Arroyo, C, Hu, FB, Ryan, LM, Kawachi, I, Colditz, GA, Speizer, FE & Manson, J 2004, 'Depressive symptoms and risk of type 2 diabetes in women', DIABETES CARE, vol. 27, no. 1, pp. 129-133.
View/Download from: Publisher's site
View description>>
OBJECTIVE - To explore the relationship between depressive symptoms and incidence of type 2 diabetes in women. RESEARCH DESIGN AND METHODS - We conducted an analysis of 72,178 female nurses aged 45-72 years who did not have diagnosed diabetes and who answered the Medical Outcomes Study 36-Item Short-Form Health Status Survey (SF-36) at baseline in 1992. We calculated relative risks (RR) of type 2 diabetes for women with presence of depressive symptoms (i.e., Five-Item Mental Health Index [MHI-5] score >52). RESULTS - During 4 years of follow-up (282,317 person-years), 973 incident cases of type 2 diabetes were documented. Age-adjusted RR of developing type 2 diabetes for women with presence of depressive symptoms was 1.55 (95% CI 1.27-1.90). Additional adjustment for BMI resulted in a RR of developing type 2 diabetes of 1.36 (1.11-1.67). The multivariate RR of developing type 2 diabetes was 1.22 (1.00-1.50). After excluding women diagnosed with diabetes between 1992 and 1994, 472 incident cases of type 2 diabetes were documented for the follow-up period from 1994 to 1996 (148,889 person-years). The multivariate RR of developing type 2 diabetes for women with depressive symptoms was 1.29 (0.96-1.72). CONCLUSIONS - Our data suggest that depressive symptoms are associated with a modest increase in the risk of type 2 diabetes.
Bellamy, SL, Yi, L, Ryan, LM, Lipsitz, S, Canner, MJ & Wright, R 2004, 'Analysis of clustered and interval censored data from a community-based study in asthma', STATISTICS IN MEDICINE, vol. 23, no. 23, pp. 3607-3621.
View/Download from: Publisher's site
View description>>
Many authors in recent years have proposed extensions of familiar survival analysis methodologies to apply in dependent data settings, for example, when data are clustered or subject to repeated measures. However, these extensions have been considered largely in the context of right censored data. In this paper, we discuss a parametric frailty model for the analysis of clustered and interval censored failure time data. Details are presented for the specific case where the underlying time to event data follow a Weibull distribution. Maximum likelihood estimates will be obtained using commercially available software and the empirical efficiency of these estimators will be explored via a simulation study. We also discuss a score test to make inferences about the magnitude and significance of over-dispersion in clustered data settings. These methods will be illustrated using data from the East Boston Asthma Study. Copyright © 2004 John Wiley & Sons, Ltd.
Chen, JC, Chang, WR, Shih, TS, Chen, CJ, Chang, WP, Dennerlein, JT, Ryan, LM & Christiani, DC 2004, 'Using 'Exposure prediction rules' for exposure assessment - An example on whole-body vibration in taxi drivers', EPIDEMIOLOGY, vol. 15, no. 3, pp. 293-299.
View/Download from: Publisher's site
View description>>
Background: It is often difficult and expensive to make direct measurements of an individual's occupational or environmental exposures in large epidemiologic studies. Methods: In this study, we used information collected in validation studies to develop
Chen, JC, Dennerlein, JT, Shih, TS, Chen, CJ, Cheng, YW, Chang, WSP, Ryan, LM & Christiani, DC 2004, 'Knee pain and driving duration: A secondary analysis of the taxi drivers' health study', AMERICAN JOURNAL OF PUBLIC HEALTH, vol. 94, no. 4, pp. 575-581.
View/Download from: Publisher's site
View description>>
Objectives. We explored a postulated association between daily driving time and knee pain. Methods. We used data from the Taxi Drivers' Health Study to estimate 1-year prevalence of knee pain as assessed by the Nordic musculoskeletal questionnaire. Results. Among 1242 drivers, the prevalence of knee pain, stratified by duration of daily driving (≤6, >6 through 8, >8 through 10, and >10 hours), was 11%, 17%, 19%, and 22%, respectively. Compared with driving 6 or fewer hours per day, the odds ratio of knee pain prevalence for driving more than 6 hours per day was 2.52 (95% confidence interval=1.36, 4.65) after we adjusted for socioeconomic, work-related, and personal factors in the multiple logistic regression. Conclusions. The dose-related association between driving duration and knee pain raises concerns about work-related knee joint disorders among professional drivers.
Chen, YC, Xu, L, Guo, YLL, Su, HJJ, Smith, TJ, Ryan, LM, Lee, MS & Christiani, DC 2004, 'Polymorphisms in GSTT1 and p53 and urinary transitional cell carcinoma in south-western Taiwan: A Preliminary Study', BIOMARKERS, vol. 9, no. 4-5, pp. 386-394.
View/Download from: Publisher's site
View description>>
Little is known about the relevance of genetic polymorphisms to arsenic-related bladder cancer. A preliminary case-control study was conducted to explore the association between genetic polymorphisms of GSTT1, p53 codon 72 and bladder cancer in southern Taiwan, a former high arsenic exposure area. Fifty-nine urinary transitional cell carcinoma (TCC) patients from a referral centre in south-western Taiwan and 81 community controls matched on residence were recruited from 1996 to 1999. A questionnaire was administered to obtain arsenic exposure and general health information. Genotypes of p53 codon 72 and GSTT1 were analysed by polymerase chain reaction-restriction fragment length polymerase. The combined variant genotypes (heterozygous or homozygous variant) of p53 codon 72 and GSTT1 null were observed in 29% of cases and in 44% of controls, respectively. In this preliminary study, bladder cancer risk was slightly elevated for subjects carrying the variant genotype of p53 codon 72 or in subjects carrying the GSTT1 null genotype. Variants in p53 codon 72 increased the risk of bladder cancer among smokers. However, the results were not statistically significant and larger confirmatory studies are needed to clarify the role of candidate gene polymorphisms and bladder cancer risk in arsenic exposed populations. © 2004 Taylor & Francis Ltd.
Cucchiara, R, Piccardi, M & Prati, A 2004, 'Neighbor Cache Prefetching for Multimedia Image and Video Processing', IEEE Transactions on Multimedia, vol. 6, no. 4, pp. 539-552.
View/Download from: Publisher's site
Dillon, TS, Chang, E & Hussain, FK 2004, 'Managing the dynamic nature of trust', IEEE INTELLIGENT SYSTEMS, vol. 19, no. 5, pp. 79-82.
Duty, SM, Calafat, AM, Silva, MJ, Brock, JW, Ryan, L, Chen, ZY, Overstreet, J & Hauser, R 2004, 'The relationship between environmental exposure to phthalates and computer-aided sperm analysis motion parameters', JOURNAL OF ANDROLOGY, vol. 25, no. 2, pp. 293-302.
Elashoff, M & Ryan, L 2004, 'An EM algorithm for estimating equations', JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, vol. 13, no. 1, pp. 48-65.
View/Download from: Publisher's site
View description>>
This article presents an algorithm for accommodating missing data in situations where a natural set of estimating equations exists for the complete data setting. The complete data estimating equations can correspond to the score functions from a standard, partial, or quasi-likelihood, or they can be generalized estimating equations (GEEs). In analogy to the EM, which is a special case, the method is called the ES algorithm, because it iterates between an E-Step wherein functions of the complete data are replaced by their expected values, and an S-Step where these expected values are substituted into the complete-data estimating equation, which is then solved. Convergence properties of the algorithm are established by appealing to general theory for iterative solutions to nonlinear equations. In particular, the ES algorithm (and indeed the EM) are shown to correspond to examples of nonlinear Gauss-Seidel algorithms. An added advantage of the approach is that it yields a computationally simple method for estimating the variance of the resulting parameter estimates.
Gabrys, B 2004, 'Special issue on integration of methods and hybrid systems', International Journal of Approximate Reasoning, vol. 35, no. 3, pp. 203-204.
View/Download from: Publisher's site
Houseman, EA, Ryan, LM & Coull, BA 2004, 'Cholesky residuals for assessing normal errors in a linear model with correlated outcomes', JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, vol. 99, no. 466, pp. 383-394.
