliability. Moreover, experts are more comfortable justifying event failure likelihood using linguistic terms, which capture uncertainties rather than by expressing judgments in a quantitative manner. New techniques are therefore needed that will help construct models of reliability of complex engineering system without being confined to quantitative historical failure data. The objective of this study is to develop a fuzzy reliability algorithm to effectively generate basic event failure probabilities without reliance on quantitative historical failure data through qualitative data processing. The originality of this study comes with an introduction of linguistic values articulated in terms of component failure possibilities in order to qualitatively assess basic event failure possibilities treated as inputs of the proposed model and generate basic event failure probabilities as its outputs. To demonstrate the feasibility and effectiveness of the proposed algorithm, actual basic event failure probabilities collected from nuclear power plant operating experiences are compared with the failure probabilities generated by the algorithm. The results demonstrate that the proposed fuzzy reliability algorithm arises as a suitable alternative for the probabilistic reliability approach when quantitative historical failure data are unavailable.
PURBA, JH, LU, JIE & ZHANG, G 2014, 'AN INTELLIGENT SYSTEM BY FUZZY RELIABILITY ALGORITHM IN FAULT TREE ANALYSIS FOR NUCLEAR POWER PLANT PROBABILISTIC SAFETY ASSESSMENT', International Journal of Computational Intelligence and Applications, vol. 13, no. 03, pp. 1450017-1450017.
View/Download from: Publisher's site
View description>>
Fault tree analysis for nuclear power plant probabilistic safety assessment is an intricate process. Personal computer-based software systems have therefore been developed to conduct this analysis. However, all existing fault tree analysis software systems only accept quantitative data to characterized basic event reliabilities. In real-world applications, basic event reliabilities may not be represented by quantitative data but by qualitative justifications. The motivation of this work is to develop an intelligent system by fuzzy reliability algorithm in fault tree analysis, which can accept not only quantitative data but also qualitative information to characterized reliabilities of basic events. In this paper, a newly-developed system called InFaTAS-NuSA is presented and its main features and capabilities are discussed. To benchmark the applicability of the intelligent concept implemented in InFaTAS-NuSA, a case study is performed and the analysis results are compared to the results obtained from a well-known fault tree analysis software package. The results confirm that the intelligent concept implemented in InFaTAS-NuSA can be very useful to complement conventional fault tree analysis software systems.
Qiao, M, Cheng, J, Bian, W & Tao, D 2014, 'Biview Learning for Human Posture Segmentation from 3D Points Cloud', PLoS ONE, vol. 9, no. 1, pp. e85811-e85811.
View/Download from: Publisher's site
View description>>
Posture segmentation plays an essential role in human motion analysis. The state-of-the-art method extracts sufficiently high-dimensional features from 3D depth images for each 3D point and learns an efficient body part classifier. However, high-dimensional features are memory-consuming and difficult to handle on large-scale training dataset. In this paper, we propose an efficient two-stage dimension reduction scheme, termed biview learning, to encode two independent views which are depth-difference features (DDF) and relative position features (RPF). Biview learning explores the complementary property of DDF and RPF, and uses two stages to learn a compact yet comprehensive low-dimensional feature space for posture segmentation. In the first stage, discriminative locality alignment (DLA) is applied to the high-dimensional DDF to learn a discriminative low-dimensional representation. In the second stage, canonical correlation analysis (CCA) is used to explore the complementary property of RPF and the dimensionality reduced DDF. Finally, we train a support vector machine (SVM) over the output of CCA. We carefully validate the effectiveness of DLA and CCA utilized in the two-stage scheme on our 3D human points cloud dataset. Experimental results show that the proposed biview learning scheme significantly outperforms the state-of-the-art method for human posture segmentation.
Qiao, Y, Sun, X & Yu, N 2014, 'Characterization of multipartite entanglement in terms of local transformations', IEEE Journal on Selected Areas in Communications 38 (3), 568-574 2020, pp. 1-6.
View description>>
The degree of the generators of invariant polynomial rings of is a longstanding open problem since the very initial study of the invariant theory inthe 19th century. Motivated by its significant role in characterizingmultipartite entanglement, we study the invariant polynomial rings of localunitary group---the tensor product of unitary group, and local general lineargroup---the tensor product of general linear group. For these two groups, weprove polynomial upper bounds on the degree of the generators of invariantpolynomial rings. On the other hand, systematic methods are provided to toconstruct all homogenous polynomials that are invariant under these two groupsfor any fixed degree. Thus, our results can be regarded as a completecharacterization of the invariant polynomial rings. As an interestingapplication, we show that multipartite entanglement is additive in the sensethat two multipartite states are local unitary equivalent if and only if$r$-copies of them are LU equivalent for some $r$.
Ramezani, F & Lu, J 2014, 'An intelligent group decision-support system and its application for project performance evaluation', Journal of Enterprise Information Management, vol. 27, no. 3, pp. 278-291.
View/Download from: Publisher's site
View description>>
Purpose In any organization there are main goals, with lots of projects designed to achieve these goals. It is important for any organization to determine how much these projects affect the achievement of these goals. The purpose of this paper is to develop a fuzzy multiple attribute-based group decision-support system (FMAGDSS) to evaluate projects performance in promoting the organization's goals utilizing simple additive weighting (SAW) algorithm and technique for order of preference by similarity to ideal solution (TOPSIS) algorithm. The proposed FMAGDSS deals with choosing the most appropriate fuzzy ranking algorithm for solving a given fuzzy multi attribute decision making (FMADM) problem with both qualitative and quantitative criteria (attributes), and uncertain judgments of decision makers. Design/methodology/approach In this paper, a FMAGDSS model is designed to determine scores and ranks of every project in promoting the organization's goals. In the first step of FMAGDSS model, all projects are assessed by experts based on evaluation criteria and the organization's goals. The proposed FMAGDSS model will then choose the most appropriate fuzzy ranking method to solve the given FMADM problem. Finally, a sensitivity analysis system is developed to assess the reliability of the decision-making process and provide an opportunity to analyze the impacts of criteria weights and projects performance on evaluating projects in achieving the organizations goals, and to assess the reliability of the decision-making process. In addition, a software prototype has been developed on the basis of FMAGDSS model that can be applied to solve every FMADM problem that needs to rank alternatives according to certain attributes. Findings The result of this study simplifies and accelerates the evaluation process. The proposed system not only helps organizations to choose the most efficient projects for sustainable development, but also helps them to assess the reliability of...
Ramezani, F, Lu, J & Hussain, FK 2014, 'Task-Based System Load Balancing in Cloud Computing Using Particle Swarm Optimization', INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, vol. 42, no. 5, pp. 739-754.
View/Download from: Publisher's site
View description>>
Live virtual machine (VM) migration is a technique for achieving system load balancing in a cloud environment by transferring an active VM from one physical host to another. This technique has been proposed to reduce the downtime for migrating overloaded VMs, but it is still time- and cost-consuming, and a large amount of memory is involved in the migration process. To overcome these drawbacks, we propose a Task-based System Load Balancing method using Particle Swarm Optimization (TBSLB-PSO) that achieves system load balancing by only transferring extra tasks from an overloaded VM instead of migrating the entire overloaded VM. We also design an optimization model to migrate these extra tasks to the new host VMs by applying Particle Swarm Optimization (PSO). To evaluate the proposed method, we extend the cloud simulator (Cloudsim) package and use PSO as its task scheduling model. The simulation results show that the proposed TBSLB-PSO method significantly reduces the time taken for the load balancing process compared to traditional load balancing approaches. Furthermore, in our proposed approach the overloaded VMs will not be paused during the migration process, and there is no need to use the VM pre-copy process. Therefore, the TBSLB-PSO method will eliminate VM downtime and the risk of losing the last activity performed by a customer, and will increase the Quality of Service (QoS) experienced by cloud customers.
Rehman, ZU, Hussain, OK & Hussain, FK 2014, 'Parallel Cloud Service Selection and Ranking Based on QoS History', INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, vol. 42, no. 5, pp. 820-852.
View/Download from: Publisher's site
Saberi, M, Eslami, N, Hussain, OK & Ashjari, B 2014, 'Towards fuzzy decision making approach for optimal pipeline routing', Engineering Intelligent Systems, vol. 22, no. 1, pp. 15-20.
View description>>
The establishment of policies regarding energy efficiency has been a very significant issue recently. Such energy policies should consider pipeline routing modeling since it includes several advantages. Pipelines are the most efficient, cost effective economical and environmentally friendly means of fluid transportation. When selecting the route of a cross-country pipeline, the goal is to provide the best utility for the public while minimizing the negative impacts on the population and the natural environment. Hence, the manual routing processes are very tedious. The presented model consists of forty factors, each of which is weighted according to its impact. The relationship between factors underlying traditional decisions in a calculative math model is presented for the first time. The current model is able to accelerate the process of routing by allowing those companies that do not have capability, to apply the geographic information systems. National Iranian Gas Engineering ranked the optional routes
Scala, NM, Rajgopal, J & Needy, KL 2014, 'Managing Nuclear Spare Parts Inventories: A Data Driven Methodology', IEEE Transactions on Engineering Management, vol. 61, no. 1, pp. 28-37.
View/Download from: Publisher's site
View description>>
In this paper, the authors analyse knowledge management (KM) practices in civil aviation industry and introduce a framework for better management of knowledge in aircraft engineering (AE). After comprehensive review of KM literature, this paper offers insights into the existing KM practices in AE using a case study in the Saudi Arabian Aviation industry (SAAI). The KM research data was collected through discussions and interviews as well as through observations during one of the authorâs employment as aircraft engineer in the SAAI. Synthesis of these results with the KM literature was used to identify the gaps between the KM theory and current practices in AE. Finally, an operations-based knowledge management (OBKM) system framework was developed to address these gaps and overcome ineffectiveness in current practices.
Shouzhen, Z, Qifeng, W, Merigó, J & Tiejun, P 2014, 'Induced intuitionistic fuzzy ordered weighted averaging: Weighted average operator and its application to business decision-making', Computer Science and Information Systems, vol. 11, no. 2, pp. 839-857.
View/Download from: Publisher's site
View description>>
We present the induced intuitionistic fuzzy ordered weighted averaging-weighted average (I-IFOWAWA) operator. It is a new aggregation operator that uses the intuitionistic fuzzy weighted average (IFWA) and the induced intuitionistic fuzzy ordered weighted averaging (I-IFOWA) operator in the same formulation. We study some of its main properties and we have seen that it has a lot of particular cases such as the IFWA and the intuitionistic fuzzy ordered weighted averaging (IFOWA) operator. We also study its applicability in a decision-making problem concerning strategic selection of investments. We see that depending on the particular type of I-IFOWAWA operator used, the results may lead to different decisions.
Spermon, M, Schouten, I & Hoven, EVD 2014, 'Designing interaction in digital tabletop games to support collaborative learning in children', International Journal of Learning Technology, vol. 9, no. 1, pp. 3-3.
View/Download from: Publisher's site
View description>>
According to Dillenbourg et al. (1996), collaborative learning occurs when two or more people try to learn something together. This process consists of four successive stages, one of which concerns collaborative interactions. In this paper we present two studies that implemented two different ways of increasing the number of collaborative interactions. To increase the number of collaborative interactions in a game, the first study focused on degrees of collaboration (Kahn and Mentzer, 1996) and the second study focused on cooperative gestures (Morris et al., 2006a), which were used in the third degree of the first study. In order to facilitate collaborative interactions and its properties (Dillenbourg, 1991), we decided to design two digital tabletop games with tangible interaction that both require collaboration to win. The evaluations in both studies, by means of the Wizard of Oz method, showed a significant increase in collaborative interactions. We also found that verbal and gestural interactions are a better measure criterion for tabletop games than how much people look at each other.
Su, Z, Wang, J, Lu, H & Zhao, G 2014, 'A new hybrid model optimized by an intelligent optimization algorithm for wind speed forecasting', Energy Conversion and Management, vol. 85, pp. 443-452.
View/Download from: Publisher's site
Summers, C, Singh, NR, White, JF, Mackenzie, IM, Johnston, A, Solanki, C, Balan, KK, Peters, AM & Chilvers, ER 2014, 'Pulmonary retention of primed neutrophils: a novel protective host response, which is impaired in the acute respiratory distress syndrome', Thorax, vol. 69, no. 7, pp. 623-629.
View/Download from: Publisher's site
Sun, L, Dong, H, Hussain, FK, Hussain, OK & Chang, E 2014, 'Cloud service selection: State-of-the-art and future research directions', JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, vol. 45, no. 1, pp. 134-150.
View/Download from: Publisher's site
Tafavogh, S, Catchpoole, DR & Kennedy, PJ 2014, 'Cellular quantitative analysis of neuroblastoma tumor and splitting overlapping cells', BMC BIOINFORMATICS, vol. 15, no. 1.
View/Download from: Publisher's site
View description>>
© 2014 Tafavogh et al.; licensee BioMed Central Ltd. Background: Neuroblastoma Tumor (NT) is one of the most aggressive types of infant cancer. Essential to accurate diagnosis and prognosis is cellular quantitative analysis of the tumor. Counting enormous numbers of cells under an optical microscope is error-prone. There is therefore an urgent demand from pathologists for robust and automated cell counting systems. However, the main challenge in developing these systems is the inability of them to distinguish between overlapping cells and single cells, and to split the overlapping cells. We address this challenge in two stages by: 1) distinguishing overlapping cells from single cells using the morphological differences between them such as area, uniformity of diameters and cell concavity; and 2) splitting overlapping cells into single cells. We propose a novel approach by using the dominant concave regions of cells as markers to identify the overlap region. We then find the initial splitting points at the critical points of the concave regions by decomposing the concave regions into their components such as arcs, chords and edges, and the distance between the components is analyzed using the developed seed growing technique. Lastly, a shortest path determination approach is developed to determine the optimum splitting route between two candidate initial splitting points.Results: We compare the cell counting results of our system with those of a pathologist as the ground-truth. We also compare the system with three state-of-the-art methods, and the results of statistical tests show a significant improvement in the performance of our system compared to state-of-the-art methods. The F-measure obtained by our system is 88.70%. To evaluate the generalizability of our algorithm, we apply it to images of follicular lymphoma, which has similar histological regions to NT. Of the algorithms tested, our algorithm obtains the highest F-measure of 92.79%.Conclusion:...
Thapngam, T, Yu, S, Zhou, W & Makki, SK 2014, 'Distributed Denial of Service (DDoS) detection by traffic pattern analysis', Peer-to-Peer Networking and Applications, vol. 7, no. 4, pp. 346-358.
View/Download from: Publisher's site
van den Hoven, E 2014, 'A future-proof past: Designing for remembering experiences', MEMORY STUDIES, vol. 7, no. 3, pp. 370-384.
View/Download from: Publisher's site
View description>>
Personal remembering can be heavily influenced by the context in which it takes place, which includes external factors such as people, locations and things. These things can be physical, digital or a combination of both, such as digital photographs displayed on a physical screen. Together, these media and media carriers can act as memory cues, which in turn can be purposely created for the support of remembering experiences. The aim of this article is to show the challenges, potential and opportunities of this multidisciplinary research area, Materialising Memories, which creates interactive designs to be used in context. This will be illustrated through the presentation of two design case studies supporting photo sharing in everyday life: Cueb and 4Photos.
van den Hoven, E 2014, 'Remembering in everyday life: opportunities for design', Tijdschrift voor Human Factors, vol. 39, no. 4, pp. 31-34.
View description>>
Human remembering is a central and crucial aspect of our everyday lives, even though most of us are not aware of this. One might think that for remembering we only need to use our brains, but more and more evidence shows the outside world’sinfluence on our memory and memories, which provides us with lots of opportunitiesfor the future. In this paper the focus will lie on our physical and technologicalenvironment, and how these relate to remembering in the complexities of everydaylife. Human remembering will be explained and designed interventions will bepresented that have been created to support everyday remembering.
van den Hoven, E & Eggen, B 2014, 'The Cue Is Key Design for Real-Life Remembering', ZEITSCHRIFT FUR PSYCHOLOGIE-JOURNAL OF PSYCHOLOGY, vol. 222, no. 2, pp. 110-117.
View/Download from: Publisher's site
View description>>
This paper aims to put the memory cue in the spotlight. We show how memory cues are incorporated in the area of interaction design. The focus is on external memory cues - cues that exist outside the human mind but have an internal effect on memory reconstruction. Examples of external cues include people, environments, and things, where the latter are most relevant for the aim of this paper since these cues can be incorporated in designs. This paper makes a dual contribution to research: (1) it provides insights into how memory research informs the design of devices to facilitate personal memory recall; and (2) by taking a design perspective, it raises questions about memory cues as part of real-life remembering to inform psychological memory research. Since memory theory inspires design and both fields would benefit from collaboration, we would like these questions to be an inspiration for future memory research, in particular targeting external memory cues.
Voinov, A & Filatova, T 2014, 'Pricing strategies in inelastic energy markets: can we use less if we can’t extract more?', Frontiers of Earth Science, vol. 8, no. 1, pp. 3-17.
View/Download from: Publisher's site
Voinov, A, Seppelt, R, Reis, S, Nabel, JEMS & Shokravi, S 2014, 'Values in socio-environmental modelling: Persuasion for action or excuse for inaction', Environmental Modelling & Software, vol. 53, pp. 207-212.
View/Download from: Publisher's site
Wang, H, Xu, Y & Merigó, JM 2014, 'Prioritized aggregation for non-homogeneous group decision making in water resource management', Economic Computation and Economic Cybernetics Studies and Research, vol. 48, no. 1, pp. 247-257.
View description>>
This paper deals with non-homogeneous group decision making problems in water resource management, in which there exists a prioritization of decision makers. The group decision makers are partitioned into three sets: the officials from government, the experts in water resource management, the users of water resources. There exists a prioritization relationship over the different sets of decision makers. In order to aggregate a collective preference based on the aggregation of different individual preferences, we suggest that prioritization between decision makers can modeled by making the weights associated with a decision maker dependent upon the satisfaction of the higher priority decision maker. Then, a so-called prioritized weighted aggregation operator based on ordered weighted averaging (OWA) is utilized to aggregate the preference values provided by different decision makers. Finally, an application in water resource management is provided to illustrate the usefulness and how the prioritized aggregation works in practice.
Wang, Y-K, Chen, S-A & Lin, C-T 2014, 'An EEG-based brain–computer interface for dual task driving detection', Neurocomputing, vol. 129, pp. 85-93.
View/Download from: Publisher's site
View description>>
The development of brain-computer interfaces (BCI) for multiple applications has undergone extensive growth in recent years. Since distracted driving is a significant cause of traffic accidents, this study proposes one BCI system based on EEG for distracted driving. The removal of artifacts and the selection of useful brain sources are the essential and critical steps in the application of electroencephalography (EEG)-based BCI. In the first model, artifacts are removed, and useful brain sources are selected based on the independent component analysis (ICA). In the second model, all distracted and concentrated EEG epochs are recognized with a self-organizing map (SOM). This BCI system automatically identified independent components with artifacts for removal and detected distracted driving through the specific brain sources which are also selected automatically. The accuracy of the proposed system approached approximately 90% for the recognition of EEG epochs of distracted and concentrated driving according to the selected frontal and left motor components. © 2013.
Wei, B, Jin, Z, Zowghi, D & Yin, B 2014, 'Implementation decision making for internetware driven by quality requirements', Science China Information Sciences, vol. 57, no. 7, pp. 1-19.