View/Download from: Publisher's site
View description>>
Despite the widespread popularity of linear models for correlated outcomes (e.g., linear mixed models and time series models), distribution diagnostic methodology remains relatively underdeveloped in this context. In this article we present an easy-to-implement approach that lends itself to graphical displays of model fit. Our approach involves multiplying the estimated marginal residual vector by the Cholesky decomposition of the inverse of the estimated marginal variance matrix. The resulting 'rotated' residuals are used to construct an empirical cumulative distribution function and pointwise standard errors. The theoretical framework, including conditions and asymptotic properties, involves technical details that are motivated by Lange and Ryan, Pierce, and Randles. Our method appears to work well in a variety of circumstances, including models having independent units of sampling (clustered data) and models for which all observations are correlated (e.g., a single time series). Our methods can produce satisfactory results even for models that do not satisfy all of the technical conditions stated in our theory.
Huiqing Liu, Jinyan Li & Limsoon Wong 2004, 'Selection of patient samples and genes for outcome prediction', Proceedings. 2004 IEEE Computational Systems Bioinformatics Conference, 2004. CSB 2004., pp. 382-392.
View/Download from: Publisher's site
Hussain, FK, Chang, E & Dillon, T 2004, 'Trustworthiness and CCCI metrics in P2P communication', COMPUTER SYSTEMS SCIENCE AND ENGINEERING, vol. 19, no. 3, pp. 173-190.
Hussain, FK, Chang, E & Dillon, TS 2004, 'Classification of trust in peer-to-peer (P2P) communication', International Journal of Computer Systems Science And Engineering, vol. 19, no. 02, pp. 59-73.
Hussain, FK, Chang, E & Dillon, TS 2004, 'Trustworthiness and CCI Metrics for Assigning Trustworthiness', International Journal of Computer Systems, Science and Engineering, vol. 19, no. 3/4, pp. 95-114.
Karmaus, W & Zhu, X 2004, 'Maternal concentration of polychlorinated biphenyls and dichlorodiphenyl dichlorethylene and birth weight in Michigan fish eaters: a cohort study', Environmental Health, vol. 3, no. 1, pp. 1-4.
View/Download from: Publisher's site
View description>>
In 2000, the National Research Council (NRC), an arm of the National Academy of Sciences, released a report entitled, 'Toxicological Effects of Methylmercury.' The overall conclusion of that report was that, at levels of exposure in some fish- and marine mammal-consuming communities (including those in the Faroe Islands and New Zealand), subtle but significant adverse effects on neuropsychological development were occurring as a result of in utero exposure. Since the release of that report, there has been continuing discussion of the public health relevance of current levels of exposure to Methylmercury. Much of this discussion has been linked to the release of the most recent longitudinal update of the Seychelles Island study. It has recently been posited that these findings supercede those of the NRC committee, and that based on the Seychelles findings, there is little or no risk of adverse neurodevelopmental effects at current levels of exposure. In this commentary, members of the NRC committee address the conclusions from the NRC report in light of the recent Seychelles data. We conclude that no evidence has emerged since the publication of the NRC report that alters the findings of that report.
Li, J, Dong, G, Ramamohanarao, K & Wong, L 2004, 'DeEPs: A New Instance-Based Lazy Discovery and Classification System', Machine Learning, vol. 54, no. 2, pp. 99-124.
View/Download from: Publisher's site
View description>>
Distance is widely used in most lazy classification systems. Rather than using distance, we make use of the frequency of an instance's subsets of features and the frequency-change rate of the subsets among training classes to perform both knowledge disco
Li, J, Manoukian, T, Dong, G & Ramamohanarao, K 2004, 'Incremental Maintenance on the Border of the Space of Emerging Patterns', Data Mining and Knowledge Discovery, vol. 9, no. 1, pp. 89-116.
View/Download from: Publisher's site
View description>>
Emerging patterns (EPs) are useful knowledge patterns with many applications. In recent studies on bio-medical profiling data, we have successfully used such patterns to solve difficult cancer diagnosis problems and produced higher classification accurac
Li, Y & Ryan, L 2004, 'Survival Analysis With Heterogeneous Covariate Measurement Error', Journal of the American Statistical Association, vol. 99, no. 467, pp. 724-735.
View/Download from: Publisher's site
View description>>
This article is motivated by a time-to-event analysis where the covariate of interest was measured at the wrong time. We show that the problem can be formulated as a special case of survival analysis with heterogeneous covariate measurement error and develop a general analytic framework. We study the asymptotic behavior of the naive partial likelihood estimates and analytically demonstrate that under the heterogeneous measurement error structure and the assumption that all components of the covariate vector and the measurement error vector combined are mutually independent, these naive estimates will shrink toward 0, and that the degree of attenuation increases as the measurement error increases. We also give counterexamples for reverse attenuation when the independence conditions are violated. We use our analytical results to derive a simple bias-correcting estimator that performs well in simulations for small and moderate amounts of measurement error. Our framework can be used to provide insight into the behavior of the commonly used partial likelihood score test for testing no association between a failure outcome and an exposure, for example, in the presence of measurement error or mistiming error. In particular, we derive the asymptotic distribution of the naive partial likelihood score test under a series of local alternatives and discuss the asymptotic relative efficiency. As a result, a simple sample size formula to account for the contamination of covariates is obtained.
Lin, Y & Stoianoff, NP 2004, 'Foreign Investment in China: The Cross Cultural Dilemma', Macquarie Journal of Business Law, vol. 1, pp. 1-21.
View description>>
Geographically, the Peoples Republic of China (PRC) is the worlds largest market, with a population of 1.3 billion people and an area about 9,600,000 square kilometres in the southeastern Eurasian continent. Since the `open door policy commenced in late 1978 China has been quite successful in attracting foreign direct investment (FDI) as a new economic power. Chinas need for capital, raw materials, high technology, and modern management skills has opened a range of opportunities for foreign investors. According to a world-renowned consulting company A T Kearney, the result from FDI Confidence Index Monday
Liu, H, Han, H, Li, J & Wong, L 2004, 'Using amino acid patterns to accurately predict translation initiation sites.', In Silico Biol, vol. 4, no. 3, pp. 255-269.
View description>>
The translation initiation site (TIS) prediction problem is about how to correctly identify TIS in mRNA, cDNA, or other types of genomic sequences. High prediction accuracy can be helpful in a better understanding of protein coding from nucleotide sequences. This is an important step in genomic analysis to determine protein coding from nucleotide sequences. In this paper, we present an in silico method to predict translation initiation sites in vertebrate cDNA or mRNA sequences. This method consists of three sequential steps as follows. In the first step, candidate features are generated using k-gram amino acid patterns. In the second step, a small number of top-ranked features are selected by an entropy-based algorithm. In the third step, a classification model is built to recognize true TISs by applying support vector machines or ensembles of decision trees to the selected features. We have tested our method on several independent data sets, including two public ones and our own extracted sequences. The experimental results achieved are better than those reported previously using the same data sets. Our high accuracy not only demonstrates the feasibility of our method, but also indicates that there might be 'amino acid' patterns around TIS in cDNA and mRNA sequences.
Meeker, JD, Ryan, L, Barr, DB, Herrick, RF, Bennett, DH, Bravo, R & Hauser, R 2004, 'The relationship of urinary metabolites of carbaryl/naphthalene and chlorpyrifos with human semen quality', ENVIRONMENTAL HEALTH PERSPECTIVES, vol. 112, no. 17, pp. 1665-1670.