View/Download from: Publisher's site
View description>>
Internetware is an emerging software paradigm in the open, dynamic and ever-changing Internet environment. A successful internetware must demonstrate acceptable degree of quality when carrying out its functionality. Hence, when internetware is being dynamically constructed, making implementation decisions to satisfice the quality requirements becomes a critical issue. In the traditional software engineering, quality requirements are usually refined stepwise by sub-requirements utilizing goal modeling perspective, until some potential functional design alternatives are identified. The goal-oriented paradigms have adopted graphical goal models to reason about quality requirements and proposed qualitative or quantitative reasoning schemas. However, these techniques may become unviable due to the ever-changing operating environment and demands for run-time decision making. In this paper, we propose an approach for implementation decision making driven by quality requirements for internetware. It focuses on the symbolic formula representation of requirements goal models with the tree structure, which is of well-defined syntax and clear traceability. Furthermore, we explore some reasoning rules which effectively automate each reasoning action on the formulae. This supports multiple-factor decision making. A case study is also provided to illustrate our proposed approach. We have developed a supporting tool based on our theoretical approach that we also present in this paper. © 2014 Science China Press and Springer-Verlag Berlin Heidelberg.
Wen, S, Jiang, J, Xiang, Y, Yu, S & Zhou, W 2014, 'Are the Popular Users Always Important for Information Dissemination in Online Social Networks?', IEEE NETWORK, vol. 28, no. 5, pp. 64-67.
View/Download from: Publisher's site
Wen, S, Jiang, J, Xiang, Y, Yu, S, Zhou, W & Jia, W 2014, 'To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks', IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, vol. 25, no. 12, pp. 3306-3316.
View/Download from: Publisher's site
Xie, F, Fan, S, Wang, J, Lu, H & Li, C 2014, 'Artificial Intelligence and Data Mining 2014', Abstract and Applied Analysis, vol. 2014, pp. 1-2.
View/Download from: Publisher's site
Xiong, P, Wang, X, Niu, W, Zhu, T & Li, G 2014, 'Android malware detection with contrasting permission patterns', China Communications, vol. 11, no. 8, pp. 1-14.
View/Download from: Publisher's site
View description>>
As the risk of malware is sharply increasing in Android platform, Android malware detection has become an important research topic. Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis, but how to exploit those permission patterns for malware detection remains an open issue. In this paper, we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect. Then a framework based on contrasting permission patterns is presented for Android malware detection. According to the proposed framework, an ensemble classifier, Enclamald, is further developed to detect whether an application is potentially malicious. Every contrasting permission pattern is acting as a weak classifier in Enclamald, and the weighted predictions of involved weak classifiers are aggregated to the final result. Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.
Xiong, P, Zhu, TQ & Wang, XF 2014, 'A survey on differential privacy and applications', Jisuanji Xuebao/Chinese Journal of Computers, vol. 37, no. 1, pp. 101-122.
View/Download from: Publisher's site
View description>>
Privacy preserving in data release and mining is a hot topic in the information security field currently. As a new privacy notion, differential privacy (DP) has grown in popularity recently due to its rigid and provable privacy guarantee. After analyzing the advantage of differential privacy model relative to the traditional ones, this paper surveys the theory of differential privacy and its application on two aspects, privacy preserving data release (PPDR) and privacy preserving data mining (PPDM). In PPDR, we introduce the DP-based data release methodologies in interactive/non-interactive settings and compare them in terms of accuracy and sample complexity. In PPDM, we mainly summarize the implementation of DP in various data mining algorithms with interface-based/fully access-based modes as well as evaluating the performance of the algorithms. We finally review other applications of DP in various fields and discuss the future research directions.
Xu, G, Zhou, A & Agarwal, N 2014, 'Special Issue on Social Computing and its Applications', The Computer Journal, vol. 57, no. 9, pp. 1279-1280.
View/Download from: Publisher's site
Xu, Y, Wang, H & Merigó, JM 2014, 'INTUITIONISTIC FUZZY EINSTEIN CHOQUET INTEGRAL OPERATORS FOR MULTIPLE ATTRIBUTE DECISION MAKING', Technological and Economic Development of Economy, vol. 20, no. 2, pp. 227-253.
View/Download from: Publisher's site
View description>>
In this paper, we propose some new aggregation operators which are based on the Choquet integral and Einstein operations. The operators not only consider the importance of the elements or their ordered positions, but also consider the interactions phenomena among the decision making criteria or their ordered positions. It is shown that the proposed operators generalize several intuitionistic fuzzy Einstein aggregation operators. Moreover, some of their properties are investigated. We also study the relationship between the proposed operators and the existing intuitionistic fuzzy Choquet aggregation operators. Furthermore, an approach based on intuitionistic fuzzy Einstein Choquet integral operators is presented for multiple attribute decision-making problem. Finally, a practical decision making problem involving the water resource management is given to illustrate the multiple attribute decision making process.
Yang-Yin Lin, Shih-Hui Liao, Jyh-Yeong Chang & Chin-Teng Lin 2014, 'Simplified Interval Type-2 Fuzzy Neural Networks', IEEE Transactions on Neural Networks and Learning Systems, vol. 25, no. 5, pp. 959-969.
View/Download from: Publisher's site
View description>>
This paper describes a self-evolving interval type-2 fuzzy neural network (FNN) for various applications. As type-1 fuzzy systems cannot effectively handle uncertainties in information within the knowledge base, we propose a simple interval type-2 FNN, which uses interval type-2 fuzzy sets in the premise and the Takagi-Sugeno-Kang (TSK) type in the consequent of the fuzzy rule. The TSK-type consequent of fuzzy rule is a linear combination of exogenous input variables. Given an initially empty the rule-base, all rules are generated with on-line type-2 fuzzy clustering. Instead of the time-consuming K-M iterative procedure, the design factors ql and qr are learned to adaptively adjust the upper and lower positions on the left and right limit outputs, using the parameter update rule based on a gradient descent algorithm. Simulation results demonstrate that our approach yields fewer test errors and less computational complexity than other type-2 FNNs. © 2012 IEEE.
Yi-Hsin Yu, Shao-Wei Lu, Lun-De Liao & Chin-Teng Lin 2014, 'Design, Fabrication, and Experimental Validation of Novel Flexible Silicon-Based Dry Sensors for Electroencephalography Signal Measurements', IEEE Journal of Translational Engineering in Health and Medicine, vol. 2, pp. 1-7.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Many commercially available electroencephalography (EEG) sensors, including conventional wet and dry sensors, can cause skin irritation and user discomfort owing to the foreign material. The EEG products, especially sensors, highly prioritize the comfort level during devices wear. To overcome these drawbacks for EEG sensors, this paper designs Societe Generale de Surveillance S A c(SGS)-certified, silicon-based dry-contact EEG sensors (SBDSs) for EEG signal measurements. According to the SGS testing report, SBDSs extract does not irritate skin or induce noncytotoxic effects on L929 cells according to ISO10993-5. The SBDS is also lightweight, flexible, and nonirritating to the skin, as well as capable of easily fitting to scalps without any skin preparation or use of a conductive gel. For forehead and hairy sites, EEG signals can be measured reliably with the designed SBDSs. In particular, for EEG signal measurements at hairy sites, the acicular and flexible design of SBDS can push the hair aside to achieve satisfactory scalp contact, as well as maintain low skin-electrode interface impedance. Results of this paper demonstrate that the proposed sensors perform well in the EEG measurements and are feasible for practical applications.
Yin, H, Cui, B, Sun, Y, Hu, Z & Chen, L 2014, 'LCARS', ACM Transactions on Information Systems, vol. 32, no. 3, pp. 1-37.
View/Download from: Publisher's site
View description>>
Newly emerging location-based and event-based social network services provide us with a new platform to understand users' preferences based on their activity history. A user can only visit a limited number of venues/events and most of them are within a limited distance range, so the user-item matrix is very sparse, which creates a big challenge to the traditional collaborative filtering-based recommender systems. The problem becomes even more challenging when people travel to a new city where they have no activity information. In this article, we propose LCARS, a location-content-aware recommender system that offers a particular user a set of venues (e.g., restaurants and shopping malls) or events (e.g., concerts and exhibitions) by giving consideration to both personal interest and local preference. This recommender system can facilitate people's travel not only near the area in which they live, but also in a city that is new to them. Specifically, LCARS consists of two components: offline modeling and online recommendation. The offline modeling part, called LCA-LDA, is designed to learn the interest of each individual user and the local preference of each individual city by capturing item cooccurrence patterns and exploiting item contents. The online recommendation part takes a querying user along with a querying city as input, and automatically combines the learned interest of the querying user and the local preference of the querying city to produce the top- k recommendations. To speed up the online process, a scalable query processing technique is developed by extending both the Threshold Algorithm (TA) and TA-approximation algorithm. We evaluate the performance of our recommender system on two real datasets, that is, DoubanEvent and Foursquare, and one large-scale synthetic dataset. The results show the superiority of LCARS in recommending spatial it...
Yu, S, Lin, X & Misic, J 2014, 'Networking for big data [Guest Editorial]', IEEE Network, vol. 28, no. 4, pp. 4-4.
View/Download from: Publisher's site
Yu, S, Sood, K & Xiang, Y 2014, 'An Effective and Feasible Traceback Scheme in Mobile Internet Environment', IEEE Communications Letters, vol. 18, no. 11, pp. 1911-1914.
View/Download from: Publisher's site
Yu, S, Tian, Y, Guo, S & Wu, DO 2014, 'Can We Beat DDoS Attacks in Clouds?', IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2245-2254.
View/Download from: Publisher's site
Zhang, G & Zuo, H 2014, 'Research on multi-objective linear programming problem with fuzzy coefficients in constraints', International Journal of Machine Learning and Cybernetics, vol. 5, no. 3, pp. 403-412.
View/Download from: Publisher's site
Zhao, W, Wang, J & Lu, H 2014, 'Combining forecasts of electricity consumption in China with time-varying weights updated by a high-order Markov chain model', Omega, vol. 45, pp. 80-91.
View/Download from: Publisher's site
View description>>
Electricity consumption forecasting has been always playing a vital role in power system management and planning. Inaccurate prediction may cause wastes of scarce energy resource or electricity shortages. However, forecasting electricity consumption has proven to be a challenging task due to various unstable factors. Especially, China is undergoing a period of economic transition, which highlights this difficulty. This paper proposes a time-varying-weight combining method, i.e. High-order Markov chain based Time-varying Weighted Average (HM-TWA) method to predict the monthly electricity consumption in China. HM-TWA first calculates the in-sample time-varying combining weights by quadratic programming for the individual forecasts. Then it predicts the out-of-sample time-varying adaptive weights through extrapolating these in-sample weights using a high-order Markov chain model. Finally, the combined forecasts can be obtained. In addition, to ensure that the sample data have the same properties as the required forecasts, a reasonable multi-step-ahead forecasting scheme is designed for HM-TWA. The out-of-sample forecasting performance evaluation shows that HM-TWA outperforms the component models and traditional combining methods, and its effectiveness is further verified by comparing it with some other existing models. © 2014 Elsevier Ltd.
Zhou, H, Liu, B, Liu, Y, Zhang, N, Gui, L, Li, Y, Shen, XS & Yu, Q 2014, 'A Cooperative Matching Approach for Resource Management in Dynamic Spectrum Access Networks', IEEE Transactions on Wireless Communications, vol. 13, no. 2, pp. 1047-1057.
View/Download from: Publisher's site
Zhou, H, Liu, B, Luan, TH, Hou, F, Gui, L, Li, Y, Yu, Q & Shen, X 2014, 'ChainCluster: Engineering a Cooperative Content Distribution Framework for Highway Vehicular Communications', IEEE Transactions on Intelligent Transportation Systems, vol. 15, no. 6, pp. 2644-2657.
View/Download from: Publisher's site
Zhu, T, Ren, Y, Zhou, W, Rong, J & Xiong, P 2014, 'An effective privacy preserving algorithm for neighborhood-based collaborative filtering', Future Generation Computer Systems, vol. 36, pp. 142-155.
View/Download from: Publisher's site
View description>>
As a popular technique in recommender systems, Collaborative Filtering (CF) has been the focus of significant attention in recent years, however, its privacy-related issues, especially for the neighborhood-based CF methods, cannot be overlooked. The aim of this study is to address these privacy issues in the context of neighborhood-based CF methods by proposing a Private Neighbor Collaborative Filtering (PNCF) algorithm. This algorithm includes two privacy preserving operations: Private Neighbor Selection and Perturbation. Using the item-based method as an example, Private Neighbor Selection is constructed on the basis of the notion of differential privacy, meaning that neighbors are privately selected for the target item according to its similarities with others. Recommendation-Aware Sensitivity and a re-designed differential privacy mechanism are introduced in this operation to enhance the performance of recommendations. A Perturbation operation then hides the true ratings of selected neighbors by adding Laplace noise. The PNCF algorithm reduces the magnitude of the noise introduced from the traditional differential privacy mechanism. Moreover, a theoretical analysis is provided to show that the proposed algorithm can resist a KNN attack while retaining the accuracy of recommendations. The results from experiments on two real datasets show that the proposed PNCF algorithm can obtain a rigid privacy guarantee without high accuracy loss. © 2013 Published by Elsevier B.V. All rights reserved.
Adak, C 1970, 'A bilingual machine translation system: English & Bengali', 2014 First International Conference on Automation, Control, Energy and Systems (ACES), 2014 First International Conference on Automation, Control, Energy and Systems (ACES), IEEE, INDIA, pp. 271-274.
View/Download from: Publisher's site
Adak, C 1970, 'An approach for printed document labeling', 2014 First International Conference on Automation, Control, Energy and Systems (ACES), 2014 First International Conference on Automation, Control, Energy and Systems (ACES), IEEE, INDIA, pp. 23-26.
View/Download from: Publisher's site
Adak, C 1970, 'Gabor Filter and Rough Clustering Based Edge Detection', 2013 INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTIONS (ICHCI), International Conference on Human Computer Interactions (ICHCI), IEEE, Chennai, INDIA.
View description>>
This paper introduces an efficient edge detection method based on Gaborfilter and rough clustering. The input image is smoothed by Gabor function, andthe concept of rough clustering is used to focus on edge detection with softcomputational approach. Hysteresis thresholding is used to get the actualoutput, i.e. edges of the input image. To show the effectiveness, the proposedtechnique is compared with some other edge detection methods.
Adak, C 1970, 'Unsupervised Text Extraction from G-Maps', 2013 INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTIONS (ICHCI), International Conference on Human Computer Interactions (ICHCI), IEEE, Chennai, INDIA.
View description>>
This paper represents an text extraction method from Google maps, GISmaps/images. Due to an unsupervised approach there is no requirement of anyprior knowledge or training set about the textual and non-textual parts. FuzzyCMeans clustering technique is used for image segmentation and Prewitt methodis used to detect the edges. Connected component analysis and griddingtechnique enhance the correctness of the results. The proposed method reaches98.5% accuracy level on the basis of experimental data sets.
Adak, C & Chaudhuri, BB 1970, 'An Approach of Strike-Through Text Identification from Handwritten Documents', 2014 14th International Conference on Frontiers in Handwriting Recognition, 2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR), IEEE, Hersonissos, GREECE, pp. 643-648.
View/Download from: Publisher's site
Adak, C & Chaudhuri, BB 1970, 'Text Line Identification in Tagore's Manuscript', Proc. IEEE TechSym-2014, IEEE Conf. #32812, pp. 210-213, Kharagpur, India, 28 Feb.-2 Mar., 2014, 3rd IEEE Students' Technology Symposium (IEEE TechSym), IEEE, IIT Kharagpur, Kharagpur, INDIA, pp. 210-213.
View description>>
In this paper, a text line identification method is proposed. The text linesof printed document are easy to segment due to uniform straightness of thelines and sufficient gap between the lines. But in handwritten documents, theline is non-uniform and interline gaps are variable. We take RabindranathTagore's manuscript as it is one of the most difficult manuscripts that containdoodles. Our method consists of a pre-processing stage to clean the documentimage. Then we separate doodles from the manuscript to get the textual region.After that we identify the text lines on the manuscript. For text lineidentification, we use window examination, black run-length smearing,horizontal histogram and connected component analysis.
Ahadi, A, Teague, D & Lister, RF 1970, 'Falling Behind Early and Staying Behind When Learning to Program', Philosophy of Programming Interest Group, Psychology of Programming Interest Group Annual Conference, Darwin College, Brighton, United Kingdom, pp. 77-88.
View description>>
We have performed a study of novice programmers, using students at two different institutions, who were learning different programming languages. Influenced by the work of Dehnadi and Bornat, we gave our students a simple test, of our own devising, in their first three weeks of formal instruction in programming. That test only required knowledge of assignment statements. We found a wide performance difference among our two student cohorts. Furthermore, our test was a good indication of how students performed about 10 weeks later, in their final programming exam. We interpret our results in terms of our neo-Piagetian theory of how novices learn to program.
Aljaafreh, A, Gill, AQ & Ani, AA 1970, 'Towards the development of an initial trust model for the adoption of internet banking services in Jordan', Proceedings - Pacific Asia Conference on Information Systems, PACIS 2014, Pacific Asia Conference on Information Systems, AIS, Chengdu, China, pp. 1-11.
View description>>
Internet banking service (IBS) is transforming the traditional ways of customer banking. Although IBS is very common in developed countries, however, its adoption by customers in developing countries is still very slow. This may well be due to the lack of customer's trust in IBS in developing countries. This paper studies the important issue of customer's initial trust in IBS in the Jordanian context and proposes the customer initial trust model. The objective of this model is to understand and analyse the underlying factors that affect the early stage of trust (i.e. initial customer trust) in IBS, which may, impact customer's initial intention to use IBS. The proposed model of customer's initial trust in IBS integrates constructs from Diffusion of Innovation (DoI) theory, Hofstede culture theory and trust literature. The distinguishable property of this model is the incorporation of national culture dimensions on initial trust. The proposed model will assist Jordanian banks in understanding the factors that may impact their customers' initial trust in IBS.
Alzoubi, YI & Gill, AQ 1970, 'Agile Global Software Development Communication Challenges: a Systematic Review.', PACIS, Pacific Asia Conference on Information Systems, AIS, Chengdu, China, pp. 20-20.
View description>>
Organizations have shown a significant interest in adopting human and communication-oriented agile practices for Global Software Development (GSD). Agile practices originated in the context of small and medium co-located project teams present a number of communication challenges when they are applied to the distributed GSD. There is a need to understand the underlying communication challenges of agile GSD environment. This paper adopts a Systematic Literature Review (SLR) approach and reports communication challenges in the agile GSD context. A customized literature search and selection criteria was first developed and then applied to initially identify a set of 449 papers. Finally, 22 of 449 papers, relevant to this research, were selected for this study. These final 22 papers were reviewed and 7 major categories of communication challenges were identified in the context of agile GSD. The review results of this paper are expected to help researchers and practitioners to understand communication challenges of agile GSD and develop tools, techniques and strategies to deal with these challenges. This paper is limited to the number of reviewed studies from selected databases.
Argent, RM, Sojda, RS, Guipponi, C, McIntosh, B & Voinov, AA 1970, 'Best practice in conceptual modelling for environmental software development', Proceedings - 7th International Congress on Environmental Modelling and Software: Bold Visions for Environmental Modeling, iEMSs 2014, pp. 2377-2386.
View description>>
Conceptual modelling is used in many fields with a varying degree of formality. In environmental applications, conceptual models are used to express relationships, explore and test ideas, check inference and causality, identify knowledge and data gaps, synchronize mental models and build consensus, and to highlight key or dominant processes. Conceptual model representations range from simple box and line interaction diagrams, through interaction representations and causal models, to complicated formal representations of the relationships between actors or entities, or between states and processes. Due to their sometimes apparent simplicity, the development and use of a conceptual model is often an attractive option when tackling an environmental problem where the system is either not well understood, or where the understanding of the system is not shared amongst stakeholders. However, we have experienced many examples where conceptual modelling has failed to live up to the promises of managing complexity and aiding decision making. This paper explores the development and application of conceptual modelling to environmental problems, and identifies a range of best practices for environmental scientists and managers that include considerations of stakeholder participation, model development and representation, integration of different and disparate conceptual models, model maturation, testing, and transition to application within the problem situation.
Azadeh, A, Kokabi, R, Saberi, M, Hussain, FK, Hussain, OK & IEEE 1970, 'Trust Prediction Using Z-numbers and Artificial Neural Networks', 2014 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), IEEE International Conference on Fuzzy Systems, IEEE - Institute of Electrical and Electronics Engineers, Beijing, China, pp. 522-528.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Trust modeling of both the interacting parties in a virtual world, is a critical element of business intelligence. A key aspect in trust modeling is to be able to accurately predict the future trust value of an interacting party. In this paper, we propose an intelligent method for predicting the future trust value of a trusted entity. We propose the use of Z-number to represent both the trust value and its corresponding reliability. Subsequently, we apply Artificial Neural Network (ANN) to predict future trust values. We generate a large number of synthetic time series, with a view to model real-world trust values of trusted entity. We validate the working of our methodology using the generated time series.
Azadeh, A, Songhori, MH, Saberi, M, Hosseini, S, Salarvand, F & Pazhoheshfar, P 1970, 'Deterministic bundle pricing of two products with limited stock', 2014 Iranian Conference on Intelligent Systems (ICIS), 2014 Iranian Conference on Intelligent Systems (ICIS), IEEE, Bam, IRAN.
View/Download from: Publisher's site
Azadeh, A, Zadeh, SA, Saberi, M, Hussain, FK, Hussain, OK & IEEE 1970, 'A trust-based performance measurement modeling using DEA, T-norm and S-norm operators', 2014 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), IEEE International Conference on Fuzzy Systems, IEEE - Institute of Electrical and Electronics Engineers, Beijing, China, pp. 1913-1920.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. In today's highly dynamic economy and society, the performance evaluation of Decision Making Units (DMUs) is of high importance. This study presents an efficient model for analyzing the outputs of performance measurement methodologies by means of trust, which provides explicit qualitative scales instead of representing pure numerical data. The efficiency rate of the current, previous and coming years, as well as the average efficiency and standard deviation, are the five inputs for this model. These efficiency rates are calculated using Data Envelopment Analysis (DEA). The approach uses time series forecasting to predict the future efficiency rate. Furthermore, the implemented Auto Regressive (AR) model includes an Auto Correlation Function (ACF) for input selection. The model utilizes T-norms and S-norms as the final modeling tools. To illustrate the applicability of the proposed model, we apply it to a data set of DMUs. Ultimately, modified trust values for these DMUs are determined using the proposed approach.
Azadeh, A, Zia, NP, Saberi, M, Hussain, FK, Hussain, OK, Chang, E & IEEE 1970, 'Trust-Based Performance Measurement Using Fuzzy Operators', PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), IEEE Conference on Industrial Electronics and Applications, IEEE - Institute of Electrical and Electronics Engineers, Huangzhou, China, pp. 1701-1706.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Performance assessment is a critical aspect for any organization, as it provides them with the means to measure their performance. Decision makers and top management need to gain a comprehensive view of the capabilities and performance of decision making units (DMU's) in order to make efficient decisions and beneficial improvements. In this study a novel model has been proposed to place performance assessment outputs in linguistic form, which utilize proper trust labels. Trust labels provide explicit qualitative scales, instead of representing pure numerical data, which are more meaningful for top manager. Fifteen scenarios are formed based on two main factors: the number of decision making units and the number of timeslots, which together form the basis of the proposed method for performance assessment. The efficiency rates of the current, previous and following years, along with the average efficiency and standard deviation, are the five inputs to this model. The approach uses time series forecasting to predict the future efficiency rate and is armed with an Auto Correlation Function (ACF) for input selection. The model utilizes fuzzy t-norm and s-norm as the final modeling tools. To show the applicability and superiority of the proposed model, it is applied to a data set provided by running a simulation structured by a unique logic.
Bakker, S, Hausen, D, Selker, T, van den Hoven, E, Butz, A & Eggen, B 1970, 'Peripheral interaction', CHI '14 Extended Abstracts on Human Factors in Computing Systems, CHI '14: CHI Conference on Human Factors in Computing Systems, ACM, Toronto, ON, Canada, pp. 99-102.
View/Download from: Publisher's site
View description>>
In everyday life, we are able to perform various activities simultaneously without consciously paying attention to them. For example, we can easily read a newspaper while drinking coffee. This latter activity takes place in our background or periphery of attention. Contrarily, interactions with computing technology usually require focused attention. With interactive technologies becoming increasingly present in the everyday environment, it is essential to explore how these technologies could be developed such that people can interact with them both in the focus and in the periphery of attention. This upcoming field of Peripheral Interaction aims to fluently embed interactive technology into everyday life. This workshop brings together researchers and practitioners from different disciplines to share research and design work and to further shape the field of Peripheral Interaction.
Bano, M, Zowghi, D, Daneva, M, Svensson, RB, Franch, X, Madhavji, N & Marzcak, S 1970, 'Users' Voice and Service Selection: An Empirical Study', 2014 IEEE 4TH INTERNATIONAL WORKSHOP ON EMPIRICAL REQUIREMENTS ENGINEERING (EMPIRE), IEEE International Requirements Engineering Conference, IEEE, Karlskrona, Sweden, pp. 76-79.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Service Oriented software development saves time by reusing existing services and integrates them to create a new system. But selecting a service that satisfies the requirements of all concerned stakeholders is a challenging task. The situation has been exacerbated within the past few years with huge number of services available that offer similar functionalities where the analysts require additional information for making better decision for service selection. User feedback analysis has recently gained a lot of attention for its potential benefits in various areas of requirements engineering. The aim of this research is to evaluate the impact of feedback provided by the end users of the services, on the decision making process for the service selection. In this paper we present an empirical study that utilizes user feedback analysis for selection of a service among 92 available services with similar functionalities. The results show that in scenarios with significant number of services, it is helpful for analysts to consider additional information to select optimally best matched service to the requirements.
Bano, M, Zowghi, D, Ikram, N, Daneva, M, Svensson, RB, Franch, X, Madhavji, N & Marzcak, S 1970, 'Systematic Reviews in Requirements Engineering: A Tertiary Study', 2014 IEEE 4TH INTERNATIONAL WORKSHOP ON EMPIRICAL REQUIREMENTS ENGINEERING (EMPIRE), IEEE International Requirements Engineering Conference, IEEE, Karlskrona, Sweden, pp. 9-16.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. There has been an increasing interest in conducting Systematic Literature Reviews (SLR) among Requirements Engineering (RE) researchers in recent years. However, so far there have been no tertiary studies conducted to provide a comprehensive overview of these published SLR in RE. In this paper we present a tertiary study of SLR that focus solely on RE related topics by following the guidelines of Evidence Based Software Engineering. We have conducted both automated search of major online sources and manual search of the RE and SLR related conferences and journals. Our tertiary study has identified 53 distinct systematic reviews published from 2006 to 2014 and reported in 64 publications. We have assessed the resulting SLR for their quality, and coverage of specific RE related topics thus identifying some gaps. We have observed that the quality of SLR in RE has been decreasing over the recent years. There is a strong need to replicate some of these SLR to increase the reliability of their results for future RE research.
Belete, GF & Voinov, A 1970, 'Integration of models for low carbon economy', Proceedings - 7th International Congress on Environmental Modelling and Software: Bold Visions for Environmental Modeling, iEMSs 2014, pp. 1897-1904.
View description>>
Designing the transition to low carbon economy is a very complex task that touches upon a wide variety of climate-energy-economic systems. We need to explore the various possible climate mitigation scenarios at different temporal and spatial scales. However, due to the diversity of the involved disciplines it is difficult to find one complete and unified modeling approach that works equally well in all those different domains. As a result we have to select 'appropriate' models, which represent only specific aspects of the scenarios and assemble them 'coherently'. In this research we have identified some challenges in integrating multidisciplinary models; and have developed a conceptual design for a multidisciplinary model integration framework that can harmonize the technical, semantic, and dataset aspects of interoperability.
Betete, GF, Voinov, A & Holst, N 1970, 'An architecture for integration of multidisciplinary models', Proceedings - 7th International Congress on Environmental Modelling and Software: Bold Visions for Environmental Modeling, iEMSs 2014, pp. 1251-1259.
View description>>
Integrating multidisciplinary models requires linking models: that may operate at different temporal and spatial scales; developed using different methodologies, tools and techniques; different levels of complexity; calibrated for different ranges of inputs and outputs, etc. On the other hand, integration of models requires us to address technical, semantic, and dataset aspects of interoperability. So we need a genuine techniques that enable us to integrate various domain specific models for interdisciplinary study. In this research work, we investigated best practices of System Integration, Enterprise Application Integration, and Integration Design Patterns. We developed an architecture of a multidisciplinary model integration framework that brings these three aspects of integration together. Service-oriented-based platform independent architecture that enables to establish loosely coupled dependency among various models is presented.
Binti Adnan, NA, Yamashita, S, Devitt, SJ & Nemoto, K 1970, '2D Qubit Layout Optimization for Topological Quantum Computation', REVERSIBLE COMPUTATION, RC 2014, 6th International Conference on Reversible Computation (RC), Springer International Publishing, Kyoto, JAPAN, pp. 176-188.
View/Download from: Publisher's site
Bressan, N, McGregor, C, Smith, K, Lecce, L & James, A 1970, 'Heart rate variability as an indicator for morphine pharmacokinetics and pharmacodynamics in critically ill newborn infants', 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), IEEE, Chicago, IL, pp. 5719-5722.
View/Download from: Publisher's site
Brodka, P, Magnani, M & Musial, K 1970, 'Message from SNAA 2014 program chairs', 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, p. xxxiv.
View/Download from: Publisher's site
Bu, Z, Wu, Z, Qian, L, Cao, J & Xu, G 1970, 'A backbone extraction method with Local Search for complex weighted networks', 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, Beijing, China, pp. 85-88.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. The backbone is the natural abstraction of a complex network, which can help people to understand it in a more simplified form. Backbone extraction becomes more challenging as many networks are evolving into large scale and the weight distributions are spanning several orders of magnitude. Traditional filter-based methods tend to include many outliers into the backbone. What is more, they often suffer from the computational inefficiency-the exhaustive search of all nodes or edges is often prohibitively expensive. In this work, we propose a Local Search based Backbone Extraction Heuristic (LS-BEH) to find the backbone in a complex weighted network. First, a strict filtering rule is carefully designed to determine edges to be preserved or discarded. Second, we present a local search model to examine part of edges in an iterative way. Experimental results on two real-life networks demonstrate the advantage of LS-BEH over the classic disparity filter method by either effectiveness or efficiency validity.
Busch, P, Smith, S, Gill, AQ, Harris, P, Fakieh, B & Blount, Y 1970, 'A study of government cloud adoption: The Australian context', Proceedings of the 25th Australasian Conference on Information Systems, ACIS 2014, Australasian Conference on Information Systems, ACIS, Auckland, New Zealand, pp. 1-10.
View description>>
The literature is scant around the take up rates of cloud computing by organisations. Cloud computing is nonetheless expected to be a major computing paradigm in the future. The benefits of the cloud vis-à-vis outsourcing many current in-house IT services and applications - both hardware and software based, are numerous. However, governments and many enterprises are still relatively unclear on the motives for adopting cloud technologies and the consequent benefits gained in a real-world operational environment. This paper examines the results from a survey conducted at a forum of senior government IT managers and their views towards cloud computing adoption. The paper provides insights both from technological and non-technological perspectives in the overall context of cloud adoption in Australian government enterprises. Dr. Peter Busch; Dr. Stephen Smith, Dr. Asif Gill, Dr. Pedro Harris, Bahjat Fakieh, Dr. Yvette Blount
Cetindamar, D & Kozanoglu, H 1970, 'Fostering impact investment in developing countries', PICMET 2014 - Portland International Center for Management of Engineering and Technology, Proceedings: Infrastructure and Service Integration, Portland International Conference on Management of Engineering & Technology (PICMET), IEEE, Portland Int Ctr Management Engn & Technol, Japan Chapter, Kanazawa, JAPAN, pp. 2735-2739.
View description>>
The paper will present the development of impact investment as an industry and then specifically focus on the ways of fostering such a financial instrument in developing countries. Similar to the venture capital firms supporting innovation in high technology firms, impact investment firms are spurring social innovation in a vast variety of countries. Such a financial instrument might have high potential in developing countries that are facing with many social and environmental problems besides economic ones. Based on the experiences in advanced countries, we will attempt to compare the conditions of advanced and developing countries in terms of building and running impact investment industry. As impact investment is a unique financial institution, we will highlight how developing countries can learn from the experience of advanced countries and develop their own impact investment industry in order to foster their social innovation capability.
Chen, H, Zhang, G, Lu, J & Zhu, D 1970, 'A Two-Step Agglomerative Hierarchical Clustering Method for Patent Time-Dependent Data', The 7th International Conference on Intelligent Systems and Knowledge Engineering, International Conference on Intelligent Systems and Knowledge Engineering, Springer Berlin Heidelberg, Beijing, China, pp. 111-121.
View/Download from: Publisher's site
View description>>
Patent data has time-dependent property and also semantic attributes. Technology clustering based on patent time-dependent data which processed by trend analysis has been used to help technologies relationships identification. However, the raw patent data carries more features than processed data. This paper aims to develop a new methodology to cluster patent frequency data based on its time-related properties. To handle time-dependent attributes of patent data, this study first compares it with typical time-series data to propose preferable similarity measurement approach. It then presents a two-steps agglomerative hierarchical technology clustering method to cluster original patent time-dependent data directly. Finally, a case study using communication-related patents is given to illustrate the clustering method.
Chen, J, Liu, B, Gui, L, Sun, F & Zhou, H 1970, 'Engineering Link Utilization in Cellular Offloading Oriented VANETs', 2015 IEEE Global Communications Conference (GLOBECOM), GLOBECOM 2015 - 2015 IEEE Global Communications Conference, IEEE.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. At present, single network and technology could be impotent when facing: 1) the rocketing proliferation of mobile devices; and 2) the heterogeneity of data services and users' contexts. Therefore, offloading some specific traffic to other networks is a natural yet effective solution. To this end, this paper engineers the cellular offloading oriented vehicular ad hoc networks (VANETs), which concentrate on offloading users' bandwidth-hungry traffic in vehicular environment. Specifically, a two-phase resource allocation process is adopted, where utilization patterns of both wireless and backhaul links are studied for the sake of resource exploitation efficiency, with considerations on practical issues including link quality variety, fairness and caching. The former is formulated as an integer linear programming (ILP) problem aiming at system throughput maximization, and a heuristic algorithm is developed as solution due to the problem's NP-hardness nature. The latter's objective is identified and a simple implementation algorithm is designed correspondingly. Extensive simulations are conducted and the results show the effectiveness and efficiency of the proposed methods.
Chen, J, Liu, B, Zhou, H, Wu, Y & Gui, L 1970, 'When vehicles meet TV white space: A QoS guaranteed dynamic spectrum access approach for VANET', 2014 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE, Beijing, PEOPLES R CHINA.
View/Download from: Publisher's site
Chen, S-A, Chen, C-H, Lin, J-W, Ko, L-W & Lin, C-T 1970, 'Gaming controlling via brain-computer interface using multiple physiological signals', 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2014 IEEE International Conference on Systems, Man and Cybernetics - SMC, IEEE, San Diego, CA, USA, pp. 3156-3159.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. using physiological signals to control braincomputer interface (BCI) becomes more popular. Among many kinds of physiological signals, Electrooculography (EOG) signal is more stable which can be used to control BCI systems based on eye movement detection and signal processing methods. Also, the use of electroencephalographic (EEG) signals has become the most common approach for a BCI because of their usability and strong reliability. In this paper, we described a signal processing method, which uses a wireless EEG-based BCI system designed to be worn near forehead that can detect both EEG and EOG signals, for detecting eye movements to have 9 direction controls (via EOG) and one action of execution (via EEG). This system included a wireless EEG signal acquisition device, a mechanism that can be worn stably, and an application program (APP) with signal processing algorithms. This algorithm and its classification procedure provided an effective method for identifying eye movements and attention. Finally, we designed a baseball game to test the BCI system. The results demonstrated that player can control the game well with high accuracy.
Chiu, C-Y, Chen, C-Y, Lin, Y-Y, Chen, S-A & Lin, C-T 1970, 'Using a Novel LDA-Ensemble Framework to Classification of Motor Imagery Tasks for Brain-Computer Interface Applications.', ICS, International Computer Symposium (ICS), IOS Press, Tunghai University, Taichung, Taiwan, pp. 150-156.
View/Download from: Publisher's site
View description>>
© 2015 The authors and IOS Press. All rights reserved. In this paper, we introduce a novel linear discriminate analysis (LDA) ensemble classifier utilizing the Mindo as a brain-computer interface (BCI) device to deal with the problem of motor imagery classification. With regard to the composition of the proposed system, we combine filter bank, sub-band common spatial pattern (SBCSP), LDA together for extracting features of EEG data and classifying the motor imagery with left or right states. In addition, we also employ a gradient descent (GD) algorithm to find the best weight associated with probability fusion function. This novel architecture not only boosts the accuracy of classification but maintains the computational efficiency of the system. Therefore, the proposed LDA-ensemble framework is able to be satisfied with each subject as demonstrated in Section III.
Chotipant, S, Hussain, FK, Dong, H & Hussain, OK 1970, 'A Fuzzy VSM-Based Approach for Semantic Service Retrieval', NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, International Conference on Neural Information Processing, Springer Verlag, Kuching, Malaysia, pp. 682-689.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2014. A vast number of business services have been published on the Web in an attempt to achieve cost reductions and satisfy user demand. Service retrieval consequently plays an important role, but unfortunately existing research focuses on crisp service retrieval techniques which are unsuitable for vague real world information. In this paper, we propose a new fuzzy service retrieval approach which consists of two modules: service annotation and service retrieval. Related service concepts for a given query are semantically retrieved, following which services that are annotated to those concepts are retrieved. The degree of retrieval of the retrieval module and the similarity between a service, a concept, and a query are fuzzy. Our experiment shows that the proposed approach performs better than a non-fuzzy approach on Recall measure.
Chou, KP, Prasad, M, Lin, YY, Joshi, S, Lin, CT & Chang, JY 1970, 'Takagi-Sugeno-Kang type collaborative fuzzy rule based system', 2014 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), 2014 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), IEEE, USA, pp. 315-320.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. In this paper, a Takagi-Sugeno-Kang (TSK) type collaborative fuzzy rule based system is proposed with the help of knowledge learning ability of collaborative fuzzy clustering (CFC). The proposed method split a huge dataset into several small datasets and applying collaborative mechanism to interact each other and this process could be helpful to solve the big data issue. The proposed method applies the collective knowledge of CFC as input variables and the consequent part is a linear combination of the input variables. Through the intensive experimental tests on prediction problem, the performance of the proposed method is as higher as other methods. The proposed method only uses one half information of given dataset for training process and provide an accurate modeling platform while other methods use whole information of given dataset for training.
Clear, A & Lister, R 1970, 'Preface to the working group reports of the 2014 innovation & technology in computer science education conference', ITiCSE-WGR 2014 - Working Group Reports of the 2014 Innovation and Technology in Computer Science Education Conference, p. iii.
Clear, A & Lister, R 1970, 'Preface to the working group reports of the 2014 innovation & technology in computer science education conference', ITiCSE-WGR 2014 - Working Group Reports of the 2014 Innovation and Technology in Computer Science Education Conference, p. iii.
Corney, M, Fitzgerald, S, Hanks, B, Lister, R, McCauley, R & Murphy, L 1970, ''explain in plain english' questions revisited', Proceedings of the 45th ACM technical symposium on Computer science education, SIGCSE '14: The 45th ACM Technical Symposium on Computer Science Education, ACM, Atlanta, Georgia, USA, pp. 591-596.