View/Download from: Publisher's site
View description>>
Most of the general population is exposed to carbaryl and other contemporary-use insecticides at low levels. Studies of laboratory animals, in addition to limited human data, show an association between carbaryl exposure and decreased semen quality. In the present study we explored whether environmental exposures to 1-naphthol (1N), a metabolite of carbaryl and naphthalene, and 3,5,6-trichloro-2-pyridinol (TCPY), a metabolite of chlorpyrifos and chlorpyrifos-methyl, are associated with decreased semen quality in humans. Subjects (n = 272) were recruited through a Massachusetts infertility clinic. Individual exposures were measured as spot urinary concentrations of 1N and TCPY adjusted using specific gravity. Semen quality was assessed as sperm concentration, percent motile sperm, and percent sperm with normal morphology, along with sperm motion parameters (straight-line velocity, curvilinear velocity, and linearity). Median TCPY and 1N concentrations were 3.22 and 3.19 μg/L, respectively. For increasing 1N tertiles, adjusted odds ratios (ORs) were significantly elevated for below-reference sperm concentration (OR for low, medium, and high tertiles = 1.0, 4.2, 4.2, respectively; p-value for trend = 0.01) and percent motile sperm (1.0, 2.5, 2.4; p-value for trend = 0.01). The sperm motion parameter most strongly associated with 1N was straight-line velocity. There were suggestive, borderline-significant associations for TCPY with sperm concentration and motility, whereas sperm morphology was weakly and nonsignificantly associated with both TCPY and 1N. The observed associations between altered semen quality and 1N are consistent with previous studies of carbaryl exposure, although suggestive associations with TCPY are difficult to interpret because human and animal data are currently limited.
Meeker, JD, Singh, NP, Ryan, L, Duty, SM, Barr, DB, Herrick, RF, Bennett, DH & Hauser, R 2004, 'Urinary levels of insecticide metabolites and DNA damage in human sperm', HUMAN REPRODUCTION, vol. 19, no. 11, pp. 2573-2580.
View/Download from: Publisher's site
View description>>
Background: Members of the general population are exposed to non-persistent insecticides at low levels. The present study explored whether environmental exposures to carbaryl and chlorpyrifos are associated with DNA damage in human sperm. Methods: Subjects (n = 260) were recruited through a Massachusetts infertility clinic. Individual exposures were measured as spot urinary metabolite concentrations of chlorpyrifos [3,5,6-trichloro-2-pyridinol (TCPY)] and carbaryl [1-naphthol (1N)], adjusted using specific gravity. Sperm DNA integrity was assessed by neutral comet assay and reported as comet extent, percentage DNA in comet tail (Tail%) and tail distributed moment (TDM). Results: A statistically significant increase in Tail% was found for an interquartile range (IQR) increase in both 1N [coefficient = 4.1; 95% confidence interval (CI) 1.9-6.3] and TCPY (2.8; 0.9-4.6), while a decrease in TDM was associated with IQR changes in 1N (-2.2; -4.9 to 0.5) and TCPY (-2.5; -4.7 to -0.2). A negative correlation between Tail% and TDM was present only when stratified by comet extent, suggesting that Tail% and TDM may measure different types of DNA damage within comet extent strata. Conclusions: Environmental exposure to carbaryl and chlorpyrifos may be associated with increased DNA damage in human sperm, as indicated by a change in comet assay parameters. © European Society of Human Reproduction and Embryology 2004; all rights reserved.
Meng, S-W, Zhang, Z & Li, J 2004, 'Twelve C2H2 zinc-finger genes on human chromosome 19 can be each translated into the same type of protein after frameshifts', Bioinformatics, vol. 20, no. 1, pp. 1-4.
View/Download from: Publisher's site
View description>>
Abstract We report a discovery that, of the 226 C2H2 zinc-finger (C2H2-ZNF) genes on human chromosome 19, 12 genes each have two open reading frames (ORFs) that are in different reading frames but that can be translated into the same type of C2H2-ZNF proteins. We came to this observation after using standard tools in an original manner. First, we found that the both ORFs of such a gene contained the same type of significant C2H2-ZNF domain with e-values of e–2 or better. Second, the both ORFs had a promoter, a transcription start site, a start codon, a Kozak pattern and a poly(A) site; hence, each of them can be viewed as a gene in terms of a gene's primary structure. Third, both the ORFs matched not only human C2H2-ZNF expressed sequence tags (ESTs) but also human C2H2-ZNF proteins with e-values of e–50 or better. This indicates that the both ORFs can be transcribed and translated into the same zinc-finger proteins. More importantly, we observed that the phenomenon—a DNA can be translated into the same type of proteins after a frameshift—also occurred in a set of 160 human C2H2-ZNF ESTs and in a set of nine cDNAs of human C2H2-ZNF proteins. This observation based on the two sets of wet-experimental data much strengthened our confidence on the discovery. Our discovery is useful in the deeper understanding of a gene's regulatory mechanism to maintain its function. Supplementary information: http://zfgene.i2r.a-star.edu.sg
Pierik, FH, Burdorf, A, Deddens, JA, Juttmann, RE & Weber, RFA 2004, 'Maternal and Paternal Risk Factors for Cryptorchidism and Hypospadias: A Case–Control Study in Newborn Boys', Environmental Health Perspectives, vol. 112, no. 15, pp. 1570-1576.
View/Download from: Publisher's site
Raby, BA, Celedon, JC, Litonjua, AA, Phipatanakul, W, Sredl, D, Oken, E, Ryan, L, Weiss, ST & Gold, DR 2004, 'Low-normal gestational age as a predictor of asthma at 6 years of age', PEDIATRICS, vol. 114, no. 3, pp. E327-E332.
View/Download from: Publisher's site
Ryan, L, Huang, WZ, Thurston, SW, Kelsey, KT, Wiencke, JK & Christiani, DC 2004, 'On the use of biomarkers for environmental health research', STATISTICAL METHODS IN MEDICAL RESEARCH, vol. 13, no. 3, pp. 207-225.
View description>>
This article discusses the growing interest in the use of biomarker data in environment health research and considers some of the challenging statistical issues that arise. We specify a modeling framework that links environmental exposure, biomarkers and outcome, and discuss in conceptual terms how such a formulation could be used to inform dose response modeling for the purpose of quantitative risk assessment. We then analyse some biomarker data from a case-control study designed to elucidate the mechanisms of smoking induced lung cancer. Because of sample size limitations, we use a likelihood-based analysis which subsumes both cohort and case-control designs as special cases. Our analysis allows us to 1) investigate the extent to which the markers explain the pathway from exposure to outcome; 2) quantify the degree to which biomarker data can improve on predicting outcome over and above exposure; and 3) estimate the association among multiple markers. © Arnold 2004.
Serrano-Trespalacios, PI, Ryan, L & Spengler, JD 2004, 'Ambient, indoor and personal exposure relationships of volatile organic compounds in Mexico City Metropolitan Area', JOURNAL OF EXPOSURE ANALYSIS AND ENVIRONMENTAL EPIDEMIOLOGY, vol. 14, pp. S118-S132.
View/Download from: Publisher's site
Shichao Zhang, Chengqi Zhang & Qiang Yang 2004, 'Guest editors' introduction - Information enhancement for data mining', IEEE Intelligent Systems, vol. 19, no. 2, pp. 12-13.
View/Download from: Publisher's site
Staab, S, Bhargava, B, Lilien, L, Rosenthal, A, Winslett, M, Sloman, M, Dillon, TS, Chang, E, Hussain, FK, Nejdl, W, Olmedilla, D & Kashyap, V 2004, 'The Pudding of Trust', IEEE Intelligent Systems, vol. 19, no. 5, pp. 74-88.
View/Download from: Publisher's site
View description>>
The role of trust in pervasive computing environment is discussed. The use of trust paradigm requires careful selection of useful trust aspects needed for the system being designed. Any exchange of an entity's private information for a gain in its partner's trust depends on satisfactory limits on its further dissemination. The organization's policies should describe who can do what under what circumstances to establish trust.
Venners, SA, Wang, XB, Chen, CZ, Wang, LH, Chen, DF, Guang, WW, Huang, AQ, Ryan, L, O'Connor, J, Lasley, B, Overstreet, J, Wilcox, A & Xu, XP 2004, 'Paternal smoking and pregnancy loss: A prospective study using a biomarker of pregnancy', AMERICAN JOURNAL OF EPIDEMIOLOGY, vol. 159, no. 10, pp. 993-1001.
View/Download from: Publisher's site
View description>>
Results of studies on paternal smoking and spontaneous abortions have been inconsistent. The authors examined the effect of paternal smoking on the risk of pregnancy loss in a prospective cohort of 526 newly married, nonsmoking, female textile workers in China between 1996 and 1998. Upon stopping contraception, subjects provided daily urine specimens and records of vaginal bleeding for up to 1 year or until clinical pregnancy. Daily urinary human chorionic gonadotropin was assayed to detect conception and early pregnancy losses, and pregnancies were followed to detect clinical spontaneous abortions. Subjects were grouped by the number of cigarettes that husbands reported smoking daily: nonsmokers (group 1, n = 216), fewer than 20 cigarettes (group 2, n = 239), and 20 or more cigarettes (group 3, n = 71). Compared with that for group 1, the adjusted odds ratio of early pregnancy loss of any conception for group 2 was 1.04 (95% confidence interval (CI): 0.67, 1.63) and for group 3 was 1.81 (95% CI: 1.00, 3.29). The adjusted hazard ratio of conception for group 2 was 0.90 (95% CI: 0.70, 1.18) and for group 3 was 0.96 (95% CI: 0.66, 1.39), while the adjusted hazard ratio of clinical pregnancy for group 2 was 0.93 (95% CI: 0.72, 1.20) and for group 3 was 0.78 (95% CI: 0.55, 1.12). The authors conclude that heavy paternal smoking increased the risk of early pregnancy loss through maternal and/or paternal exposure.
Wu, X, Zhang, C & Zhang, S 2004, 'Efficient mining of both positive and negative association rules', ACM Transactions on Information Systems, vol. 22, no. 3, pp. 381-405.
View/Download from: Publisher's site
View description>>
This paper presents an efficient method for mining both positive and negative association rules in databases. The method extends traditional associations to include association rules of forms A ⇒ ¬ B , ¬ A ⇒ B , and ¬ A ⇒ ¬ B , which indicate negative associations between itemsets. With a pruning strategy and an interestingness measure, our method scales to large databases. The method has been evaluated using both synthetic and real-world databases, and our experimental results demonstrate its effectiveness and efficiency.
YAN, X, ZHANG, C & ZHANG, S 2004, 'IDENTIFYING SOFTWARE COMPONENT ASSOCIATION WITH GENETIC ALGORITHM', International Journal of Software Engineering and Knowledge Engineering, vol. 14, no. 04, pp. 441-447.
View/Download from: Publisher's site
View description>>
Identifying software component association is useful for component management and component retrieval. In this paper we design an evolutionary strategy to understand software structure better and identify software component association, by using genetic algorithm. Our mining strategy is effective for global search, especially when the searched space is so large that it is hardly possible to use deterministic search method.
Zhang, S, Lu, J & Zhang, C 2004, 'A fuzzy logic based method to acquire user threshold of minimum-support for mining association rules', Information Sciences, vol. 164, no. 1-4, pp. 1-16.
View/Download from: Publisher's site
View description>>
There is a challenging man-machine-interface issue in existing association analysis algorithms because they are Apriori-like and the Apriori Algorithm is based on the assumption that users can specify the threshold: minimum-support. It is impossible that users give a suitable minimum-support for a database to be mined if the users are without knowledge concerning the database. In this paper, we propose a fuzzy mining strategy with database-independent minimum-support, which provides a good man-machine interface that allows users to specify the minimum-support threshold without any knowledge concerning their databases to be mined. We have evaluated the proposed approach and the experimental results have demonstrated that our algorithm is promising and efficient. © 2003 Elsevier Inc. All rights reserved.
Zhang, S, Zhang, C & Yu, JX 2004, 'An efficient strategy for mining exceptions in multi-databases', Information Sciences, vol. 165, no. 1-2, pp. 1-20.
View/Download from: Publisher's site
View description>>
This paper proposes a new strategy, referred to as local instance analysis, for multi-database mining. While many interstate organizations have an imperative need to analyze their data in multi-databases distributed throughout their branches, traditional multi-database mining utilizes the strategies for mono-database mining: pooling all the data from relevant databases into a single dataset for discovery. This leads to the destruction of useful information, for instance, '70% of branches within a company agreed that a married customer usually has at least 2 cars if his/her age is between 45 and 65'. This information assists in global decision-making within the company. Our new strategy is developed for discovering this useful information. Using the local instance analysis, we design an algorithm for identifying exceptions from multi-databases. Exceptional pattern reflects the 'individuality' of, say, branches of an interstate company. © 2003 Elsevier Inc. All rights reserved.
ZHANG, S, ZHANG, C & YU, JX 2004, 'MINING DEPENDENT PATTERNS IN PROBABILISTIC DATABASES', Cybernetics and Systems, vol. 35, no. 4, pp. 399-424.
View/Download from: Publisher's site
View description>>
Today's database systems must deal with uncertainty in the data they store. Consequently, there is a strong need for mining probabilistic databases. Because probabilistic data in first normal form relations is redundant, existing mining techniques are inadequate for discovering probabilistic databases. This paper designs a new strategy for identifying potentially useful patterns in probabilistic databases. A dependent rule is thus identified in a probabilistic database, represented in the form X → Y with conditional probability matrix MY/X This method uses an instance selection to increase efficiency, enabling us to reduce the search space. We evaluated the proposed technique, and our experimental results demonstrate that the approach is effective and efficient.
Zhang, SC, Zhang, CQ & Yu, JX 2004, 'Mining dependent patterns in probabilistic databases', CYBERNETICS AND SYSTEMS, vol. 35, no. 4, pp. 399-424.
View/Download from: Publisher's site
Abolhasan, M, Lipman, J, Chicharo, J & ieee 1970, 'A routing strategy for heterogeneous Mobile Ad Hoc Networks', PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2, Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004., In the 5th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, Shanghai, China, pp. 13-16.
View/Download from: Publisher's site
View description>>
This paper presents a new routing strategy for heterogeneous Mobile Ad Hoc Networks. We refer to this strategy as On-demand Utility-Based Routing Protocol (OUBRP). This protocol introduces a Utility-Based route discovery strategy, which aims to minimise the number of control packets disseminated into the network during route discovery by efficiently using available resources at each node. Furthermore, we propose a new strategy to eliminate uni-directional links during the route discovery phase. We refer to this strategy as Uni-directional Link Elimination (ULE). We performed a simulation study to compare the performance of OUBRP with a number of different routing protocols proposed for MANETs. Our results show that OUBRP compared to other routing strategies produces significantly fewer control packets and achieves higher levels of successful packet delivery with increasing number of nodes. Furthermore, we propose a number of alternative Uni-directional Link Elimination strategies.
Cao, L, Luo, C, Luo, D & Liu, L 1970, 'Ontology Services-Based Information Integration in Mining Telecom Business Intelligence', Pricai 2004: Trends In Artificial Intelligence, Proceedings, Pacific Rim International Conference on Artificial Intelligence, Springer Berlin Heidelberg, Auckland, New Zealand, pp. 85-94.
View/Download from: Publisher's site
Cao, L, Luo, C, Luo, D & Zhang, C 1970, 'Hybrid Strategy of Analysis and Control of Telecommunications Frauds', Proceedings of 2nd International Conference on Information Technology and Applications, International Conference on Information Technology and Applications, IEEE, Harbin, China, pp. 11-15.
Cao, L, Luo, C, Luo, D & Zhang, C 1970, 'Hybrid strategy of analysis and control of telecommunications frauds', Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004), pp. 281-285.
View description>>
The problem of telecommunications frauds has been getting more and more serous for many years, and is even getting more and more worse not only in western countries but also in some developing countries. Detection, Analysis and prevention mechanisms are emerging both from telecommunications operators and academia. In this paper, we present a hybrid strategy of analysis and control of telecommunications frauds from engineering viewpoint Our first task is to identify the complexity of telecommunications frauds, we discuss possible fraud scenarios and their evolution. Furthermore, in order to build an information system to deal with realistic telecommunications frauds, we summarize and propose a hybrid strategy, which includes a solution package, five models and four types of analyses, to construct a loop-dosed system for analysis and control of frauds. We further discuss a system framework for analysis and control of telecommunications frauds.