View/Download from: Publisher's site
View description>>
Abstract: Recent studies have linked the ability of novice (CS1) programmers to read and explain code with their ability to write code. This study extends earlier work by asking CS2 students to explain object-oriented data structures problems that involve recursion. Results show a strong correlation between ability to explain code at an abstract level and performance on code writing and code reading test problems for these object-oriented data structures problems. The authors postulate that there is a common set of skills concerned with reasoning about programs that explains the correlation between writing code and explaining code. The authors suggest that an overly exclusive emphasis on code writing may be detrimental to learning to program. Non-code writing learning activities (e.g., reading and explaining code) are likely to improve student ability to reason about code and, by extension, improve student ability to write code. A judicious mix of code-writing and code-reading activities is recommended.
Cuzzocrea, A & Xu, G 1970, 'A novel heuristic scheme for modeling and managing time bound constraints in data-intensive grid and cloud infrastructures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), On the Move to Meaningful Internet Systems, Springer Berlin Heidelberg, Amantea, Italy, pp. 172-191.
View/Download from: Publisher's site
View description>>
© Springer-Verlag Berlin Heidelberg 2014. Inspired by the emerging Cloud Computing challenge, in this paper we provide a comprehensive framework for modeling and managing time bound constraints in data-intensive Grid and Cloud infrastructures, along with its experimental assessment and analysis. We provide both conceptual and theoretical contributions of the proposed framework, along with a heuristic scheme, called RGDTExec, that solves all possible instances of the problem underlying the proposed framework by exploiting a suitable greedy algorithm, called RGDTExecRun. As we demonstrate throughout the paper, the framework keeps several aspects of research innovations that are beneficial in a wide range of application scenarios.
Cuzzocrea, A & Xu, G 1970, 'Towards a framework for supporting web search of complex objects via multidimensional paradigms', Proceedings - 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 2014 14th International Conference on Computational Science and Its Applications (ICCSA), IEEE, Portugal, pp. 217-220.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. In this paper we present WebClustCube, an innovative framework for supporting Web search of complex objects via multidimensional paradigms. WebClustCube focuses on the issue of empowering traditional Web search methodologies by means of novel paradigms. In particular, WebClustCube supports the building and the interactive manipulation of OLAP-enabled Web views over complex objects extracted from distributed databases. The data management, OLAP-like support of WebClustCube is provided by ClustCube, a state-of-the-art framework for coupling OLAP methodologies and clustering algorithms with the goal of analyzing and mining of complex database objects. We complement of analytical contribution by means of a case study that clearly shows the potentialities of WebClustCube in the context of next-generation Web search environments.
Decker, T, Ivanyos, G, Kulkarni, R, Qiao, Y & Santha, M 1970, 'An Efficient Quantum Algorithm for Finding Hidden Parabolic Subgroups in the General Linear Group', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), International Symposium on Mathematical Foundations of Computer Science, Springer Berlin Heidelberg, Budapest, Hungary, pp. 226-238.
View/Download from: Publisher's site
View description>>
In the theory of algebraic groups, parabolic subgroups form a crucial building block in the structural studies. In the case of general linear groups over a finite field, given a sequence of positive integers n 1 , ⋯, n k , where n=n 1 +⋯+n k , a parabolic subgroup of parameter (n 1 , ⋯, n k ) in GL is a conjugate of the subgroup consisting of block lower triangular matrices where the ith block is of size n i . Our main result is a quantum algorithm of time polynomial in logq and n for solving the hidden subgroup problem in GL, when the hidden subgroup is promised to be a parabolic subgroup. Our algorithm works with no prior knowledge of the parameter of the hidden parabolic subgroup. Prior to this work, such an efficient quantum algorithm was only known for minimal parabolic subgroups (Borel subgroups), for the case when q is not much smaller than n (G. Ivanyos: Quantum Inf. Comput., Vol. 12, pp. 661-669). © 2014 Springer-Verlag Berlin Heidelberg.
Devitt, SJ 1970, 'Classical Control of Large-Scale Quantum Computers', RC2014, Springer Lecture Notes on Computer Science (LNCS) 8507, pp. 26-39. Springer International Publishing, Switzerland (2014), Y. Shigeru and M.Shin-ichi (Eds.), 6th International Conference on Reversible Computation (RC), SPRINGER INTERNATIONAL PUBLISHING AG, Kyoto, JAPAN, pp. 26-39.
View description>>
The accelerated development of quantum technology has reached a pivotalpoint. Early in 2014, several results were published demonstrating that severalexperimental technologies are now accurate enough to satisfy the requirementsof fault-tolerant, error corrected quantum computation. While there are manytechnological and experimental issues that still need to be solved, the abilityof experimental systems to now have error rates low enough to satisfy thefault-tolerant threshold for several error correction models is a tremendousmilestone. Consequently, it is now a good time for the computer science andclassical engineering community to examine the {\em classical} problemsassociated with compiling quantum algorithms and implementing them on futurequantum hardware. In this paper, we will review the basic operational rules ofa topological quantum computing architecture and outline one of the mostimportant classical problems that need to be solved; the decoding of errorcorrection data for a large-scale quantum computer. We will endeavour topresent these problems independently from the underlying physics as much ofthis work can be effectively solved by non-experts in quantum information orquantum mechanics.
Devitt, SJ 1970, 'The quantum memory stick', Conference on Lasers and Electro-Optics Europe - Technical Digest.
View description>>
We introduce a design a design for a quantum memory stick that uses active quantum error correction to coherently store a qubit of encoded information for months or years. This device is based on the model of topological error correction and can increase the storage time of a qubit of information by 10-11 orders of magnitude with a physical qubit overhead of several hundreds.
Devitt, SJ 1970, 'The Quantum Memory Stick', Optics InfoBase Conference Papers.
View description>>
We introduce a design a design for a quantum memory stick that uses active quantum error correction to coherently store a qubit of encoded information for months or years. This device is based on the model of topological error correction and can increase the storage time of a qubit of information by 10-11 orders of magnitude with a physical qubit overhead of several hundreds. © 2014 OSA.
DONG, FAN, LU, JIE, ZHANG, G & LI, KAN 1970, 'A MODIFIED LEARN++.NSE ALGORITHM FOR DEALING WITH CONCEPT DRIFT', Decision Making and Soft Computing, The 11th International FLINS Conference (FLINS 2014), WORLD SCIENTIFIC, Brazil, pp. 556-561.
View/Download from: Publisher's site
View description>>
Concept drift is a very pervasive phenomenon in real world applications. By virtue of variety change types of concept drift, it makes more difficult for learning algorithm to track the concept drift very closely. Learn++.NSE is an incremental ensemble learner without any assumption on change type of concept drift. Even though it has good performance on handling concept drift, but it costs high computation and needs more time to recover from accuracy drop. This paper proposed a modified Learn++.NSE algorithm. During learning instances in data stream, our algorithm first identifies where and when drift happened, then uses instances accumulated by drift detection method to create a new base classifier, and finally organized all existing classifiers based on Learn++.NSE weighting mechanism to update ensemble learner. This modified algorithm can reduce high computation cost without any performance drop and improve the accuracy recover speed when drift happened.
Read More: http://www.worldscientific.com/doi/abs/10.1142/9789814619998_0092
Dong, H, Hussain, FK & Bouguettaya, A 1970, 'Discovering Plain-Text-Described Services Based on Ontology Learning', NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, International Conference on Neural Information Processing, ICONIP, Kuching, Malaysia, pp. 673-681.
View/Download from: Publisher's site
Du, J, Jiang, C, Wang, J, Yu, S & Ren, Y 1970, 'Stability Analysis and Resource Allocation for Space-Based Multi-Access Systems', 2015 IEEE Global Communications Conference (GLOBECOM), GLOBECOM 2015 - 2015 IEEE Global Communications Conference, IEEE.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. In space-based networks, the data relay satellites can assist low-earth-orbit satellites in relaying data to other satellites or the ground station and improve the real time system throughput. To take full advantage of transmission resource of the cooperative relays, this paper proposes a multiple access and resource allocation strategy, in which relays can receive and transmit simultaneously according to channel characteristics of space-based systems. Based on the queueing theoretic formulation, the stability of the proposed protocol is analyzed and the maximum stable throughput region is derived, which would provide the appropriate guidance for the design of the system optimal control. Simulation results exhibit multiple factors that affect the stable throughput and verify the theoretical analysis.
Dyson, LE 1970, 'A Vodcast Project in the Workplace Understanding Students' Learning Processes Outside the Classroom', MOBILE AS MAINSTREAM-TOWARDS FUTURE CHALLENGES IN MOBILE LEARNING, MLEARN 2014, World Conference on Mobile and Contextual Learning (mLearn), Springer, Instanbul, pp. 258-271.
View/Download from: Publisher's site
View description>>
A student-generated multimedia project was introduced into a firstyear
subject for undergraduate information technology students. Teams of students
interviewed an IT professional in the workplace and video-recorded the
interview. A survey of students showed statistically significant increases in students’
self-reported knowledge and skills for key learning objectives. A subsequent
qualitative analysis of student diaries and reflections discovered several
contributing factors: the iterative nature of the activities that students undertook
in order to complete the project; the multiple and evolving representations of
their knowledge as they proceeded through the project; the importance of the
workplace context in enhancing learning; and the affordance of the mobile devices
used by the students for capturing this context on video and allowing it to
be shared with other students. The research findings contribute to our understanding
of how complex mobile learning projects in context-rich environments
can contribute to deep learning.
Eklund, JM & McGregor, C 1970, 'Real-time online health analytics for interplanetary space missions', 2014 IEEE Aerospace Conference, 2014 IEEE Aerospace Conference, IEEE, Big Sky, MT.
View/Download from: Publisher's site
Eklund, JM, Fontana, N, Pugh, E, McGregor, C, Yielder, P, James, A, Keyzers, M, Hahn, C & McNamara, P 1970, 'Automated Sleep-Wake Detection in Neonates from Cerebral Function Monitor Signals', 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS), IEEE, Icahn Sch Med, New York, NY, pp. 22-27.
View/Download from: Publisher's site
Feltham, F, Loke, L, van den Hoven, E, Hannam, J & Bongers, B 1970, 'The slow floor', Proceedings of the 8th International Conference on Tangible, Embedded and Embodied Interaction, TEI'14: Eighth International Conference on Tangible, Embedded, and Embodied Interaction, ACM.
View/Download from: Publisher's site
Feng, P, Wu, F, Liu, B & Dong, C 1970, 'DSMA: Optimal multirate anypath routing in wireless networks with directional antennas', 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, Nicosia, CYPRUS, pp. 381-386.
View/Download from: Publisher's site
Frawley, JK & Dyson, LE 1970, 'Animal personas', Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design, OzCHI '14: the Future of Design, ACM, Sydney, Australia, pp. 21-30.
View/Download from: Publisher's site
View description>>
This paper describes the development and application of a non-human animal persona in designing to support co-operative and free-range animal agriculture. This work is grounded in case study research of a small free-range egg farm, through which field and interview work were undertaken. We demonstrate how existing user-centred design tools, such as the persona, can be used to better reflect co-operative farming philosophies and more meaningfully represent both farmer and animal stakeholders within the design process. This approach is theoretically orientated within sustainable HCI and Animal Computer Interaction (ACI), which is itself an extension of HCI. The species-specific persona of a chicken allows representation and ensures that the animal, which is made deliberately invisible within factory and intensive farming, is made visible through and within the design of an online system. By making explicit the implicit assumptions we hold about an animal, such personas provide a tool for thinking, design, and further discussion.
Frawley, JK & Dyson, LE 1970, 'Mobile Literacies Navigating Multimodality, Informal Learning Contexts and Personal ICT Ecologies', MOBILE AS MAINSTREAM-TOWARDS FUTURE CHALLENGES IN MOBILE LEARNING, MLEARN 2014, World Conference on Mobile and Contextual Learning, Springer International Publishing, Istanbul, Turkey, pp. 377-390.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2014. The affordances and ubiquitous uptake of technically convergent devices has led to widespread change in communicative practice. Mobile devices and their wider ICT ecology have afforded people with the means through which to consume and produce multimedia content. In such an environment, literacy can no longer be limited to the reading and writing of word and character-based texts. The emergent field of New Literacies research has contributed early understandings of these new practices. This paper contributes to understanding how these new literacies occur within a mobile and informal learning space. This study details mStories a creative, participatory, digital mobile storytelling project comprised of nine adult participants who created “stories” with their mobile phone device. These stories were shared on the mStories project website, which became a repository for: fiction, non-fiction, poetry and diary-style content. Stories used a range of written text, visual images, sound, music and video. Using content analysis, interview and survey methods this paper describes mobile literacy as characteristically situated and experiential in nature. The mobile device was catalytic to furthering digital writing on other devices within the individual’s wider ICT ecology. This research contributes understandings of multimodal mobile literacies as part of a foundation for framing and understanding mobile learning in informal settings.
Frawley, JK, Dyson, LE & Underwood, J 1970, 'Rewriting, redesigning and reimagining the recipe for more sustainable food systems', Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design, OzCHI '14: the Future of Design, ACM, Sydney, Australia, pp. 366-369.
View/Download from: Publisher's site
View description>>
Copyright 2014 ACM. This paper describes Red Hen Recipes, a user generated recipe site that seeks to connect buying, cooking and eating practices with the modes of food production through the redesign of the recipe format. User research found recipes to be a reflective and creative space for imagining 'what we should eat'. Through simple website technologies we redesign the recipe to afford users the opportunity of exploring 'what we should eat' within the context of the wider agro-food system. The site provides a digital space for dialogic interactions between farmers, backyard growers, shoppers and foragers to 'rewrite' the recipe to include information about the origins of a single ingredient. In connecting the labour of the field with the labour of the home and kitchen, this tool deliberately breaks down the false dichotomy of producer and consumer, and identifies all users as active producers within the food system, albeit within different contexts.
Garcia, JA & Navarro, KF 1970, 'The Mobile RehApp™: an AR-based mobile game for ankle sprain rehabilitation.', SeGAH, IEEE International Conference on Serious Games and Applications for Health (SeGAH), IEEE Computer Society, Rio de Janeiro, pp. 1-6.
View/Download from: Publisher's site
View description>>
People struggle to recover from injuries due to the lack of commitment to their rehabilitation exercises as they are often boring. Recent approaches that involve the use of interactive video games have shown positive results in exercising as users engage in physical activity while playing a game. For example Nintendo Wii and Microsoft Kinect based games have shown to be effective in the treatment of post stroke patients. Yet, there are not tools in the market that offer portable rehabilitation exercises in the form of interactive games. The work presented in this paper focuses on the development of the Mobile RehApp™, an augmented reality based application for mobile devices designed for therapeutic support that aims to assist physiotherapists and patients on ankle sprain rehabilitation.
Garcia, JA, Pisan, Y, Tan, CT & Navarro, KF 1970, 'Assessing the Kinect's Capabilities to Perform a Time-Based Clinical Test for Fall Risk Assessment in Older People', ENTERTAINMENT COMPUTING - ICEC 2014, Springer, pp. 100-107.
View description>>
© 2014 IFIP International Federation for Information Processing. The Choice Stepping Reaction Time (CSRT) task is time-based clinical test that has shown to reliably predict falls in older adults. Its current mode of delivery involves the use of a custom-made dance mat device. This mat is a measurement tool that can reliably obtain step data to discriminate between fallers and non-fallers. One of the pitfalls of this test is that the technology in use still imposes an obstacle on the degree of freedom to be able to perform adaptive exercises suitable for the elderly. In this paper, we describe a Kinect-based system that measures stepping performance through the use of a hybrid version of the CSRT task. This study focuses on assessing this system’s capabilities to reliably measure a time-based clinical test of fall risk. Results showed a favorable correspondence and agreement between the two systems, suggesting that this platform could be potentially useful in the clinical practice.
Garcia, JA, Pisan, Y, Tan, CT & Navarro, KF 1970, 'Step kinnection: a hybrid clinical test for fall risk assessment in older adults.', CHI Extended Abstracts, International Conference on Human Factors in Computing Systems, ACM, Toronto, Canada, pp. 471-474.
View/Download from: Publisher's site
View description>>
In this paper, we describe Step Kinnection, an interactive step training system for the elderly that incorporates mechanisms to simultaneously perform a hybrid clinical test for fall risk assessment. The interactivity demonstration includes a simple stepping task along with three voice-enabled cognitive activities allowing for the assessment of stepping performance under the dual-task paradigm. CHI attendees can try out both scenarios to physically experience the interference caused by a higher cognitive load while stepping.
Gervasi, V, Zowghi, D & IEEE 1970, 'Supporting Traceability through Affinity Mining', 2014 IEEE 22ND INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), IEEE International Requirements Engineering Conference, IEEE, Blekinge Inst Technol, Karlskrona, SWEDEN, pp. 143-152.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Traceability among requirements artifacts (and beyond, in certain cases all the way to actual implementation) has long been identified as a critical challenge in industrial practice. Manually establishing and maintaining such traces is a highskill, labour-intensive job. It is often the case that the ideal person for the job also has other, highly critical tasks to take care of, so offering semi-automated support for the management of traces is an effective way of improving the efficiency of the whole development process. In this paper, we present a technique to exploit the information contained in previously defined traces, in order to facilitate the creation and ongoing maintenance of traces, as the requirements evolve. A case study on a reference dataset is employed to measure the effectiveness of the technique, compared to other proposals from the literature.
Gill, AQ, Alam, SL & Eustace, J 1970, 'Using social architecture to analyzing online social network use in emergency management', 20th Americas Conference on Information Systems, AMCIS 2014, Americas Conference on Information Systems, AIS, Savannah, Georgia, USA, pp. 1-12.
View description>>
Emergency Management Agencies (EMA) are increasingly adopting online social network (OSN) such as Twitter and Facebook for interacting with partner institutions and citizens for sourcing and distributing of vital crisis information. However, EMA need to study and analyze how well they are using and, how they should be using the OSN. This paper adopts a holistic social architecture driven approach and demonstrates how to systematically study and analyze OSN adoption in the Australian EMA case study. The results of this study indicate that OSNs do not replace traditional systems and should be considered a part of the whole crisis information management environment. Further, it indicates that a holistic social architecture driven approach seems useful for studying and analyzing the OSN-enabled EMA crisis information management environment, which is critical for the identification of opportunities for improvement.
Gill, AQ, Smith, S, Beydoun, G & Sugumaran, V 1970, 'Agile enterprise architecture: A case of a cloud technology-enabled government enterprise transformation', Proceedings - Pacific Asia Conference on Information Systems, PACIS 2014, Pacific Asia Conference on Information Systems, AIS, Chengdu, China, pp. 1-11.
View description>>
Australian government enterprises have shown a significant interest in the cloud technology-enabled enterprise transformation. Australian government suggests the whole-of-a-government strategy to cloud adoption. The challenge is how best to realise this cloud adoption strategy for the cloud technologyenabled enterprise transformation? The cloud adoption strategy realisation requires concrete guidelines and a comprehensive practical framework. This paper proposes the use of an agile enterprise architecture framework to developing and implementing the adaptive cloud technology-enabled enterprise architecture in the Australian government context. The results of this paper indicate that a holistic strategic agile enterprise architecture approach seems appropriate to support the strategic whole-of-a-government approach to cloud technology-enabled government enterprise transformation.
Golsteijn, C, Hoven, EVD, Frohlich, D & Sellen, A 1970, 'Reflections on craft research for and through design', Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational, NordiCHI '14: The 8th Nordic Conference on Human-Computer Interaction, ACM, Helsinki, Finland, pp. 421-430.
View/Download from: Publisher's site
View description>>
As design practice has become more integrated in HCI research, there are on-going discussions around the role of design in research. Design research may take different forms, among which 'Research for Design' and 'Research through Design'. While, by definition, these two differ in their focus and result- The first informs the creation of a design artefact and the second aims for a contribution to knowledge-this paper presents a case study of design research in which Research for and through Design were used iteratively to gain insight into hybrid craft-an integrated physical-digital craft form. Based on our own reflections, this paper discusses what different roles these two strategies may play depending on the research topic under study; the phase in the design process; and the level of abstraction of the research activity and knowledge gained. It thus argues that using Research for and through Design together is a powerful strategy. Copyright is held by the owner/author(s).