Cao, L, Luo, C, Luo, D & Zhang, C 1970, 'Integration of business intelligence based on three-level ontology services', Proceedings - IEEE/WIC/ACM International Conference on Web Intelligence, WI 2004, IEEE/WIC/ACM international Conference on Web Intelligence and Intelligent Agent Technology, IEEE, Beijing, China, pp. 17-23.
View/Download from: Publisher's site
View description>>
Usually, integration of business intelligence (BI) from realistic telecom enterprise is by packing data warehouse (DW), OLAP, data mining and reporting from different vendors together. As a result, BI system users are transferred to a reporting system with reports, data models, dimensions and measures predefined by system designers. As a result of survey, 85% of DW projects failed to meet their intended objectives. In this paper, we investigate how to integrate BI packages into an adaptive and flexible knowledge portal by constructing an internal link and communication channel from top-level business concepts to underlying enterprise information systems (EIS). An approach of three-level ontology services is developed, which implements unified naming, directory and transport of ontology services, and ontology mapping and query parsing among conceptual view, analytical view and physical view from user interfaces through DW to EIS. Experiments on top of real telecom EIS shows that our solution for integrating BI presents much stronger power to support operational decision making more user-friendly and adoptively compared with those simply combining BI products presently available together. © 2004 IEEE.
Cao, L, Luo, D, Luo, C & Liu, L 1970, 'Ontology Transformation in Multiple Domains', AI 2004: Advances in Artificial Intelligence, 17th Australian Joint Conference on Artificial Intelligence Cairns, Australia, December 2004 Proceedings, Australasian Joint Conference on Artificial Intelligence, Springer Berlin Heidelberg, Cairns, Australia, pp. 985-990.
View/Download from: Publisher's site
View description>>
We have proposed a new approach called ontology services-driven integration of business intelligence (BI) to designing an integrated BI platform. In such a BI platform, multiple ontological domains may get involved, such as domains for business, reporting, data warehouse, and multiple underlying enterprise information systems. In general, ontologies in the above multiple domains are heterogeneous. So, a key issue emerges in the process of building an integrated BI platform, that is, how to support ontology transformation and mapping between multiple ontological domains. In this paper, we present semantic aggregations of semantic relationships and ontologies in one or multiple domains, and the ontological transformation from one domain to another. Rules for the above semantic aggregation and transformation are described. This work is the foundation for supporting BI analyses crossing multiple domains.
Cao, L, Ni, J, Wang, J & Zhang, C 1970, 'Agent Services-Driven Plug-and-Play in F-TRADE', Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), Australasian Joint Conference on Artificial Intelligence, Springer Berlin Heidelberg, Cairns, Australia, pp. 917-922.
View/Download from: Publisher's site
View description>>
We have built an agent service-based enterprise infrastructure: F-TRADE. With its online connectivity to huge real stock data in global markets, it can be used for online evaluation of trading strategies and data mining algorithms. The main functions in the F-TRADE include soft plug-and-play, and back-testing, optimization, integration and evaluation of algorithms. In this paper, we'll focus on introducing the intelligent plug-and-play, which is a key system function in the F-TRADE. The basic idea for the soft plug-and-play is to build agent services which can support the online plug-in of agents, algorithms and data sources. Agent UML-based modeling, role model and agent services for the plug-and-play are discussed. With this design, algorithm providers, data source providers, and system module developers of the F-TRADE can expand system functions and resources by online plugging them into the F-TRADE. © Springer-Verlag Berlin Heidelberg 2004.
Chen, L, Bhowmick, SS & Chia, LT 1970, 'Mining maximal frequently changing subtree patterns from XML documents', DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 6th International Conference on Data Warehousing and Knowledge Discoverey (DaWaK 2004), SPRINGER-VERLAG BERLIN, Zaragoza, SPAIN, pp. 68-76.
Chen, L, Bhowmick, SS & Chia, L-T 1970, 'VRules', Proceedings of the 2nd ACM international workshop on Multimedia databases, CIKM04: Conference on Information and Knowledge Management, ACM.
View/Download from: Publisher's site
Cheng, ED, Piccardi, M & Jan, T 1970, 'Stochastic boats generated acoustic target signal detection in time-frequency domain', Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004., Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004., IEEE, Rome, Italy, pp. 429-432.
View/Download from: Publisher's site
View description>>
This paper is devoted to theoretic algorithms development and experimental research of automatic target detection of acoustic signals, especially for boats generated signals. In this paper, an observation space is created by sampling and dividing input analog acoustic signal into multiple frames and each frame is transformed into frequency domain. In the created observation space, a median constant false alarm rate (MCFAR) and post detection integration algorithms have been proposed for an effective automatic target detection of boat generated acoustic signals, in which a low constant false alarm rate is kept with relative high detection rate. The proposed algorithms have been tested on real boat generated acoustic signals. The statistical analysis and experimental results showed that the proposed algorithm has kept a very low false alarm rate and relatively high detection rate.
Chunsheng Li, Zili Zhang & Chengqi Zhang 1970, 'A platform for dynamic organization of agents in agent-based systems', Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)., Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)., IEEE, Beijing, China, pp. 454-457.
View/Download from: Publisher's site
View description>>
In most agent-based systems, different middle agents are employed to increase their flexibility. However, there are still three issues remain unsolved: In centralized architecture with single middle agent, the middle agent itself is a bottleneck and suffers from single point failure; Middle agents in distributed architecture lack capability of dynamic organization of agents; The reliability is not strong because of the single point failure and lack of effective architecture. In this paper, we introduce a platform with ring architectural model to solve all above problems. In the platform, multiple middle agents are dynamically supported for solving the first problem. For solving the second problem, middle agents dynamically manage the registration and cancellation of service provider agents and application teams, each of which includes a set of closely interacting requester agents to complete an independent task. Redundancy middle agent technique is proposed for solving the third problem. All middle agents are of the feature of proliferation and self-cancellation according to the sensory inputs from their environment. For organizing the middle agents effectively, a ring architectural model is proposed. We demonstrate the applicability of the platform by its application and present experimental evidence that the platform is flexible and robust. © 2004 IEEE.
Dillon, TS, Chang, E & Hussain, F 1970, 'A Framework for a Trusted Environment for Virtual Collaboration', Advances In Web-Age Information Management: Proceedings of WAIM 2004, International Conference on Web-Age Information Management, Springer Berlin Heidelberg, Dalian, China, pp. 1-12.
View/Download from: Publisher's site
View description>>
Trusted computing has assumed major significance since the advent of internet based commerce and peer to peer communications. Trust is the belief that a peer has another peer in a given context. This paper addresses both identity trust which establishes the identity of another party and behaviour trust which answers the question rsquoDo you believe that the entity will behave as you expect it to?rsquo It develops complete definitions of context and time dependant trust and reputation and develops trust models, trust relationships of a peer.
Gabrys, B 1970, 'Learning hybrid neuro-fuzzy classifier models from data: to combine or not to combine?', Fuzzy Sets and Systems, International Workshop on Hybrid Methods for Adaptive Systems held at EUNITE 2001, Elsevier BV, Puerto de la Cruz, SPAIN, pp. 39-56.
View/Download from: Publisher's site
Gabrys, B & Petrakieva, L 1970, 'Combining labelled and unlabelled data in the design of pattern classification systems', International Journal of Approximate Reasoning, Workshop on Hybrid Methods for Adaptive Systems, Elsevier BV, Albufeira, PORTUGAL, pp. 251-273.
View/Download from: Publisher's site
Gunes, H, Piccardi, M & Jan, T 1970, 'Automated classification of female facial beauty by image analysis and supervised learning', VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2004, PTS 1 AND 2, SPIE International Conference on Visual Communications and Image Processing, IS&T & SPIE, San Jose, CA, USA, pp. 968-978.
View/Download from: Publisher's site
View description>>
The fact that perception of facial beauty may be a universal concept has long been debated amongst psychologists and anthropologists. In this paper, we performed experiments to evaluate the extent of beauty universality by asking a number of diverse human referees to grade a same collection of female facial images. Results obtained show that the different individuals gave similar votes, thus well supporting the concept of beauty universality. We then trained an automated classifier using the human votes as the ground truth and used it to classify an independent test set of facial images. The high accuracy achieved proves that this classifier can be used as a general, automated tool for objective classification of female facial beauty. Potential applications exist in the entertainment industry and plastic surgery.
Gunes, H, Piccardi, M & Jan, T 1970, 'Bimodal Modelling of Facila and Upper-Body Gesture for Affective HCI', Conference Proceedings of OZCHI 2004, Australian Computer Human Interaction Conference, Ergonomics Society of Australia, Wollongong, Australia, pp. 1-9.
Gunes, H, Piccardi, M & Jan, T 1970, 'Face and body gesture analysis for multimodal HCI', COMPUTER HUMAN INTERACTION: PROCEEDINGS, Asia-Pacific Computer Human Interaction Conference, Springer-Verlag Berlin, Rotorua, New Zealand, pp. 583-588.
Gunes, H, Piccardi, M & Jan, T 1970, 'Face and Body gesture recognition for a vision-based multimodal analyser', Proceedings of the Pan-Sydney Area Workshop on Visual Information Processing (VIP2003), Pan-Sydney Area Workshop on Visual Information Processing, ACS, Sydney, Australia, pp. 19-28.
Gunes, H, Piccardi, M, Jan, T & IEEE 1970, 'Comparative classification for pre-surgery planning', 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, IEEE Conference on Systems, Man and Cybernetics, IEEE, The Hague, The Netherlands, pp. 2168-2174.
View/Download from: Publisher's site
View description>>
Recent medical studies show that there exist aesthetic ideal features for facial beauty based on facial proportions. Automated tools that can provide information about the prediction of how the surgery will improve the patients' perceived beauty or 'peer-esteem' will find applications in various areas. In our previous work, we introduced an automated procedure based on image analysis and supervised learning that confirmed the existence of general rules in peer-esteem measurement. In this paper, we further experimented our automated system by extending the analysis of classification tools and human data by comparing a number of classifiers, namely decision trees, multi-layer perceptron and kernel density estimators. Results are good since the standardized distance is generally less than one class, and prove that these classifiers can be used to reliably predict the consensus of a large and varied population of human referees, hence providing peer-esteem information for patients.
He, S, Wang, H, Hintz, TB & Wu, Q 1970, 'How Can Spiral Architecture Improve Image Compression?', Proceedings of 2nd International Conference on Information Technology and Applications, International Conference on Information Technology and Applications, Macquarie Scientific Publishing, Harbin, China, pp. 226-230.
He, X, Hintz, T & Wu, Q 1970, 'Edge detection on spiral architecture: An overview', Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04, International Conference on Parallel and Distributed Processing Techniques and Applications, CSREA Press, Las Vegas, USA, pp. 406-412.
View description>>
Gradient-based edge detection is a straightforward method to identify the edge points in the original grey-level image. It is intuitive that in the human vision system the edge points always appear where the greylevel value is greatly changed. Spiral Architecture is a relatively new image data structure that is inspired from anatomical considerations of the primate's vision. In Spiral Architecture, each image is represented as a collection of hexagonal pixels. Edge detection on Spiral Architecture has features of fast computation and accurate localization. In this paper, we briefly review the edge detection methods on Spiral Architecture including the edge focusing technique, bilateral filter, and triple-diagonal gradient. Parallel algorithms for edge detection will be discussed. We will also list problems for future work.
Hussain, FK, Chang, E & Dillon, T 1970, 'Classification of reputation in peer-to-peer (P2P) communication', PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, International Conference on Parallel and Distributed Processing Techniques and Applications, CSREA Press, Nevada, USA, pp. 1429-1435.
Hussain, FK, Chang, E & Dillon, T 1970, 'Reputation in peer-to-peer communication', IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, International Conference on Internet Computing, CSREA Press, Nevada, USA, pp. 269-271.
Hussain, FK, Chang, E & Dillon, T 1970, 'Repute relationships for reputation management in peer-to-peer communication - I', SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, International Conference on Security and Management, CSREA, Las Vegas, Nevada, USA, pp. 147-153.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Factors of trust that influence trust worthiness in peer-to-peer (P2P) based e-commerce', BAI 2004 International Workshop on Business and Information, International Workshop on Business and Information, Academy of Taiwan information system research, Taipei, Taiwan, pp. 1-10.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Peer to peer (P2P) trust modeling', International Conference on Communication and Broadband Networking (ICBN'04), International Conference on Communication and Broadband Networking (ICBN'04), ICBN'04, Kobe, Japan, pp. 1-18.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Taxonomy of Trust Relationships in Peer-Peer (P2P) Communication', Proceedings of the Second International Workshop on Security in Information Systems WOSIS-2004, International Workshop on Security in Information Systems, INSTICC: Press, Institute for Systems and Technologies of Information, Control and Communication, Portugal, pp. 99-103.
Jan, T, Po-Hsiang Tsai, Piccarch, M & Hintz, T 1970, 'Efficient video object classifier using locality-enhanced support vector machines', 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), IEEE, The Hague, Netherlands, pp. 6373-6377.
View/Download from: Publisher's site
View description>>
In multimedia applications such as MPEG-4, an ejicient model is required to encode and classih @ideo objects such as human, car and building. Recently Su,?port Vector Machine (SVM) has been shown to be a good c!assijer: however; its larxe computational requirementpmhibited its use in real time video pmcessing applications. In this paper: a modelispmposedthatenablesuseofSVMin video applications. Thispaper aims IO merge multi-scale basedxelecfive encoding/classification technique and locality-enhimced Support Vector Machine (SVM). Thepmposed model allows selected image scales (of interesr) ro be encoded and classified more accurafely by complex classifier such as ,SVM, whilst other image scales of less significance IO be encoded and classified by simpler encoder/classifiex Image sca Ies of interest are readily selectedfioni niulti-scale image processirigparadigm. SVMis used to encode visual object infirmation of significant image scale only: hence its use is ejicient. Experiment with MPEG-4 video object encoding and classification shows that the performance of the proposed ?!lode1 is comparable with other models, however with significarifly reduced computational requirements.
Jia, W, He, S & Wu, Q 1970, 'Edge Analysis on Rectangular and Hexagonal Architectures', Proceedings of the International Conference on Information and Communication Technologies, International Conference on Information and Communication Technologies, Assumption University, Bangkok, Thailand, pp. 69-75.
Jia, W, He, X & Piccardi, M 1970, 'Automatic license plate recognition: A review', Proceedings of the International Conference on Imaging Science, Systems and Technology, CISST'04, International Conference Imaging Science, Systems and Technology, CSREA Press, Las Vegas, Nevada, USA, pp. 43-49.
View description>>
In recent years, many researches on Intelligent Transportation Systems (ITS) have been reported. Automatic License Plate Recognition (ALPR) is one form of ITS technology that not only recognizes and counts vehicles, but distinguishes each as unique by recognizing and recording the license plate's characters. This paper discusses the main techniques of ALPR. Several open problems are proposed at the end of the paper for future research.
Kennedy, PJ, Simoff, SJ, Skillicorn, D & Catchpoole, D 1970, 'Extracting and explaining biological knowledge in microarray data', ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer-Verlag Berlin, Sydney, Australia, pp. 699-703.
View/Download from: Publisher's site
View description>>
© Springer-Verlag Berlin Heidelberg 2004. This paper describes a method of clustering lists of genes mined from a microarray dataset using functional information from the Gene Ontology. The method uses relationships between terms in the ontology both to build clusters and to extract meaningful cluster descriptions. The approach is general and may be applied to assist explanation of other datasets associated with ontologies.
Li, C, Cheng, D & Zhang, C 1970, 'A platform to integrate well-log information applications on heterogeneous environments', Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004), pp. 207-212.
View description>>
The well-log information is very important for determining the crude oil and natural gas reservoirs. Because there are diversified generating methods and applications, well-log information is usually stored and processed on heterogeneous operating systems and data resources. How to share well-log information on heterogeneous environments efficiently is a big problem in petroleum industry. In this paper, we propose an agent-based platform in order to operate well-log information from heterogeneous data resources in uniform statements. The application and processing agents of well-log information on heterogeneous operating systems are dynamically integrated into the platform. A ring-based architectural model of middle agents, which is based on ring-based organizational structure and token-based coordination mechanism, is proposed for promoting the robustness and scalability of the platform. The heterogeneous data resources and operating systems are effectively integrated by using middle agents with ring-based architectural model. A prototype of this platform is implemented. The experimental results show that the platform works effectively.