Greer, R, Olivier, C, Pugh, JE, Eklund, JM & McGregor, C 1970, 'Remote, real-time monitoring and analysis of vital signs of neonatal graduate infants', 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), IEEE, Chicago, IL, pp. 1382-1385.
View/Download from: Publisher's site
Grochow, JA & Qiao, Y 1970, 'Algorithms for Group Isomorphism via Group Extensions and Cohomology', 2014 IEEE 29th Conference on Computational Complexity (CCC), 2014 IEEE Conference on Computational Complexity (CCC), IEEE, Canada, pp. 110-119.
View/Download from: Publisher's site
View description>>
The isomorphism problem for groups given by their multiplication tables (GPI) has long been known to be solvable in nO(log n) time, but only recently has there been significant progress towards polynomial time. For example, Babai et al. (ICALP 2012) gave a polynomial-time algorithm for groups with no abelian normal subgroups. Thus, at present it is crucial to understand groups with abelian normal subgroups to develop no(log n)-time algorithms. Towards this goal we advocate a strategy via the extension theory of groups, which describes how a normal subgroup N is related to G/N via G. This strategy 'splits' GPI into two sub problems: one regarding group actions on other groups, and one regarding group co homology. The solution of these problems is essentially necessary and sufficient to solve GPI. Most previous works naturally align with this strategy, and it thus helps explain in a unified way the recent polynomial-time algorithms for other group classes. In particular, most prior results in the multiplication table model focus on the group action aspect, despite the general necessity of co homology, for example for p-groups of class 2-believed to be the hardest case of GPI. To make progress on the group co homology aspect of GPI, we consider central-radical groups, proposed in Babai et al. (SODA 2011): the class of groups such that G mod its center has no abelian normal subgroups. Recall that Babai et al. (ICALP 2012) consider the class of groups G such that G itself has no abelian normal subgroups. Following the above strategy, we solve GPI in n O(log log n) time for central-radical groups, and in polynomial time for several prominent subclasses of central-radical groups. We also solve GPI in nO(log log n)-time for groups whose solvable normal subgroups are elementary abelian but not necessarily central. As far as we are aware, this is the first time that a nontrivial algorithm with worst-case guarantees has tackled both aspects of GPI-actions and coho...
HAN, J, LU, JIE, ZHANG, G & MA, S 1970, 'MULTI-FOLLOWER TRI-LEVEL DECISION MAKING WITH UNCOOPERATIVE FOLLOWERS', Decision Making and Soft Computing, The 11th International FLINS Conference (FLINS 2014), WORLD SCIENTIFIC, Joao Pessoa, BRAZIL, pp. 524-529.
View/Download from: Publisher's site
Han, J, Zhang, G, Lu, J, Hu, Y & Ma, S 1970, 'Model and Algorithm for Multi-follower Tri-level Hierarchical Decision-Making', NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, International Conference on Neural Information Processing, Springer International Publishing, Kuching, MALAYSIA, pp. 398-406.
View/Download from: Publisher's site
HAO, P, ZHANG, G, BEHBOOD, V & ZHENG, Z 1970, 'A FUZZY DOMAIN ADAPTATION METHOD BASED ON SELF-CONSTRUCTING FUZZY NEURAL NETWORK', Decision Making and Soft Computing, The 11th International FLINS Conference (FLINS 2014), WORLD SCIENTIFIC, Brazil, pp. 676-681.
View/Download from: Publisher's site
View description>>
Domain adaptation addresses the problem of how to utilize a model trained in the source domain to make predictions for target domain when the distribution between two domains differs substantially and labeled data in target domain is costly to collect for retraining. Existed studies are incapable to handle the issue of information granularity, in this paper, we propose a new fuzzy domain adaptation method based on self-constructing fuzzy neural network. This approach models the transferred knowledge supporting the development of the current models granularity in the form of fuzzy sets and adapts the knowledge using fuzzy similarity measure to reduce prediction error in the target domain.
Hayes, G, El-Khatib, K & McGregor, C 1970, 'Supporting health informatics with platform-as-a-service cloud computing', Lecture Notes in Electrical Engineering, pp. 1149-1158.
View/Download from: Publisher's site
View description>>
Recent progression in health informatics data analysis has been impeded due to lack of hospital resources and computation power. To remedy this, some researchers have proposed a cloud-based web service patient monitoring system capable of providing offsite collection, analysis, and dissemination of remote patient physiological data. Unfortunately, some of these cloud services are not effective without utilizing next-generation hardware management techniques. In order to make cloud based patient monitoring a reality, this paper shows how leveraging an underlying platform-as-a-service (PaaS) cloud model can provide integration with web service patient monitoring systems while providing high availability, scalability, and security. © Springer Science+Business Media Dordrecht 2014.
Huang, L, Beirami, A, Sardari, M, Fekri, F, Liu, B & Gui, L 1970, 'Packet-level clustering for memory-assisted compression of network packets', 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP), 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP), IEEE, Hefei, PEOPLES R CHINA.
View/Download from: Publisher's site
Huang, W, McGregor, C & James, A 1970, 'A comprehensive framework design for continuous quality improvement within the neonatal intensive care unit: Integration of the SPOE, CRISP-DM and PaJMa models', IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 2014 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), IEEE, Valencia, SPAIN, pp. 289-292.
View/Download from: Publisher's site
Huffman Hayes, J & Zowghi, D 1970, 'Ready-set-transfer! Technology transfer in the requirements engineering domain (panel)', 2014 IEEE 22nd International Requirements Engineering Conference (RE), 2014 IEEE 22nd International Requirements Engineering Conference (RE), IEEE, pp. 500-501.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Though the primary goal of requirements engineering research is to propose, develop, and validate effective solutions for important practical problems, practice has shown that successful projects take from 20-25 years to reach full industry adoption, while many projects fade and never advance beyond the initial research phase. In this interactive panel, teams of researchers, representing different requirements engineering research areas, bring ideas for technology transfer to a panel of industrial and government practitioners. The teams make interactive presentations and receive feedback from panelists. Beneath the game-show genre of the panel is the serious goal to foster conversation between practitioners and researchers to improve the effectiveness of technology transfer in the requirements engineering community.
Hussain, W, Hussain, FK & Hussain, OK 1970, 'Maintaining Trust in Cloud Computing through SLA Monitoring', NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, International Conference on Neural Information Processing, Springer Verlag, Kuching, Malaysia, pp. 690-697.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2014. Maintaining trust in cloud computing is a significant challenge due to the dynamic nature of cloud computing and the fragility of trust. Trust can be established by conducting successful transactions and meeting all the parameters of the Service Level Agreement (SLA) drawn up between two interacting parties. Trust can be maintained by continuous monitoring of these predefined SLA parameters. There are number of commentaries on SLA monitoring that describe different frameworks for the proactive or reactive detection of SLA violations. The aim of this research is to present an overview of the literature and make a comparative analysis of SLA monitoring in respect of trust maintenance in cloud computing.
Ivanyos, G, Karpinski, M, Qiao, Y & Santha, M 1970, 'Generalized Wong sequences and their applications to Edmonds' problems', Leibniz International Proceedings in Informatics, LIPIcs, pp. 397-408.
View/Download from: Publisher's site
View description>>
We design two deterministic polynomial time algorithms for variants of a problem introduced by Edmonds in 1967: determine the rank of a matrix M whose entries are homogeneous linear polynomials over the integers. Given a linear subspace B of the n×n matrices over some field F, we consider the following problems: symbolic matrix rank (SMR) is the problem to determine the maximum rank among matrices in B, while symbolic determinant identity testing (SDIT) is the question to decide whether there exists a nonsingular matrix in B. The constructive versions of these problems are asking to find a matrix of maximum rank, respectively a nonsingular matrix, if there exists one. Our first algorithm solves the constructive SMR when B is spanned by unknown rank one matrices, answering an open question of Gurvits. Our second algorithm solves the constructive SDIT when B is spanned by triangularizable matrices, but the triangularization is not given explicitly. Both algorithms work over finite fields of size at least n + 1 and over the rational numbers, and the first algorithm actually solves (the non-constructive) SMR independent of the field size. Our main tool to obtain these results is to generalize Wong sequences, a classical method to deal with pairs of matrices, to the case of pairs of matrix spaces.
Ivanyos, G, Kulkarni, R, Qiao, Y, Santha, M & Sundaram, A 1970, 'On the Complexity of Trial and Error for Constraint Satisfaction Problems', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), International Colloquium on Automata Languages and Programming, Springer Berlin Heidelberg, Copenhagen, Denmark, pp. 663-675.
View/Download from: Publisher's site
View description>>
In a recent work of Bei, Chen and Zhang (STOC 2013), a trial and error model of computing was introduced, and applied to some constraint satisfaction problems. In this model the input is hidden by an oracle which, for a candidate assignment, reveals some information about a violated constraint if the assignment is not satisfying. In this paper we initiate a systematic study of constraint satisfaction problems in the trial and error model. To achieve this, we first adopt a formal framework for CSPs, and based on this framework we define several types of revealing oracles. Our main contribution is to develop a transfer theorem for each type of the revealing oracle, under a broad class of parameters. To any hidden CSP with a specific type of revealing oracle, the transfer theorem associates another, potentially harder CSP in the normal setting, such that their complexities are polynomial time equivalent. This in principle transfers the study of a large class of hidden CSPs, possibly with a promise on the instances, to the study of CSPs in the normal setting. We then apply the transfer theorems to get polynomial-time algorithms or hardness results for hidden CSPs, including satisfaction problems, monotone graph properties, isomorphism problems, and the exact version of the Unique Games problem. © 2014 Springer-Verlag.
Kamaleswaran, R & McGregor, C 1970, 'A Real-Time Multi-dimensional Visualization Framework for Critical and Complex Environments', 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS), IEEE, Icahn Sch Med, New York, NY, pp. 325-328.
View/Download from: Publisher's site
Khazaei, H, McGregor, C, Eklund, M, El-Khatib, K & Thommandram, A 1970, 'Toward a Big Data Healthcare Analytics System: A Mathematical Modeling Perspective', 2014 IEEE World Congress on Services, 2014 IEEE World Congress on Services (SERVICES), IEEE, Anchorage, AK, pp. 208-215.
View/Download from: Publisher's site
Kocaoglu, DF, Anderson, TR, Daim, TU, Kozanoglu, DC, Niwa, K & Perman, G 1970, 'Preface', PICMET 2014 - Portland International Center for Management of Engineering and Technology, Proceedings: Infrastructure and Service Integration.
Kolagani, N, Ramu, P, Voinov, AA, Gali, R & Rao, CL 1970, 'Educating stakeholders about the need for water balance using a participatory modeling framework', Proceedings - 7th International Congress on Environmental Modelling and Software: Bold Visions for Environmental Modeling, iEMSs 2014, pp. 1105-1112.
View description>>
Groundwater resources in many villages of the developing countries have been undergoing rapid decline over last few decades due to their unsustainable large scale exploitation. One of the main reasons for such overexploitation is the inability of village communities to collectively visualize and understand clearly the long term implications of such overexploitation. There is hence an urgent need to create awareness among stakeholders about the unsustainable nature of such overexploitation and to facilitate sustainable usage. Spatio-temporal participatory modeling of their water management practices can help greatly in promoting such awareness among village communities. These modeling tools can then be used by these stakeholders to analyze various future scenarios and plan their actions in an informed way. In this paper, a participatory modeling framework for carrying out water balance studies at village level is proposed and is demonstrated using case study of a South Indian village. Stakeholders analyzed their past actions and future plans using simulations. Classes needed for simulation and rules for their behaviour, such as what influences the decision of a farmer to sow a crop or to sink a well, were gathered through discussions with knowledgeable stakeholders. An open source Geographical Information System. 'Quantum GIS', extended using Python programming was used as the platform for carrying out and visually presenting these spatio-temporal simulations to the stakeholders.
Krol, D, Budka, M & Musial, K 1970, 'Simulating the Information Diffusion Process in Complex Networks Using Push and Pull Strategies', 2014 European Network Intelligence Conference, 2014 European Network Intelligence Conference (ENIC), IEEE, Wroclaw, POLAND, pp. 1-8.
View/Download from: Publisher's site
Le, S, Dong, H, Hussain, FK, Hussain, OK, Ma, J, Zhang, Y & IEEE 1970, 'Multicriteria Decision Making with Fuzziness and Criteria Interdependence in Cloud Service Selection', 2014 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), IEEE International Conference on Fuzzy Systems, IEEE - Institute of Electrical and Electronics Engineers, Beijing, China, pp. 1929-1936.
View/Download from: Publisher's site
Li, H, Li, P, Guo, S & Yu, S 1970, 'Byzantine-resilient secure software-defined networks with multiple controllers', 2014 IEEE International Conference on Communications (ICC), ICC 2014 - 2014 IEEE International Conference on Communications, IEEE, Sydney, AUSTRALIA, pp. 695-700.
View/Download from: Publisher's site
Li, X, Zhang, L, Luo, P, Chen, E, Xu, G, Zong, Y & Guan, C 1970, 'Mining user tasks from print logs', 2014 International Joint Conference on Neural Networks (IJCNN), 2014 International Joint Conference on Neural Networks (IJCNN), IEEE, Beijing, China, pp. 1250-1257.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. With lots of applications emerging in World Wide Web, many interaction data from users are collected and exploited to discover user behavior or interest patterns. In this paper, we attempt to exploit a new interaction data, namely print logs, where each record is printing URLs selected by a user using a popular web printing tool. Users usually print web contents based on an intention (subtask or task). Apparently, mining common print tasks from print logs is able to capture users' intentions, which undoubtedly benefits many web applications, such as task oriented recommendation and behavior targeting. However, it is not an easy job to perform this due to the difficulty of URL topic representation and task formulation. To this end, we propose a general framework, named UPT (Users Print Tasks mining framework), for mining print tasks from print logs. Specifically, we attempt to leverage delicious (a social book marking web service) as an external thesaurus to expand the expression of each URL by selecting tags associated with the domain of each URL. Then, we construct a tag co-occurrence graph where similar tags can be clustered as subtasks. If we view each subtask as an item, then the print log is transformed to a transaction database, on which an efficient pattern mining algorithm is proposed to induce tasks. Finally, we evaluate the effectiveness of the proposed framework through experiments on a real print log.
Lin Gu, Deze Zeng, Song Guo & Shui Yu 1970, 'Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing', 2014 International Conference on Computing, Networking and Communications (ICNC), 2014 International Conference on Computing, Networking and Communications (ICNC), IEEE, Honolulu, HI, pp. 211-215.
View/Download from: Publisher's site
Lin, C-T, Chen, S-A, Wang, Y-K & Lu, S-W 1970, 'Develop a multiple physiological system of ICU patients with symptom analysis and decision making', 2014 IEEE International Conference on Consumer Electronics - Taiwan, 2014 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), IEEE, pp. 163-164.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. This study presents a real-time, and auto-alarm intelligent system of healthcare for ICU patients. The current version of the expert system can detect EEG and ECG to identify different types of abnormal cardiac rhythms in real-time and identify patients' acute stress. The proposed system also activates an emergency medical alarm system when problems occur.
Liu, A, Zhang, G & Lu, J 1970, 'Concept Drift Detection Based on Anomaly Analysis', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), International Conference on Neural Information Processing, Springer International Publishing, Kuching, Sarawak, Malaysia, pp. 263-270.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2014. In online machine learning, the ability to adapt to new concept quickly is highly desired. In this paper, we propose a novel concept drift detection method, which is called Anomaly Analysis Drift Detection (AADD), to improve the performance of machine learning algorithms under non-stationary environment. The proposed AADD method is based on an anomaly analysis of learner’s accuracy associate with the similarity between learners’ training domain and test data. This method first identifies whether there are conflicts between current concept and new coming data. Then the learner will incrementally learn the non conflict data, which will not decrease the accuracy of the learner on previous trained data, for concept extension. Otherwise, a new learner will be created based on the new data. Experiments illustrate that this AADD method can detect new concept quickly and learn extensional drift incrementally.
LIU, A, ZHANG, G & LU, JIE 1970, 'A NOVEL WEIGHTING METHOD FOR ONLINE ENSEMBLE LEARNING WITH THE PRESENCE OF CONCEPT DRIFT', Decision Making and Soft Computing, The 11th International FLINS Conference (FLINS 2014), WORLD SCIENTIFIC, Brazil, pp. 550-555.
View/Download from: Publisher's site
View description>>
Ensemble of classifiers is a very popular method for online and incremental learning in non-stationary environment, as it improves the accuracy of single classifiers and is able to recover from drifting concept without explicit drift detection. However, current ensemble weighing methods do not consider the relationship between a test instance and each ensemble member's training domain. As a result, a locally correct ensemble member may be reduced weight unfairly because that its prediction result of an out of domain test instance is wrong. These inaccuracies will increases when there is a significant concept change. In this paper, therefore, we proposed a fuzzy online ensemble weighting method which takes the consideration of the degree of membership of each instance in each ensemble member and a modified majority voting method to improve the ability of ensembles on handling online classification tasks with concept drift
Liu, L, Chen, S, Hsu, CH, Xu, G, Zhang, X, Li, L, Su, G, Liu, M, Huang, Z, Zhu, T, Jin, J, Carlson, D, Chen, W, Wang, B, An, N & Yang, Y 1970, 'Message from the PUDA 2014 Workshop Chairs', 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 IEEE 11th Intl Conf on Autonomic & Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), IEEE, p. xxxvii.
View/Download from: Publisher's site
Liu, M, Dou, W, Yu, S & Zhang, Z 1970, 'A clusterized firewall framework for cloud computing', 2014 IEEE International Conference on Communications (ICC), ICC 2014 - 2014 IEEE International Conference on Communications, IEEE, Sydney, AUSTRALIA, pp. 3788-3793.
View/Download from: Publisher's site
Liu, N, Li, L, Xu, G & Yang, Z 1970, 'Identifying domain-dependent influential microblog users: A post-feature based approach', Proceedings of the National Conference on Artificial Intelligence, AAAI Conference on Artificial Intelligence, AAAI Press, Quebec, Canada, pp. 3122-3123.
View description>>
Users of a social network like to follow the posts published by influential users. Such posts usually are delivered quickly and thus will produce a strong influence on public opinions. In this paper, we focus on the problem of identifying domain- dependent influential users(or topic experts). Some of traditional approaches are based on the post contents of users users to identify influential users, which may be biased by spammers who try to make posts related to some topics through a simple copy and paste. Others make use of user authentication information given by a service platform or user self description (introduction or label) in finding influential users. However, what users have published is not necessarily related to what they have registed and described. In addition, if there is no comments from other users, its less objective to assess a users post quality. To improve effectiveness of recognizing influential users in a topic of microblogs, we propose a post-feature based approach which is supplementary to post- content based approaches. Our experimental results show that the post-feature based approach produces relatively higher precision than that of the content based approach.
Liu, W, Sarda, A, Chen, F & Geers, G 1970, 'Forecasting changes of traffic flow caused by road incidents', 21st World Congress on Intelligent Transport Systems, ITSWC 2014: Reinventing Transportation in Our Connected World.
View description>>
This paper explores the potential for supervised machine learning techniques in forecasting changes of traffic flow caused by road incidents based on incident features. Data fusion approaches are carried out on a high quality SCATS dataset measuring traffic flow of a major Australian city, and on an incident log data set encompassing a time period of 4 months' road incidents. Based on incident features, a range of both prevalent and advanced machine learning algorithms are applied to these data, and the accuracies of the algorithms are evaluated. We then examine the effectiveness of such models in categorizing changes of traffic flow as either trivial or non-trivial in the extent of their responses to incidents. The models are promising in their capacity and are able to correctly predict with more than 70% accuracy that a change of traffic flow shall be major. This has significant implications for determining the optimal allocation of resources for both road traffic control and incident response units.