Li, C, Song, Q & Zhang, C 1970, 'MA-IDS architecture for distributed intrusion detection using mobile agents', Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004), pp. 162-166.
View description>>
Distributed intrusion detection systems (IDS) have many advantages such as scalability, subversion resistance, and graceful service degradation. However, there are some impediments when they are implemented. The mobile agent (MA) technology is of many features to suit the Implementation of distributed IDS. In this paper, we propose a novel architecture MA-IDS with MA technology for distributed IDS. MA-IDS employs MA technology to coordlnately process information from each monitored host, and then completes global information extraction of Intruder actions. A prototype of mobile agent-based distributed Intrusion detection system by following MA-IDS Is developed. The system also Introduces uncertain factor into Intrusion decision, which accords with the objective reality that human behavior is changeful. We demonstrate the advantages and the potentials of MA-IDS by the result of evaluation.
Li, J & Ramamohanarao, K 1970, 'A Tree-Based Approach to the Discovery of Diagnostic Biomarkers for Ovarian Cancer', ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 8th Pacific/Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer Berlin Heidelberg, Sydney, AUSTRALIA, pp. 682-691.
View/Download from: Publisher's site
Lin, L, Cao, L, Wang, J & Zhang, C 1970, 'The applications of genetic algorithms in stock market data mining optimisation', Management Information Systems, Conference on Data Mining, Text Mining and Their Business Application, Wessex Institute of Technology Press, Malaga, Spain, pp. 273-280.
View description>>
In the stock market, a technical trading rule is a popular tool for analysts and users to carry out their research and decide to buy or sell their shares. The key issue for the success of a trading rule is the selection of values for all parameters and their combinations. However, the range of parameters can vary in a large domain, so it is difficult for users to find the best parameter combination. In this paper, we present the Genetic Algorithm (GA) to overcome the problem in two steps: first, setting a sub-domain of the parameters with GA; second, finding a near optimal value in the sub domain with GA in a very reasonable time.
Lipman, J, Boustead, P & Chicharo, J 1970, 'Reliable optimised flooding in ad hoc networks', Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710), Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, IEEE, Shanghai, PEOPLES R CHINA, pp. 521-524.
View/Download from: Publisher's site
Longbing Cao, Jiaqi Wang, Li Lin & Chengqi Zhang 1970, 'Agent services-based infrastructure for online assessment of trading strategies', Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)., Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)., IEEE, Beijing, China, pp. 345-348.
View/Download from: Publisher's site
View description>>
Traders and researchers in stock marketing often hold some private trading strategies. Evaluation and optimization of their strategies is a great benefit to them before they take any risk in realistic trading. We build an agent services-driven infrastructure: F-TRADE. It supports online plug in, iterative back-test, and recommendation of trading strategies. We propose agent services-driven approach for building the above automated enterprise infrastructure. Description, directory and mediation of agent services are discussed. System structure of the agent services-based F-TRADE is also discussed. F-TRADE has been an online test platform for research and application of multi-agent technology, and data mining in stock markets
Meeker, J, Ryan, L, Barr, D, Herrick, R, Bennett, D & Hauser, R 1970, 'Contemporary use insecticides and human semen quality', EPIDEMIOLOGY, 16th Conference of the International-Society-for-Environmental-Epidemiology, LIPPINCOTT WILLIAMS & WILKINS, New York, NY, pp. S190-S190.
View/Download from: Publisher's site
Petrakieva, L & Gabrys, B 1970, 'Selective Sampling for Combined Learning from Labelled and Unlabelled Data', APPLICATIONS AND SCIENCE IN SOFT COMPUTING, 4th International Conference on Recent Advances in Soft Computing, Springer Berlin Heidelberg, NOTTINGHAM TRENT UNIV, NOTTINGHAM, ENGLAND, pp. 139-146.
View/Download from: Publisher's site
Pham, TD, Crane, DI, Tannock, D & Bock, D 1970, 'Kullback-Leibler dissimilarity of Markov models for phylogenetic tree reconstruction', Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004., 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004., IEEE, pp. 157-160.
View/Download from: Publisher's site
View description>>
In this paper, we introduce the Kullback-Leibler dissimilarity measure of Markov-chain models for unaligned DNA sequences with application to the phylogenetic tree reconstruction of complete mammalian mitochondrial genomes. The tree obtained by our approach is generally in agreement with those obtained from other methods. Our proposed method is computationally efficient and very easy for computer implementation.
Piccardi, M 1970, 'Background subtraction techniques: a review', 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), 2004 IEEE International Conference on Systems, Man and Cybernetics, IEEE, The Hague, The Netherlands, pp. 3099-3104.
View/Download from: Publisher's site
View description>>
Background subtraction is a widely used approach for detecting moving objects from static cameras. Many different methods have been proposed over the recent years and both the novice and the expert can be confused about their benefits and limitations. In order to overcome this problem, this paper provides a review of the main methods and an original categorisation based on speed, memory requirements and accuracy. Such a review can effectively guide the designer to select the most suitable method for a given application in a principled way. Methods reviewed include parametric and non-parametric background density estimates and spatial correlation approaches.
Piccardi, M & Jan, T 1970, 'Mean-shift background image modelling', 2004 International Conference on Image Processing, 2004. ICIP '04., 2004 International Conference on Image Processing, 2004. ICIP '04., IEEE, Singapore City, Singapore, pp. 3399-3402.
View/Download from: Publisher's site
View description>>
Background modelling is widely used in computer vision for the detection of foreground objects in a frame sequence. The more accurate the background model, the more correct is the detection of the foreground objects. In this paper, we present an approach to background modelling based on a mean-shift procedure. The mean shift vector convergence properties enable the system to achieve reliable background modelling. In addition, histogram-based computation and the new concept of local basins of attraction allow us to meet the stringent real-time requirements of video processing. ©2004 IEEE.
Qin, Z, Zhang, S & Zhang, C 1970, 'Cost-Sensitive Decision Trees with Multiple Cost Scales', Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), Australasian Joint Conference on Artificial Intelligence, Springer Berlin Heidelberg, Cairns, Australia, pp. 380-390.
View/Download from: Publisher's site
View description>>
How to minimize misclassification errors has been the main focus of Inductive learning techniques, such as CART and C4.5. However, misclassification error is not the only error in classification problem. Recently, researchers have begun to consider both test and misclassification costs. Previous works assume the test cost and the misclassification cost must be defined on the same cost scale. However, sometimes we may meet difficulty to define the multiple costs on the same cost scale. In this paper, we address the problem by building a cost-sensitive decision tree by involving two kinds of cost scales, that minimizes the one kind of cost and control the other in a given specific budget. Our work will be useful for many diagnostic tasks involving target cost minimization and resource consumption for obtaining missing information. © Springer-Verlag Berlin Heidelberg 2004.
Skillicorn, D, Simoff, SJ, Kennedy, PJ & Catchpoole, DR 1970, 'Strategies for Winnowing Microarray Data', Proceedings SIAM Bioinformatics Workshop, SIAM International Conference on Data Mining, Uppsala University, Lake Buena Vista, Florida, USA, pp. 45-51.
Stoianoff, NP & Kaidonis, MA 1970, 'The Tax Treatment of Mining Site Rehabilitation: Evaluating 10 Years of Reform', 16th Australasian Tax Teachers Association Conference, Tax Reform: Fairer, Efficient, Simple Tax?, Adelaide, South Australia.
Stoianoff, NP, Bernstein, B & Mohannak, K 1970, 'Institutional Linkages and Commercialisation in Australian Biotechnology Industry: A Case Study of NSW Cluster', 18th Annual Conference of the Australian & New Zealand Academy of Management (ANZAM), University of Otago, Dunedin, New Zealand.
Wang, H, Hintz, T, He, X & Wu, Q 1970, 'How pseudo model may help evaluate image compression on spiral architecture', Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04, International Conference on Parallel and Distributed Processing Techniques and Applications, CSREA Press, La Vegas, USA, pp. 389-394.