Liu, Y-T, Lin, Y-Y, Wu, S-L, Chuang, C-H, Prasad, M & Lin, C-T 1970, 'EEG-based driving fatigue prediction system using functional-link-based fuzzy neural network', 2014 International Joint Conference on Neural Networks (IJCNN), 2014 International Joint Conference on Neural Networks (IJCNN), IEEE, Beijing, PEOPLES R CHINA, pp. 4109-4113.
View/Download from: Publisher's site
View description>>
This study presents a fuzzy prediction system for the forecasting and estimation of driving fatigue, which utilizes a functional-link-based fuzzy neural network (FLFNN) to predict the drowsiness (DS) level in car driving task. The cognitive state in car driving task is one of key issue in cognitive neuroscience because fatigue driving usually causes enormous losses nowadays. The damage can be extremely decreased by the assistant of various artificial systems. Many Electroencephalography (EEG)-based interfaces have been widely developed recently due to its convenient measurement and real-time response. However, the improvement of recognition accuracy is still confined to some specific problems (e.g., individual difference). In order to solve this issue, the proposed methodology in this paper utilizes a nonlinear fuzzy neural network structure to increase the adaptability in the real-world environment. Therefore, this study is further to analysis the brain activities in car driving, which is constructed in a simulated three-dimensional virtual-reality (VR) environment. Finally, through the development of brain cognitive model in car driving task, this system can predict the cognitive state effectively before drivers' action and then provide correct feedback to users. This study also compared the result with the-state-of-art systems, including Linear Regression (LR), Multi-Layer Perceptron Neural Network (MLPNN) and Support Vector Regression (SVR). Results of this study demonstrate the effectiveness of the proposed FLFNN model.
Mairiza, D, Zowghi, D & Gervasi, V 1970, 'Utilizing TOPSIS: A Multi Criteria Decision Analysis Technique for Non-Functional Requirements Conflicts', Proceedings of the Communications in Computer and Information Science, Asia Pacific Requirements Engineering Symposium, Springer Berlin Heidelberg, Auckland, New Zealand, pp. 31-44.
View/Download from: Publisher's site
View description>>
Experience shows that many software systems suffer from inherent conflict among Non-Functional Requirements (NFRs). It also confirms that resolution strategies for handling NFRs conflicts often result in changing overall design guidelines, not by simply changing one module. Therefore, in software system development, software developers need to analyse the NFRs and conflicts among them in order to make decisions about alternative design solutions. This paper presents the use of Multi Criteria Decision Analysis (MCDA) approach for NFRs conflict decision analysis. TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution), as one of the essential MCDA techniques has been adopted to resolve such conflict. We show how the systematic application of TOPSIS can assist software developers select the most preferable design solutions with respect to the conflicting NFRs. The quantitative result generated with this technique will be used as the basis for decision support. An example that shows the application of TOPSIS is also presented. © Springer-Verlag Berlin Heidelberg 2014.
Mao, M, Lu, J, Zhang, G & Zhang, J 1970, 'Hybridizing Social Filtering for Recommender Systems', FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), International Conference on Intelligent Systems and Knowledge Engineering, Springer Berlin Heidelberg, Shenzhen, China, pp. 273-285.
View/Download from: Publisher's site
View description>>
Users send requests to recommender systems for getting suggested products or services. Collaborative filtering is a popular technique for making such suggestions efficiently, but it suffers from a drawback known as “cold-start” problem. Social filtering may succeed for such users, since it utilize the extra social relations of users. It gives us opportunities to eliminate the limitations by hybridizing social filtering into traditional collaborative filtering. To handle this issue, differing from previous fusion models that only combine the final results, this paper proposed a new neighborhood fusion model to make hybridization at an earlier and deeper stage. Experiment-based comparative analyses are also conducted. The results show that our model is of a higher recommendation quality, on different datasets.
Mao, M, Zhang, G, Lu, J & Zhang, J 1970, 'A Signed Trust-Based Recommender Approach for Personalized Government-to-Business e-Services', Advances in Intelligent Systems and Computing, International Conference on Intelligent Systems and Knowledge Engineering, Springer Berlin Heidelberg, Beijing, China, pp. 91-101.
View/Download from: Publisher's site
View description>>
Recently recommender systems are introduced into the web-based government applications which expect to provide personalized Government-to-Business (G2B) e-Services. For more personalization, we illustrate a subjective signed trust relationship between users, and based on such trust we proposed a recommendation framework for G2B e-services. A case study is conducted as an example of implementing our approach in e-government applications. Empirical analysis is also conducted to compare our approach with other models, which shows that our approach is of the highest. In conclusion, the signed trust relationship can reflect the real preferences of users, and the proposed recommendation framework is believed to be reliable and applicable. © Springer-Verlag Berlin Heidelberg 2014.
Marchand, JM & Sood, SS 1970, 'Theory Development of How Student Entrepreneurs Think, Learn and Work: Uncovering Deep Insights into the Cognitive Processes of Student Entrepreneur Lived Experiences to Develop a Cue Inventory of Student Entrepreneurship', Australian Centre for Entrepreneurship Research Exchange Conference 2014 Conference Proceedings, Australian Centre for Entrepreneurship Research Exchange Conference (ACERE), Queensland University of Technology, Sydney, pp. 785-800.
View description>>
Principal Topic: The concept of the true student entrepreneur is relatively new and attracting societal and academic attention. A paucity of research exists on the cognitive processes student entrepreneurs use to think, learn and work. Student entrepreneurs operate within a challenging environment balancing entrepreneurial work activities and study life. Normally, the archetypal entrepreneur of last century drops out of university. This research explores the student entrepreneur not just as a student attending entrepreneurial classes but conducting business on/near campus or leading a campus enterprise (voluntary association) while simultaneously attending formal university award courses.Methodology: This preliminary study centres on the lived experiences of student entrepreneurs not as most previous studies the intentionality of students to become entrepreneurs. As such,in-depth interviews take place with student entrepreneurs based on the Critical Incident Technique (Flanagan 1954) focusing on storytelling by student entrepreneurs in natural campus settings.Results and Implications: A cue inventory of student entrepreneurship is sourced from the lived experiences of student entrepreneurs and informsthe generation of a cognitive framework.Findings point to the university environment providing leverage to help innovatively solve entrepreneurial problems in real time. Student entrepreneurs are “luck ready” always open for potential opportunities. As a consequence universities interested in fostering true entrepreneurship beyond classroom teaching are able to facilitate and manage various sources of opportunities.
Meng, H & Li, S 1970, 'PRICAI 2014: Trends in Artificial Intelligence', PRICAI 2014: Trends in Artificial Intelligence - 13th Pacific Rim International Conference on Artificial Intelligence, Gold Coast, QLD, Australia, December 1-5, 2014. Proceedings, Pacific Rim International Conference on Artificial Intelligence, Springer International Publishing, Gold Coast, AUSTRALIA, pp. 77-90.
View/Download from: Publisher's site
View description>>
Belief revision mainly concerns how an agent updates her belief with new evidence. The AGM framework of belief revision models belief revision as revising theories by propositions. To characterise AGM-style belief revision operators, Grove proposed in 1988 a representation model using systems of spheres. This ‘spheres’ model is very influential and has been extended to characterise multiple belief revision operators. Several fundamental problems remain unsettled regarding this ‘spheres’ model. In this paper we introduce a topology on the set of all worlds of an infinite propositional language and use this topology to characterise systems of spheres. For each AGM operator ∘, we show that, among all systems of spheres deriving ∘, there is a minimal one which is contained in every other system. We give a topological characterisation of these minimal systems. Furthermore, we propose a method for extending an AGM operator to a multiple revision operator and show by an example that the extension is not unique. This negatively answers an open problem raised by Peppas.
Meng, Q, Tafavogh, S, Kennedy, PJ & IEEE 1970, 'Community Detection on Heterogeneous Networks by Multiple Semantic-Path Clustering', 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), International Conference on Computational Aspects of Social Networks (CASoN), IEEE, Porto, PORTUGAL, pp. 7-12.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Heterogeneous networks have become a commonly used model to represent complex and abstract social phenomena. They allow objects to have many different relationships and represent relationships by semantic paths which connect object types via a sequence of relations. A major challenge in community detection on heterogeneous networks is how to organize and combine different semantic paths. In order to acquire desired clustering, we propose a novel community detection method for heterogeneous networks based on matrix decomposition and semantic paths. The major advantage of this method is to treat objects individually and to assign them with different combinations of semantic-path weights so as to improve the clustering quality. The comparative experiments of the proposed method with another two state-of-the-art methods, spectral clustering and path-selection clustering, confirms that it can acquire desired clustering results better.
Merigo, JM & Yang, J-B 1970, 'Bibliometric analysis in financial research', 2014 IEEE Conference on Computational Intelligence for Financial Engineering & Economics (CIFEr), 2014 IEEE Conference on Computational Intelligence for Financial Engineering & Economics (CIFEr), IEEE, London, ENGLAND, pp. 223-230.
View/Download from: Publisher's site
Merigó, JM, Casanovas, M & Xu, Y 1970, 'Fuzzy group decision-making with generalized probabilistic OWA operators', Journal of Intelligent & Fuzzy Systems, IOS Press, pp. 783-792.
View/Download from: Publisher's site
Merigó, JM, Peris-Ortiz, M & Palacios-Marqués, D 1970, 'Entrepreneurial fuzzy group decision-making under complex environments', Journal of Intelligent & Fuzzy Systems, IOS Press, pp. 901-912.
View/Download from: Publisher's site
MERIGÓ, JM, ZHOU, L & YU, D 1970, 'DISTANCE MEASURES WITH PROBABILITIES, OWA OPERATORS AND WEIGHTED AVERAGES', Decision Making and Soft Computing, The 11th International FLINS Conference (FLINS 2014), WORLD SCIENTIFIC, Joao Pessoa, BRAZIL, pp. 324-329.
View/Download from: Publisher's site
Mols, I, Hoven, EVD & Eggen, B 1970, 'Making memories', Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational, NordiCHI '14: The 8th Nordic Conference on Human-Computer Interaction, ACM, Helsinki, Finland, pp. 256-265.
View/Download from: Publisher's site
View description>>
For a long time people have collected mementos; items kept
as reminder of a person, place or event. Practices of
memento creation are constantly changing; for instance
through the accessibility of digital photography. Still, we
most often create mementos of special occasions such as
weddings or holidays. However, besides these milestones,
we cherish certain experiences from our everyday life. This
paper describes a cultural probe study exploring which
memories of everyday life become valuable. Our findings
confirm that seemingly mundane experiences can become
valuable. More specifically, a memory was seen as valuable
if it: was regularly repeated, had social value, continued in
the present, influenced life, was exemplary of character or
showed a contrast. The moment memories become valuable
is difficult to recognize and often few media were created
of everyday life experiences. We discuss the implications of
these findings for
Naik, T, Thommandram, A, Fernando, KES, Bressan, N, James, A & McGregor, C 1970, 'A Method for a Real-Time Novel Premature Infant Pain Profile Using High Rate, High Volume Physiological Data Streams', 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS), IEEE, Icahn Sch Med, New York, NY, pp. 34-37.
View/Download from: Publisher's site
Nemoto, K, Devitt J., SJ, Trupke, M, Stephens M., AM, Everitt S., MS, Buczak, K, Noebauer, T, Schmiedmayer, J & Munro, WJ 1970, 'Memory-based quantum repeaters with NV centers', Optics InfoBase Conference Papers.
View description>>
We present a simple design of a quantum repeater design build from single NV- centers embedded in an optical cavity. We compare different quantum networks from a simple linear chain to a fully fault-tolerant quantum internet. © 2014 OSA.
Nemoto, K, Devitt, SJ, Trupke, M, Stephens, AM, Everitt, MS, Buczak, K, Noebauer, T, Schmiedmayer, J & Munro, WJ 1970, 'Memory-based quantum repeaters with NV centers', Conference on Lasers and Electro-Optics Europe - Technical Digest.
View description>>
We present a simple design of a quantum repeater design build from single NV- centers embedded in an optical cavity. We compare different quantum networks from a simple linear chain to a fully fault-tolerant quantum internet.
Nemoto, K, Trupke, M, Devitt, SJ, Stephens, AM, Scharfenberger, B, Buczak, K, Nöbauer, T, Schmiedmayer, J & Munro, WJ 1970, 'Quantum repeater architecture and NV-based node technology', SPIE Proceedings, SPIE Optical Engineering + Applications, SPIE, San Diego, CA.
View/Download from: Publisher's site
Neville, A, Devitt J., SJ, Shadbolt J., PJ, Thackray, L, Peruzzo, A & O'Brien, JL 1970, 'Demonstration of a Characterisation Protocol for Two-qubit Hamiltonians on a Photonic Quantum Simulator', Optics InfoBase Conference Papers.
View description>>
We demonstrate an entanglement mapping based characterisation protocol for coupled-qubit Hamiltonians. This is achieved by generating and measuring time-evolved states relevant to an NV-diamond system, using a reconfigurable integrated optical device. © 2014 Optical Society of America.
Neville, A, Devitt, SJ, Shadbolt, PJ, Thackray, L, Peruzzo, A & O'Brien, JL 1970, 'Demonstration of a characterisation protocol for two-qubit hamiltonians on a photonic quantum simulator', Conference on Lasers and Electro-Optics Europe - Technical Digest.
View description>>
We demonstrate an entanglement mapping based characterisation protocol for coupled-qubit Hamiltonians. This is achieved by generating and measuring time-evolved states relevant to an NV-diamond system, using a reconfigurable integrated optical device.
Neville, A, Devitt, SJ, Shadbolt, PJ, Thackray, L, Peruzzo, A & O'Brien, JL 1970, 'Demonstration of a Characterisation Protocol for Two-qubit Hamiltonians on a Photonic Quantum Simulator', Optics InfoBase Conference Papers.
View description>>
We demonstrate an entanglement mapping based characterisation protocol for coupled-qubit Hamiltonians. This is achieved by generating and measuring time-evolved states relevant to an NV-diamond system, using a reconfigurable integrated optical device. © 2014 Optical Society of America.
Oberst, S, Nava-Baro, E, Lai, JCS & Evans, TA 1970, 'An innovative signal processing technique for the extraction of ants' walking signals', INTERNOISE 2014 - 43rd International Congress on Noise Control Engineering: Improving the World Through Noise Control, INTERNOISE 2014 - 43rd International Congress on Noise Control Engineering: Improving the World Through Noise Control.
View description>>
Eusocial insects such as bees, ants and termites communicate multi-modally using chemical, visual, tactile and vibrational cues. While much work has been done on chemical and visual communications, the tactile and vibrational communication channel is somewhat neglected. Recent research indicates that structural vibrations caused by ants can be used to identify their activity level. However, these structural vibrations are caused by the response of the substrate excited by ants walking. The objective of this study is to determine the footprint of ants walking by separating the response of the substrate from the walking signal. The vibration of the substrate (in this case, a wooden veneer) caused by ants walking is measured by a laser vibrometer in an experimental setup isolated from environmental vibrations. By filtering the recorded vibration signal using a technique based on the dynamics in phase space followed by deconvolution from the response of the veneer using TIKHONOV regularisation, the ant's walking signal is extracted and its nature determined.
Paler, A, Devitt, S, Nemoto, K & Polian, I 1970, 'Software-based Pauli Tracking in Fault-tolerant Quantum Circuits', 2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), Design, Automation and Test in Europe Conference and Exhibition (DATE), IEEE, GERMANY, Dresden.
Paler, A, Devitt, SJ, Nemoto, K & Polian, I 1970, 'Cross-level Validation of Topological Quantum Circuits', REVERSIBLE COMPUTATION, RC 2014, 6th International Conference on Reversible Computation (RC), SPRINGER INTERNATIONAL PUBLISHING AG, Kyoto, JAPAN, pp. 189-200.
View description>>
Quantum computing promises a new approach to solving difficult computationalproblems, and the quest of building a quantum computer has started. While thefirst attempts on construction were succesful, scalability has never beenachieved, due to the inherent fragile nature of the quantum bits (qubits). Fromthe multitude of approaches to achieve scalability topological quantumcomputing (TQC) is the most promising one, by being based on an flexibleapproach to error-correction and making use of the straightforwardmeasurement-based computing technique. TQC circuits are defined within a large,uniform, 3-dimensional lattice of physical qubits produced by the hardware andthe physical volume of this lattice directly relates to the resources requiredfor computation. Circuit optimization may result in non-intuitive mismatchesbetween circuit specification and implementation. In this paper we introducethe first method for cross-level validation of TQC circuits. The specificationof the circuit is expressed based on the stabilizer formalism, and thestabilizer table is checked by mapping the topology on the physical qubitlevel, followed by quantum circuit simulation. Simulation results show thatcross-level validation of error-corrected circuits is feasible.
Paler, A, Devitt, SJ, Nemoto, K & Polian, I 1970, 'Software Pauli Tracking for Quantum Computation', Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014. pp. 1-4.
View/Download from: Publisher's site
View description>>
The realisation of large-scale quantum computing is no longer simply ahardware question. The rapid development of quantum technology has resulted indozens of control and programming problems that should be directed towards theclassical computer science and engineering community. One such problem is knownas Pauli tracking. Methods for implementing quantum algorithms that arecompatible with crucial error correction technology utilise extensive quantumteleportation protocols. These protocols are intrinsically probabilistic andresult in correction operators that occur as byproducts of teleportation. Thesebyproduct operators do not need to be corrected in the quantum hardware itself.Instead, byproduct operators are tracked through the circuit and output resultsreinterpreted. This tracking is routinely ignored in quantum information as itis assumed that tracking algorithms will eventually be developed. In this workwe help fill this gap and present an algorithm for tracking byproduct operatorsthrough a quantum computation. We formulate this work based on quantum gatesets that are compatible with all major forms of quantum error correction anddemonstrate the completeness of the algorithm.
Pan, C, Liu, B, Zhou, H, Gui, L & Chen, J 1970, 'Interest-based content delivery in wireless mesh networks with hybrid antenna mode', 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP), 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP), IEEE.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Driven by the great performance improvement using flexible combination of omnidirectional and directional antennas, wireless mesh networks (WMNs) with hybrid antenna mode have become a promising technology for providing users with better network service. Since multimedia contents account for most of the network traffic, content delivery is a big issue when designing network protocols. By combining the use of both directional and omnidirectional antennas, the performance of content delivery in WMNs can be improved. Currently, research works have shown that the relationship between nodes' interests in the network reveals the small-world pattern, so we can analyze nodes' interests and design optimal mechanism to deliver contents based on their interests. In this paper, we use the interest-sharing graph to capture the similarities between nodes' interests. Based on the interesting-sharing graph, we cluster nodes in the network using graph partitioning algorithm. The purpose of clustering is to make nodes in the same cluster share similar interests. After clustering nodes, we design a content delivery mechanism in WMNs which takes advantage of both omnidirectional and directional antennas. The simulation results show that our proposed content delivery mechanism can adapt to the WMNs and performs better than using omnidirectional or directional antennas only.
Pileggi, SF & Amor, R 1970, 'Modelling Metropolitan Activity through Abductive Reasoning on Geographic Space', 2014 IEEE International Conference on Computer and Information Technology, 2014 IEEE International Conference on Computer and Information Technology (CIT), IEEE, Xian, PEOPLES R CHINA, pp. 783-788.
View/Download from: Publisher's site
Porter, L, Zingaro, D & Lister, R 1970, 'Predicting student success using fine grain clicker data', Proceedings of the tenth annual conference on International computing education research, ICER '14: International Computing Education Research Conference, ACM, Glasgow, United Kingdom, pp. 51-58.
View/Download from: Publisher's site
View description>>
Abstract: Recent research suggests that the rst weeks of a CS1 course have a strong in influence on end-of-course student performance. The present work aims to rene the understanding of this phenomenon by using in-class clicker questions as a source of student performance. Clicker questions generate per-lecture and per-question data with which to assess student under-standing. This work demonstrates that clicker question performance early in the term predicts student outcomes at the end of the term. The predictive nature of these questions applies to code-writing questions, multiple choice questions, and the final exam as a whole. The most predictive clicker questions are identified and the relationships between these questions and final exam performance are examined.
Prasad, M, Chou, KP, Saxena, A, Kawrtiya, OP, Li, DL & Lin, CT 1970, 'Collaborative fuzzy rule learning for Mamdani type fuzzy inference system with mapping of cluster centers', 2014 IEEE Symposium on Computational Intelligence in Control and Automation (CICA), 2014 IEEE Symposium on Computational Intelligence in Control and Automation (CICA), IEEE, USA, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. This paper demonstrates a novel model for Mamdani type fuzzy inference system by using the knowledge learning ability of collaborative fuzzy clustering and rule learning capability of FCM. The collaboration process finds consistency between different datasets, these datasets can be generated at various places or same place with diverse environment containing common features space and bring together to find common features within them. For any kind of collaboration or integration of datasets, there is a need of keeping privacy and security at some level. By using collaboration process, it helps fuzzy inference system to define the accurate numbers of rules for structure learning and keeps the performance of system at satisfactory level while preserving the privacy and security of given datasets.
Prasad, M, Chou, KP, Saxena, A, Kawrtiya, OP, Li, DL & Lin, CT 1970, 'Collaborative Fuzzy Rule Learning for Mamdani Type Fuzzy Inference System with Mapping of Cluster Centers', 2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CONTROL AND AUTOMATION (CICA), IEEE Symposium on Computational Intelligence in Control and Automation (CICA), IEEE, Orlando, FL, pp. 15-20.
Prasad, M, Siana, L, Li, DL, Lin, CT, Liu, YT & Saxena, A 1970, 'A preprocessed induced partition matrix based collaborative fuzzy clustering for data analysis', 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, Beijing, China, pp. 1553-1558.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Preprocessing is generally used for data analysis in the real world datasets that are noisy, incomplete and inconsistent. In this paper, preprocessing is used to refine the inconsistency of the prototype and partition matrices before getting involved in the collaboration process. To date, almost all organizations are trying to establish some collaboration with others in order to enhance the performance of their services. Due to privacy and security issues they cannot share their information and data with each other. Collaborative clustering helps this kind of collaborative process while maintaining the privacy and security of data and can still yield a satisfactory result. Preprocessing helps the collaborative process by using an induced partition matrix generated based on cluster prototypes. The induced partition matrix is calculated from local data by using the cluster prototypes obtained from other data sites. Each member of the collaborating team collects the data and generates information locally by using the fuzzy c-means (FCM) and shares the cluster prototypes to other members. The other members preprocess the centroids before collaboration and use this information to share globally through collaborative fuzzy clustering (CFC) with other data. This process helps system to learn and gather information from other data sets. It is found that preprocessing helps system to provide reliable and satisfactory result, which can be easily visualized through our simulation results in this paper.
Prior, J, Connor, A & Leaney, J 1970, 'Things coming together', Proceedings of the 2014 conference on Innovation & technology in computer science education - ITiCSE '14, the 2014 conference, ACM Press, Uppsala, Sweden.
View/Download from: Publisher's site
View description>>
We have evidence that the software studio provides learning that genuinely prepares students for professional practice. Learning that entails dealing with complex technical problems and tools. Learning that involves working effectively in groups. Learning that results in the building of students self-confidence and the conviction that they can successfully deal with the challenges of modern software system development. Learning that allows the accomplishment of the more elusive professional competencies. In order for students to achieve this type of deep learning, they need time to immerse themselves in complex problems within a rich environment such as the software studio. The studio also enables each student group to develop and succeed according to their needs, and in different ways. The conclusions above arise from an ethnographic study in an undergraduate software studio prototype with two student groups and their mentors.
Prior, JR 1970, 'AsseSQL', Proceedings of the 2014 conference on Innovation & technology in computer science education - ITiCSE '14, the 2014 conference, ACM Press, p. 327.
View/Download from: Publisher's site
View description>>
1. THE TOOL AsseSQL is an online, browser-based SQL query assessment tool, developed in-house. 2. GOAL To assess students' SQL query design and construction skills in a manner that more authentically mirrors how these skills are applied in professional practice. 3. APPLICATION With manual assessment, it's difficult for students to know if they have the query design correct, or if their query returns the correct results. One of the difficulties for a student is conceptualising and visualising the result of an executed SQL statement. Constructing queries online, executing them, visually verifying the result and, if necessary, modifying the query until it gives the correct result further internalises the query formulation skill. Immediate feedback is an important component in the learning and assessment loop. Copyright © 2014 ACM.
Prior, JR, Arjpru, S & Leaney, JR 1970, 'Towards an industry-collaborative, reflective software learning and development environment', Proceedings of the 23rd Australasian Software Engineering Conference ASWEC 2014, Australian Software Engineering Conference, IEEE, Sydney, Australia.
View description>>
A significant mismatch (88%) has been found between what employers and graduates perceived as important abilities and how universities had prepared graduates for employment. Conventional Teaching and Learning approaches fall short of providing the kind of learning experiences needed to prepare graduates for the realities of professional practice in industry. On the other hand, current students have very different learning styles than their forebears. Their learning preferences are experiential, working in teams, and using technology for learning. One solution to address this mismatch issue is the software development studio. Our aim is to provide an industry-collaborative, reflective learning environment that will effect the students development of holistic skills, such as teamwork, collaboration and communication, together with technical skills, in a discipline context. This paper further describes the design and validation via prototyping for our software development studio, the progress that we have made so far, and presents the preliminary insights gleaned from our studio prototyping. The prototypes raised issues of attitudinal change, communication, reflection, sharing, mentoring, use of process, `doing time, relationships and innovation.
Qi Gu, Yan Zhang, Jian Cao, Guandong Xu & Cuzzocrea, A 1970, 'A confidence-based entity resolution approach with incomplete information', 2014 International Conference on Data Science and Advanced Analytics (DSAA), 2014 International Conference on Data Science and Advanced Analytics (DSAA), IEEE, China, pp. 97-103.
View/Download from: Publisher's site
View description>>
Entity resolution identifies entities from different data sources that refer to the same real-world entity and it is an important prerequisite for integrating data from multiple sources. Entity resolution mainly relies on similarity measures on data records. Unfortunately, the data quality of data sources is not so good in practice. Especially web data sources often only provide incomplete information, which leads to the difficulties of direct applying similarity measures to identify the same entities. In order to address this problem, the concept of confidence is introduced to measure the trustworthy of the similarity calculation. An adaptive rule-based approach is used to calculate the similarity between records and its confidence is also derived. Then the similarity and confidence are propagated on the entity relational graph until fix point is reached. Finally, any pair of two records can be determined as matched or unmatched based on a threshold. We performed a series of experiments on real data sets and experiment results show that our approach has a better performance comparing with others.
Rahman, ZU, Hussain, OK & Hussain, FK 1970, 'Time Series QoS Forecasting for Management of Cloud Services', 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), IEEE, Guangdong.
View/Download from: Publisher's site
View description>>
Management of Cloud services is one of the important aspects for the cloud service users to manage in order to ensure that they achieve their required outcomes. There is a wide interest in the literature on this problem, but most of that work has approached this problem from the service provider's (platform) viewpoint. While on the one hand, having techniques to monitor a service from this viewpoint is important, on the other hand it is also important to monitor the QoS of a cloud service being received at the user side. This is because there is a possibility of the service user being unable to obtain the promised service with the required characteristics due to factors beyond the platform side which affects the QoS being received at the run time. One of the main factors for user side service monitoring is the accurate forecasting of the QoS of cloud services over a period of time in the future based on the past observed pattern or history. In this paper we investigate the use of exponential smoothing and autoregressive moving average models for forecasting the QoS of cloud services. We propose a forecasting mechanism which uses the past QoS values collected though QoS monitoring to forecast the future QoS of cloud services.
Ramezani, F, Lu, J & Hussain, F 1970, 'Task Based System Load Balancing Approach in Cloud Environments', Knowledge Engineering and Management, International Conference on Intelligent Systems and Knowledge Engineering, Springer Berlin Heidelberg, Beijing, China, pp. 31-42.
View/Download from: Publisher's site
View description>>
Live virtual machine (VM) migration is a technique for transferring an active VM from one physical host to another without disrupting the VM. This technique has been proposed to reduce the downtime for migrated overload VMs. As VMs migration takes much more times and cost in comparison with tasks migration, this study develops a novel approach to confront with the problem of overload VM and achieving system load balancing, by assigning the arrival task to another similar VM in a cloud environment. In addition, we propose a multi-objective optimization model to migrate these tasks to a new VM host applying multi-objective genetic algorithm (MOGA). In the proposed approach, there is no need to pause VM during migration time. In addition, as contrast to tasks migration, VM live migration takes longer to complete and needs more idle capacity in host physical machine (PM), the proposed approach will significantly reduce time, downtime memory, and cost consumption.
Saberi, M, Hussain, OK & Chang, E 1970, 'Intelligent online customer recognition framework: Dealing with common personal names', 2014 9th IEEE Conference on Industrial Electronics and Applications, 2014 IEEE 9th Conference on Industrial Electronics and Applications (ICIEA), IEEE, Hangzhou, PEOPLES R CHINA, pp. 966-+.
View/Download from: Publisher's site
Saberi, M, Hussain, OK, Janjua, NK & Chang, E 1970, 'In-house Crowdsourcing-Based Entity Resolution: Dealing with Common Names', 2014 IEEE 11th International Conference on e-Business Engineering, 2014 IEEE 11th International Conference on e-Business Engineering (ICEBE), IEEE, Guangzhou, PEOPLES R CHINA, pp. 83-88.
View/Download from: Publisher's site
Shafiq, H, McGregor, C & Murphy, B 1970, 'The Impact of Cervical Manipulation on Heart Rate Variability', 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), IEEE, Chicago, IL, pp. 3406-3409.
View/Download from: Publisher's site
Sharma, N, Pal, U & Blumenstein, M 1970, 'A study on word-level multi-script identification from video frames', 2014 International Joint Conference on Neural Networks (IJCNN), 2014 International Joint Conference on Neural Networks (IJCNN), IEEE, Beijing, China, pp. 1827-1833.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. The presence of multiple scripts in multi-lingual document images makes Optical Character Recognition (OCR) of such documents a challenging task. Due to the unavailability of a single OCR system which can handle multiple scripts, script identification becomes an essential step for choosing the appropriate OCR. Although, there are various techniques available for script identification from handwritten and printed documents having simple backgrounds, however script identification from video frames has been seldom explored. Video frames are coloured and suffer from low resolution, blur, complex background and noise to mention a few, which makes the script identification process a challenging task. This paper presents a study of various combinations of features and classifiers to explore whether the traditional script identification techniques can be applied to video frames. A texture based feature namely, Local Binary Pattern (LBP), Gradient based features namely, Histogram of Oriented Gradient (HoG) and Gradient Local Auto-Correlation (GLAC) were used in the study. Combination of the features with SVMs and ANNs where used for classification. Three popular scripts, namely English, Bengali and Hindi were considered in the present study. Due to the inherent problems with the video, a super resolution technique was applied as a pre-processing step. Experiments show that the GLAC feature has performed better than the other features, and an accuracy of 94.25% was achieved when testing on 1271 words from three different scripts. The study also reveals that gradient features are more suitable for script identification than the texture features when using traditional script identification techniques on video frames.
Shivakumara, P, Sharma, N, Pal, U, Blumenstein, M & Tan, CL 1970, 'Gradient-Angular-Features for Word-wise Video Script Identification', 2014 22nd International Conference on Pattern Recognition, 2014 22nd International Conference on Pattern Recognition (ICPR), IEEE, Sweden, pp. 3098-3103.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Script identification at the word level is challenging because of complex backgrounds and low resolution of video. The presence of graphics and scene text in video makes the problem more challenging. In this paper, we employ gradient angle segmentation on words from video text lines. This paper presents new Gradient-Angular-Features (GAF) for video script identification, namely, Arabic, Chinese, English, Japanese, Korean and Tamil. This work enables us to select an appropriate OCR when the frame has words of multi-scripts. We employ gradient directional features for segmenting words from video text lines. For each segmented word, we study the gradient information in effective ways to identify text candidates. The skeleton of the text candidates is analyzed to identify Potential Text Candidates (PTC) by filtering out unwanted text candidates. We propose novel GAF for the PTC to study the structure of the components in the form of cursiveness and softness. The histogram operation on the GAF is performed in different ways to obtain discriminative features. The method is evaluated on 760 words of six scripts having low contrast, complex background, different font sizes, etc. in terms of the classification rate and is compared with an existing method to show the effectiveness of the method. We achieve 88.2% average classification rate.
Su, X, Zhang, M, Ye, D & Bai, Q 1970, 'A dynamic coordination approach for task allocation in disaster environments under spatial and communicational', AAAI Workshop - Technical Report, pp. 35-41.
View description>>
Dynamic coordination for task allocation in disaster environments under spatial and communicational constraints is a challenging issue in both research and applications. To this end, this paper presents a coordinated task allocation approach for disaster environments by considering spatial and communicational constraints, dynamic features of environments as well as heterogenous capabilities of agents. The proposed approach consists of an information collection mechanism, a group task allocation mechanism and a group coordination mechanism. Initially, the information collection mechanism is applied to help agents in communication networks to prune their communication connections and elect one agent in each communication network to be the network leader in a decentralised manner so as to facilitate the network leader to collect information for task allocation under communicational constraints. Then, the group task allocation mechanism is employed by each network leader to allocate tasks and agents in its network to groups with suitable spatial ranges by considering spatial and communicational constraints and heterogenous capabilities of agents. During task execution, the group coordination mechanism is employed by isolated groups to periodically adjust group members (agents) at assembly points so as to achieve continuous coordination to handle dynamic features of environments. Experimental results demonstrate that the proposed approach can have better performance than some existing approaches in terms of information collection and coordination for task allocation in disaster environments under spatial and communicational constraints.
Subrahmanian, VS, Chen, SH, Zaiane, O, Martin, H, Jo, GS, Cao, J, Liu, H, Xu, G & Nejdl, W 1970, 'Welcome from BESC 2014 chairs', 2014 International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC2014), 2014 International Conference on Behavior, Economic and Social Computing (BESC), IEEE.
View/Download from: Publisher's site
Sun, F, Liu, B, Zhou, H, Gui, L & Chen, J 1970, 'A QoE supportive distributed caching management for vehicular video streaming in cellular networks', 2014 IEEE/CIC International Conference on Communications in China (ICCC), 2014 IEEE/CIC International Conference on Communications in China (ICCC), IEEE, pp. 846-850.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. The distributed caching management enabled wireless networking technology can greatly improve the data storage and transmission efficiency of wireless users and correspondingly the users' quality of experience (QoE). How to alleviate the pressure on network access while ensuring the content consistency is still a challenge. In this paper, we investigate the vehicular users oriented caching management scenario which focuses on the in-motion video streaming in cellular networks. Specifically, we propose a QoE supportive distributed caching management approach considering the cache constraint of cellular networks, to fulfill more mobile users' requests for video streaming while ensuring the basic service experience of users. By introducing the QoE evaluation model using the verified empirical data, and establishing the mathematic relationship between the associated streaming bit-rate and actual storage space, we formulate the dynamic caching management for in-motion video streaming in cellular networks into a constrained optimization problem which is capable to be solved by the Lagrange Multiplier method. Simulation results indicate that the proposed dynamic caching approach can improve the users' satisfaction ratio by up to 40%.
Sun, L, Dong, H, Hussain, FK, Hussain, OK, Ma, J & Zhang, Y 1970, 'A Hybrid Fuzzy Framework for Cloud Service Selection', 2014 IEEE International Conference on Web Services, 2014 IEEE International Conference on Web Services (ICWS), IEEE, Alaska, USA, pp. 313-320.
View/Download from: Publisher's site
Tafavogh, S, Meng, Q, Catchpoole, DR & Kennedy, PJ 1970, 'Automated Quantitative and Qualitative Analysis of Whole Neuroblastoma Tumour Images for Prognosis', Biomedical Engineering / 817: Robotics Applications, Biomedical Engineering / Robotics Applications, ACTAPRESS, Zurich, Switzerland, pp. 244-251.
View/Download from: Publisher's site
View description>>
Manual quantitative and qualitative microscopic analysis of cancerous tumours is subject to inter-intra observer variability in pathology. Neuroblastoma is an infant cancer with one of the lowest survival rates. Choosing a proper therapeutic regime for the tumour is highly dependent on determining the tumour aggressiveness level which requires an extensive microscopic analysis. There is an urgent demand from pathologists for reducing the role of microscopic analysis in the process of prognosis and using an automated system to determine the tumour aggressiveness. In this paper, we develop an automated system to address this demand. We propose a novel four-stage hybrid algorithm. First, we develop novel whole slide image partitioning and zooming techniques. Second, we introduce an image enhancement technique to reduce the intensity variation within the tissue images. Third, we deploy a thresholding technique for segmenting the regions of interest. Fourth, we develop a prognosis decision making engine based on a robust clinical prognosis scheme to classify the aggressiveness level using the segmented regions of interest. The performance of the system is evaluated by a pathologist. The system is compared against a state-of-the-Art system, and the results indicate a superiority for our system in grading the tumour with average F-measure 86.77%.
Taib, R, Yee, D, Chen, F & Liu, W 1970, 'Improved incident management through anomaly detection in historical records', 21st World Congress on Intelligent Transport Systems, ITSWC 2014: Reinventing Transportation in Our Connected World.
View description>>
Real-time decision support can significantly help Transport Management Centre (TMC) operators respond to incidents more efficiently and reduce congestion. However, the complexity of road networks, changing demand patterns, and massive volumes of data recorded to date prevented a deep analysis of the situation. The NSW TMC and research organisation NICTA in Sydney have collaborated to identify patterns in historical incident response records, leading to the identification of both anomalies and common patterns among past incidents using advanced machine learning techniques. Such techniques were used to process 15, 465 incident logs, comparing and clustering responses along 15 key characteristics. Abnormally effective or ineffective responses were unveiled, as well as seven generic incident profiles, allowing the TMC to improve its procedures, response plans, and resource allocations. These mechanisms also helped boost early incident outcome prediction, promising benefits for TMCs around the world.
Teague, D & Lister, R 1970, 'Longitudinal think aloud study of a novice programmer', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Auckland, New Zealand, pp. 41-50.
View description>>
Recent research from within a neo-Piagetian perspective proposes that novice programmers pass through the sensorimotor and preoperational stages before being able to reason at the concrete operational stage. However, academics traditionally teach and assess introductory programming as if students commence at the concrete operational stage. In this paper, we present results from a series of think aloud sessions with a single student, known by the pseudonym 'Donald'. We conducted the sessions mainly over one semester, with an additional session three semesters later. Donald first manifested predominately sensorimotor reasoning, followed by preoperational reasoning, and finally concrete operational reasoning. This longitudinal think aloud study of Donald is the first direct observational evidence of a novice programmer progressing through the neo-Piagetian stages.
Teague, D & Lister, R 1970, 'Manifestations of preoperational reasoning on similar programming tasks', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society Inc., Auckland, New Zealand, pp. 65-74.
View description>>
In this research paper, we study a simple programming problem that only requires knowledge of variables and assignment statements, and yet we found that some early novice programmers had difficulty solving the problem. We also present data from think aloud studies which demonstrate the nature of those difficulties. We interpret our data within a neo-Piagetian framework which describes cognitive developmental stages through which students pass as they learn to program. We describe in detail think aloud sessions with novices who reason at the neo-Piagetian preoperational level. Those students exhibit two problems. First, they focus on very small parts of the code and lose sight of the 'big picture'. Second, they are prone to focus on superficial aspects of the task that are not functionally central to the solution. It is not until the transition into the concrete operational stage that decentration of focus occurs, and they have the cognitive ability to reason about abstract quantities that are conserved, and are equipped to adapt skills to closely related tasks. Our results, and the neo-Piagetian framework on which they are based, suggest that changes are necessary in teaching practice to better support novices who have not reached the concrete operational stage.
Teague, D & Lister, R 1970, 'Programming', Proceedings of the 2014 conference on Innovation & technology in computer science education - ITiCSE '14, the 2014 conference, ACM Press, Uppsala, Sweden, pp. 285-290.
View/Download from: Publisher's site
View description>>
Abstract: In this paper, we look at the concept of reversibility, that is, negating opposites, counterbalances, and actions that can be reversed. Piaget identified reversibility as an indicator of the ability to reason at a concrete operational level. We investigate to what degree novice programmers manifest the ability to work with this concept of reversibility by providing them with a small piece of code and then asking them to write code that undoes the effect of that code. On testing entire cohorts of students in their first year of learning to program, we found an overwhelming majority of them could not cope with such a concept. We then conducted think aloud studies of novices where we observed them working on this task and analyzed their contrasting abilities to deal with it. The results of this study demonstrate the need for better understanding our students' reasoning abilities, and a teaching model aimed at that level of reality.
Thommandram, A, Eklund, JM, McGregor, C, Pugh, JE & James, AG 1970, 'A Rule-Based Temporal Analysis Method for Online Health Analytics and Its Application for Real-Time Detection of Neonatal Spells', 2014 IEEE International Congress on Big Data, 2014 IEEE International Congress on Big Data (BigData Congress), IEEE, Anchorage, AK, pp. 470-477.
View/Download from: Publisher's site
van Dijk, J, van der Lugt, R & Hummels, C 1970, 'Beyond distributed representation', Proceedings of the 8th International Conference on Tangible, Embedded and Embodied Interaction, TEI'14: Eighth International Conference on Tangible, Embedded, and Embodied Interaction, ACM, Munich, Germany, pp. 105-112.
View/Download from: Publisher's site
View description>>
Walking is a physical activity that most people do on a daily basis. It is often characterized as a utilitarian means of locomotion; our basic, habitual mode of getting around from place to place. Walking can also be considered a creative and expressive act, with the potential for inspiring the design of interactive surfaces to support and mediate these aesthetic aspects. We draw on understandings of walking from a range of perspectives including biomechanics, ecological perception, anthropology and dance to inform the design and evaluation of an interactive surface. This surface, the Slow Floor, is intended to encourage a reflective engagement with the act of walking. We present the design and initial user evaluation of the Slow Floor, a pressure sensitive sound-generating surface, with a group of Butoh dancers performing a slow walk. The evaluation reveals a unique creative agency when walking on the Slow Floor compared to the internal focus on awareness when slow walking without the interactive surface. This creative agency provides new knowledge on the role interactive surfaces can play in developing awareness of movement and internal felt experience contributing to the discussion around somatics and HCI. Copyright is held by the owner/author(s).
Wang, K, Guo, H, Shu, L & Liu, B 1970, 'An improved congestion control algorithm based on social awareness in Delay Tolerant Networks', 2014 IEEE International Conference on Communications (ICC), ICC 2014 - 2014 IEEE International Conference on Communications, IEEE, Sydney, AUSTRALIA, pp. 1773-1777.
View/Download from: Publisher's site
Wang, W, Lu, J & Zhang, G 1970, 'A New Similarity Measure-Based Collaborative Filtering Approach for Recommender Systems', FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), International Conference on Intelligent Systems and Knowledge Engineering, Springer Berlin Heidelberg, Shenzhen,China, pp. 443-452.
View/Download from: Publisher's site
View description>>
Collaborative filtering (CF) is the most popular recommendation approach in personalization techniques but still suffers from poor recommendation accuracy. This study incorporates fuzzy set technique and user-relevant analysis to improve the CF approach. It proposes an innovative fuzzy similarity measure (FSM) and user-relevant aggregation (URA) on recommendation approach. Experiments demonstrate that the FSM-URA approach significantly improves the prediction accuracy comparing to the existing recommendation approaches. © Springer-Verlag Berlin Heidelberg 2014.
Wang, XL, Eklund, JM & McGregor, C 1970, 'Parametric Power Spectrum Analysis of ECG Signals for Obstructive Sleep Apnoea Classification', 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS), IEEE, Icahn Sch Med, New York, NY, pp. 8-13.
View/Download from: Publisher's site
Wang, Z, Luo, T, Xu, G & Wang, X 1970, 'The Application of Cartesian-Join of Bloom Filters to Supporting Membership Query of Multidimensional Data', 2014 IEEE International Congress on Big Data, 2014 IEEE International Congress on Big Data (BigData Congress), IEEE, USA, pp. 288-295.
View/Download from: Publisher's site
Wu, D, Zhang, G, Lu, J & IEEE 1970, 'A Fuzzy Tree Matching-Based Personalised E-Learning Recommender System', 2014 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), IEEE International Conference on Fuzzy Systems, IEEE, Beijing, China, pp. 1898-1904.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. The rapid development of e-learning systems provides learners great opportunities to access the learning activities online, which greatly supports and enhances learning practices. However, too many learning activities are emerging in the e-learning system, which makes it difficult for learners to select proper ones for their particular situations since there is no personalised service function. Recommender systems, which aim to provide personalised recommendations, can be used to solve this issue. However, e-learning systems have two features to handle: (1) data of learners and leaning activities often present tree structures; (2) data are often vague and uncertain in practice. In this study, a fuzzy tree-structured data model is proposed to comprehensively describe the complex learning activities and learner profiles. A tree matching method is then developed to match the similar learning activities or learners. To deal with the uncertain category issues, a fuzzy category tree and relevant similarity measure are developed. A hybrid recommendation approach, which considers precedence relations between learning activities and combines the semantic and collaborative filtering similarities between learners, is developed. The proposed approach can handle the special requirements in e-learning environment and make proper recommendations in e-learning systems.
Xindong Wu, Ester, M & Guandong Xu 1970, 'Welcome from the ASONAM 2014 program chairs', 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, p. xiv.
View/Download from: Publisher's site
Xu, C, Zhao, G, Xie, G & Yu, S 1970, 'Detection on application layer DDoS using random walk model', 2014 IEEE International Conference on Communications (ICC), ICC 2014 - 2014 IEEE International Conference on Communications, IEEE, Sydney, AUSTRALIA, pp. 707-712.
View/Download from: Publisher's site
Xuan, J, Lu, J, Zhang, G & Luo, X 1970, 'Release 'Bag-of-Words' Assumption of Latent Dirichlet Allocation', FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), International Conference on Intelligent Systems and Knowledge Engineering, Springer Berlin Heidelberg, Shenzhen, PEOPLES R CHINA, pp. 83-92.
View/Download from: Publisher's site
View description>>
Based on vector-based representation, topic models, like latent Dirichlet allocation (LDA), are constructed for documents with 'bag-of-words' assumption. They can discover the distribution of underlying topics in a document and the distribution of keywords in a topic, which have been proved very successful and practical in many scenarios, recently. Comparing vector-based representation of documents, graph-based representation method can preserve more semantics of documents, because not only keywords but also the relations between them in documents are considered. In this paper, a topic model for graph-represented documents (GTM) is proposed. In this model, a Bernoulli distribution is used to model the formation of the edge between two keywords in a document. The experimental results show that GTM outperforms LDA in document classification task using the unveiled topics from these two models to represent documents. © Springer-Verlag Berlin Heidelberg 2014.
Xuan, J, Lu, J, Zhang, G, Luo, X & IEEE 1970, 'Extension of Similarity Measures in VSM: from Orthogonal Coordinate System to Affine Coordinate System', PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), IEEE International Joint Conference on Neural Networks, IEEE, Beijing, China, pp. 4084-4091.
View/Download from: Publisher's site
View description>>
Similarity measures are the foundations of many research areas, e.g. information retrieval, recommender system and machine learning algorithms. Promoted by these application scenarios, a number of similarity measures have been proposed and proposing. In these state-of-the-art measures, vector-based representation is widely accepted based on Vector Space Model (VSM) in which an object is represented as a vector composed of its features. Then, the similarity between two objects is evaluated by the operations on two corresponding vectors, like cosine, extended jaccard, extended dice and so on. However, there is an assumption that the features are independent of each others. This assumption is apparently unrealistic, and normally, there are relations between features, i.e. the co-occurrence relations between keywords in text mining area. In this paper, a space geometry-based method is proposed to extend the VSM from the orthogonal coordinate system (OVSM) to affine coordinate system (AVSM) and OVSM is proved to be a special case of AVSM. Unit coordinate vectors of AVSM are inferred by the relations between features which are considered as angles between these unit coordinate vectors. At last, five different similarity measures are extended from OVSM to AVSM using unit coordinate vectors of AVSM. Within the numerous application fields of similarity measures, the task of text clustering is selected to be the evaluation criterion. Documents are represented as vectors in OVSM and AVSM, respectively. The clustering results show that AVSM outweighs the OVSM.
Yin, H, Cui, B, Chen, L, Hu, Z & Huang, Z 1970, 'A temporal context-aware model for user behavior modeling in social media systems', Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, SIGMOD/PODS'14: International Conference on Management of Data, ACM, Snowbird, UT, USA, pp. 1543-1554.
View/Download from: Publisher's site
View description>>
Social media provides valuable resources to analyze user behaviors and capture user preferences. This paper focuses on analyzing user behaviors in social media systems and designing a latent class statistical mixture model, named temporal context-aware mixture model (TCAM), to account for the intentions and preferences behind user behaviors. Based on the observation that the behaviors of a user in social media systems are generally influenced by intrinsic interest as well as the temporal context (e.g., the public's attention at that time), TCAM simultaneously models the topics related to users' intrinsic interests and the topics related to temporal context and then combines the influences from the two factors to model user behaviors in a unified way. To further improve the performance of TCAM, an item-weighting scheme is proposed to enable TCAM to favor items that better represent topics related to user interests and topics related to temporal context, respectively. Based on TCAM, we design an efficient query processing technique to support fast online recommendation for large social media data. Extensive experiments have been conducted to evaluate the performance of TCAM on four real-world datasets crawled from different social media sites. The experimental results demonstrate the superiority of the TCAM models, compared with the state-of-the-art competitor methods, by modeling user behaviors more precisely and making more effective and efficient recommendations. © 2014 ACM.
Yu, Y, Yan, K, Zhu, X, Wang, G, Luo, D & Sood, S 1970, 'Mining Emerging Patterns of PIU from Computer-Mediated Interaction Events', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 66-78.
View/Download from: Publisher's site
View description>>
It has been almost 20 years since Internet services became an integral part of our lives. Especially recent popularization of SNS (Social Network Services) such as Facebook, more and more people are attracted to Internet. Internet provides many benefits to people, but yields a consequent disturbing phenomenon of obsession with Internet, which is called PIU (Pathological Internet Use) or IAD (Internet Addiction Disorder) in academia. PIU or IAD has negative effects on people's health of mind and body, therefore, it is necessary to detect PIU. Among tools of surfing Internet, since computer is the most widely interactive media, it is significant to mine PIU emerging patterns from human-computer interaction events. As a result, an emerging pattern mining method based on interactive event generators, called PIU-Miner, is proposed in this paper. Experimental results show that PIU-Miner is an efficient and effective approach to discovering PIU. © 2014 Springer-Verlag.
Yusoff, B & Merigó Lindahl, JM 1970, 'Analytical Hierarchy Process under Group Decision Making with Some Induced Aggregation Operators', INFORMATION PROCESSING AND MANAGEMENT OF UNCERTAINTY IN KNOWLEDGE-BASED SYSTEMS, PT I, 15th International Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems (IPMU), Springer International Publishing, Montpellier, FRANCE, pp. 476-485.
View/Download from: Publisher's site
Zao, JK, Lin, C-T, Ko, L-W, She, H-C, Dung, L-R & Chen, B-Y 1970, 'Natural User Interfaces: Cyber-Physical Challenges and Pervasive Applications - A Panel Discussion', 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing(CPSCom), IEEE, Taipei, Taiwan, pp. 467-469.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. This panel discussion aims at exploring the potential applications of emerging natural user interface (NUI) technologies and the challenges they pose to the design and deployment of cyber-physical systems. Based on their research work, six panelists will take turns to present the outlook, the cyber-physical requirements and the promising applications of implicit NUI. We hope these short presentations will lead to thought-provoking discussions and inspire further innovation.
Zhang, T, Zhang, G, Lu, J, Gu, J & IEEE 1970, 'A Novel Evaluation Approach for Power Distribution System Planning based on Linear Programming Model and ELECTRE III', 2014 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), IEEE International Conference on Fuzzy Systems, Institute of Electrical and Electronics Engineers Inc., Beijing, PEOPLES R CHINA, pp. 1921-1928.
View/Download from: Publisher's site
View description>>
To evaluate solutions of power distribution system planning (PDSP) is an essential task in smart grid and requires multi-criteria decision making (MCDM). However, the vagueness of attribute values and the fuzziness of weights of criteria need integrate fuzzy techniques with MCDM. In order to incorporate the issues with uncertainty in PDSP evaluation, this paper proposes a novel PDSP approach based on linear programming model and ELECTRE IIL The incomplete weight preference information of decision-maker is elicited and expressed by a group of weight constraint functions, combined these functions with the simple multi-attribute rating technique, a linear programming model is set up to obtain the weights for each solution. Then with the weights and a PDSP model based on ELECTRE III model, the outranking score of each solution compared with other solutions can be calculated, and a net present score for each solution will be obtained for ranking these solutions, DM can choose one desired. A case is demonstrated to show the evaluation process using this approach and the results indicate that this approach incorporating the issues with uncertainty is robust for PDSP evaluation. The results are acceptable to DM.
Zhang, Y, Xu, X, Lu, H & Dai, Y 1970, 'Two-Stage Obstacle Detection Based on Stereo Vision in Unstructured Environment', 2014 Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics, 2014 6th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), IEEE, Hangzhou, PEOPLES R CHINA, pp. 168-172.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. In an unstructured environment, there are many challenges for obstacle detection. This paper presents an improved method to detect obstacles based on stereo vision in unstructured environments based on salient obstacle extraction. This method can achieve same or higher level of accuracy of obstacle detection compared to the existing salient obstacle detection with significant reduction of computation time. This method consists of two stages. In the first stage, it extracts the salient obstacles which stand out from the background in the stereo images using a fast salient obstacle detection method. In the second stage, it refines the detection of small obstacles by computing the geometric relationships among 3D points using an improved space-variant resolution (SVR) with the continuity and the height constraints. The experiment results show that this improved method can reduce computation time and improve detection accuracy.
Zhang, Z, Oberst, S & Lai, JCS 1970, 'A stochastic approach to predicting brake squeal propensity', 21st International Congress on Sound and Vibration 2014, ICSV 2014, 21st International Congress on Sound and Vibration 2014, ICSV 2014, pp. 629-636.
View description>>
Brake squeal as a significant noise, vibration and harshness (NVH) issue to the automotive industry is triggered by friction-induced self-excited vibration. Validating theoretical predictions using analytical or numerical models against experiments is difficult because the test results are often not repeatable even under apparently similar operating conditions. The poor repeatability of brake squeal could be attributed to the nonlinearity of the dynamics involved and the uncertainties associated with material properties, boundary conditions (such as contact pressure, temperature, stiffness, exact area of contact) and operating conditions. In this paper, a stochastic approach to predicting brake squeal propensity is examined using an analytical model of a popular 4-DOF friction oscillator with constant friction coefficient. Instability of this model is first estimated using the conventional linear complex eigenvalue analysis (CEA) and compared with calculations of positive friction work. The sensitivity of this deterministic model to variations of parameters such as spring stiffness and damping coefficient is studied. To account for uncertainties in the exact values of parameters, the analytical model is studied using polynomial chaos expansions with beta distribution on a set of Jacobi polynomials. Probabilities for instabilities based on positive friction work are determined and the implications for estimating squeal propensity in a full brake system are discussed.
Zhang, Z, Oberst, S & Lai, JCS 1970, 'Instability prediction of brake squeal by nonlinear stability analysis', INTERNOISE 2014 - 43rd International Congress on Noise Control Engineering: Improving the World Through Noise Control, INTERNOISE 2014 - 43rd International Congress on Noise Control Engineering: Improving the World Through Noise Control.
View description>>
Prediction of brake squeal as unwanted high frequency noise above 1 kHz remains a challenging problem despite substantial research efforts in the past two decades. Brake squeal, triggered by friction-induced self-excited vibration, can be caused by many different and interacting mechanisms with nonlinear origins in material properties and boundary conditions. Although brake squeal is essentially a nonlinear phenomenon, the standard industrial practice for prediction of brake squeal relies on the linear complex eigenvalue analysis which may under-predict or over-predict the number of unstable vibration modes. Brake squeal can be considered in nonlinear dynamics terms to be caused by a friction-induced self-excitation driven into instability and oscillating in a limit cycle through super-critical Andronov-Hopf bifurcations. In this paper, a nonlinear stability analysis that may be applied to a full brake system is examined using an unforced 4-DOF friction oscillator with cubic nonlinearity. The local bifurcation behaviour of this model is studied using the normal form theory and the nonlinear stability boundary is evaluated. Differences between results of linear and nonlinear analyses are discussed and the limitations of the linear analysis are highlighted. The energy provided by friction and consumed by damping is calculated by multiple scales method to provide a physical explanation for instability generation.
Zhao, G, Li, D, Xu, C, Tang, H & Yu, S 1970, 'Network dynamics of mobile social networks', 2014 IEEE International Conference on Communications (ICC), ICC 2014 - 2014 IEEE International Conference on Communications, IEEE, Sydney, AUSTRALIA, pp. 2478-2483.
View/Download from: Publisher's site
Zhou, H, Liu, B, Hou, F, Zhang, N, Gui, L, Chen, J & Shen, XS 1970, 'A QoS supported spectrum allocation scheme for database-assisted secondary access networks', 2014 IEEE/CIC International Conference on Communications in China (ICCC), 2014 IEEE/CIC International Conference on Communications in China (ICCC), IEEE, Shanghai, PEOPLES R CHINA, pp. 835-839.
View/Download from: Publisher's site
Zhou, H, Lu, J, Zhang, G & IEEE 1970, 'An Extended Bilevel Programming Model and Its Kth-Best Algorithm for Dynamic Decision Making in Emergency Situations', 2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN MULTI-CRITERIA DECISION-MAKING (MCDM), IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, IEEE, Orlando, FL, USA, pp. 100-105.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Linear bilevel programming has been studied for many years and applied in different domains such as transportation, economics, engineering, environment, and telecommunications. However, there is lack of attention of the impacts on dynamic decision making with abrupt or unusual events caused by unpredictable natural environment or human activities (e.g. Tsunami, earthquake, and malicious or terrorist attacks). In reality these events could happens more often and have more significant impacts on decision making in an increasingly complex and dynamic world. This paper addresses this unique problem by introducing a concept of Virtual Follower (VF). An extended model of bilevel multi-follower programming with a virtual follower (BLMFP-VF) is defined and the kth-best algorithm for solving this problem is proposed. An example is given to illustrate the working of the extended model and approach.
Zhu, T, Li, G, Zhou, W, Xiong, P & Yuan, C 1970, 'Deferentially Private Tagging Recommendation Based on Topic Model', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer International Publishing, pp. 557-568.
View/Download from: Publisher's site
View description>>
Tagging recommender system allows Internet users to annotate resources with personalized tags and provides users the freedom to obtain recommendations. However, It is usually confronted with serious privacy concerns, because adversaries may re-identify a user and her/his sensitive tags with only a little background information. This paper proposes a privacy preserving tagging release algorithm, PriTop, which is designed to protect users under the notion of differential privacy. The proposed PriTop algorithm includes three privacy preserving operations: Private Topic Model Generation structures the uncontrolled tags, Private Weight Perturbation adds Laplace noise into the weights to hide the numbers of tags; while Private Tag Selection finally finds the most suitable replacement tags for the original tags. We present extensive experimental results on four real world datasets and results suggest the proposed PriTop algorithm can successfully retain the utility of the datasets while preserving privacy. © 2014 Springer International Publishing.