View description>>
Although Spiral Architecture (SA) has many advantages in image processing and machine vision, there is no available image capture device yet to support this structure. Hence, in order to implement our theoretical results, it is necessary to construct the SA from the existing image structure, on which the traditional image representation is based. Therefore, in this paper we provide two methods, Mimic model and Pseudo model. We can construct the architecture from the rectangular pixels and thus they share the Spiral addressing mechanism. This paper then presents how Pseudo model may help to evaluate the performance of image compression on Spiral Architecture. Based on the two unique properties of Spiral Architecture, i.e. locality of light intensity and uniformity of image partitioning, possible approaches to image compression may be discovered. Our future work would focus on partitioning the image into blocks and implement compression on the transform domain.
Wang, J & Zhang, C 1970, 'KBSVM: KMeans-based SVM for Business Intelligence', 10th Americas Conference on Information Systems, AMCIS 2004, Americas Conference on Information Systems, Association for Information Systems, New York, USA, pp. 1889-1893.
View description>>
The goal of business intelligence (BI) is to make decisions based on accurate and succinct information from massive amounts of data. Support vector machine (SVM) has been applied to build the classification model in the field of BI and data mining. To achieve the original goal of BI and speed up the response of real-time systems, the complexity of SVM models should be reduced when it is applied into the practical business problems. The complexity of SVM models depends on the number of input variables and support vectors. While some researchers have tried to select parts of input variables to build the model, this paper proposes a new method called KMeans-based SVM (KBSVM) to reduce the number of support vectors. The experiments on real-world data show that the KBSVM method can build much more succinct model without any significant degradation of the classification accuracy.
Wang, J & Zhang, C 1970, 'Support vector machines based on set covering', Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004), pp. 95-98.
View description>>
Support Vector Machines (SVMs) have been the promising method in the field of machine learning. But for the real applications there are still some drawbacks in SVMs, e.g. the high training cost and too many support vectors. This paper presents a novel method based on set covering to overcome these drawbacks, called SC-SVMs. Some experiments on real data show the effectiveness of this new method.
Whitehead, DJ, Skusa, A & Kennedy, PJ 1970, 'Evaluating an evolutionary approach for reconstructing gene regulatory networks', ARTIFICIAL LIFE IX, 9th International Conference on the Simulation and Synthesis of Artificial Life (ALIFE9), MIT PRESS, Boston, MA, pp. 427-432.
Wu, Q, He, S & Hintz, TB 1970, 'Preliminary Image Compression Research Using Uniform Image Partitioning on Spiral Architecture', Proceedings of 2nd International Conference on Information Technology and Applications, International Conference on Information Technology and Applications, Macquarie Scientific Publishing, Harbin, China, pp. 216-221.
Wu, Q, He, X & Hintz, T 1970, 'Preliminary image compression research using uniform image partitioning on spiral architecture', Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004), pp. 416-421.
View description>>
Spiral Architecture is a relatively new and powerful approach to general purpose machine vision system. Using Spiral Multiplication and Spiral Addition, two special mathematical operations on Spiral Architecture, a uniform image partitioning method was proposed earlier. In this paper, preliminary research of image compression based on such a novel image partitioning is presented. It is demonstrated that after uniform image partitioning the sub-images have the properties that pixel intensities between the sub-images are quite similar thus giving opportunities for image compression.
Wu, Q, He, X & Hintz, T 1970, 'Virtual spiral architecture', Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04, International Conference on Parallel and Distributed Processing Techniques and Applications, CSREA Press, Las Vegas, Nevada, USA, pp. 399-405.
View description>>
Spiral Architecture is a relative new and powerful approach to machine vision system. The geometrical arrangement of pixels on Spiral architecture can be described in terms of a hexagonal grid. However, all the existing hardware for capturing image and for displaying image are produced based on rectangular architecture. It has become a serious problem affecting the advanced research on Spiral Architecture. In this paper, a novel mimic Spiral Architecture called virtual Spiral Architecture is presented. Using virtual Spiral Architecture, images on rectangular architecture can be smoothly transferred to hexagonal architecture. Moreover, such mimicking operation does not introduce distortion and reduce image resolution, which is an advantage over other mimicking methods. There is no doubt that virtual architecture will be helpful to research on Spiral Architecture and other hexagonal architectures.
Zhang, C, Guesgen, HW & Yeap, WK 1970, 'Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science): Preface', Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science).
Zhang, G, Bai, C, Lu, J & Zhang, C 1970, 'Bayesian Network based Cost Benefit Factor Inference in Eservices', Proceedings of 2nd International Conference on Information Technology and Applications, International Conference on Information Technology and Applications, Macquarie Scientific Publishing, Harbin, China, pp. 464-469.
Zhang, G, Bai, C, Lu, J & Zhang, C 1970, 'Bayesian network based cost benefit factor inference in e-services', Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004), pp. 404-409.
View description>>
This paper applies Bayesian network technique to model and inference the uncertain relationships among cost factors and benefit factors in E-services. A cost-benefit factor-relation model proposed in our previous study is considered as domain knowledge and the data collected through a survey is as evidence to conduct inference. Through calculating conditional probability distribution among factors and conducting inference, this paper identifies that certain cost factors are significantly more Important than others to certain benefit factors. In particular, this study found that 'increased investment in maintaining E-services' would significantly contribute to 'enhancing perceived company image' and 'gaining competitive advantages', and 'increased investment In staff training' would significant contribute to 'realizing business strategies'. These results have the potential to improve the strategic planning of companies by determining more effective investment areas and adopting more suitable development activities where Eservices are concerned.
Zhang, S, Liu, L, Lu, J & Ou, Y 1970, 'Is Minimum-Support Appropriate to Identifying Large Itemsets?', Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), Pacific Rim International Conference on Artificial Intelligence, Springer Berlin Heidelberg, Auckland, New Zealand, pp. 474-484.
View/Download from: Publisher's site
View description>>
Apriori-like algorithms have been based on the assumption that users can specify the minimum-support for their databases. In this paper, we propose a fuzzy strategy for identifying interesting itemsets without specifying the true minimum-support. This strategy allows users to specify their mining requirements in commonly sentences. And our algorithm generates potentially useful itemsets in fuzzy sets. © Springer-Verlag Berlin Heidelberg 2004.
Zhao, Y, Zhang, C & Shen, YD 1970, 'Clustering high-dimensional data with low-order neighbors', Proceedings - IEEE/WIC/ACM International Conference on Web Intelligence, WI 2004, IEEE/WIC/ACM international Conference on Web Intelligence and Intelligent Agent Technology, IEEE, Beijing, China, pp. 103-109.
View/Download from: Publisher's site
View description>>
Density-based and grid-based clustering are two main clustering approaches. The former is famous for its capability of discovering clusters of various shapes and eliminating noises, while the latter is well known for its high speed. Combination of the two approaches seems to provide better clustering results. To the best of our knowledge, however, all existing algorithms that combine density-based clustering and grid-based clustering take cells as atomic units, in the sense that either all objects in a cell belong to a cluster or no object in the cell belong to any cluster. This requires the cells to be small enough to ensure the fine resolution of results. In high-dimensional spaces, however, the number of cells can be very large when cells are small, which would make the clustering process extremely costly. On the other hand, the number of neighbors of a cell grows exponentially with the dimensionality of datasets, which makes the complexity increase further. In this paper, we present a new approach that takes objects (or points) as the atomic units, so that the restriction of cell size can be relaxed without degrading the resolution of clustering results. In addition, a concept of ith-order neighbors is introduced to avoid considering the exponential number of neighboring cells. By considering only low-order neighbors, our algorithm is very efficient while losing only a little bit of accuracy. Experiments on synthetic and public data show that our algorithm can cluster high-dimensional data effectively and efficiently. © 2004 IEEE.
Zhao, Y, Zhang, C & Zhang, S 1970, 'Discovering Interesting Association Rules by Clustering', Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), Australasian Joint Conference on Artificial Intelligence, Springer Berlin Heidelberg, Cairns,Australia, pp. 1055-1061.
View/Download from: Publisher's site
View description>>
There are a great many metrics available for measuring the interestingness of rules. In this paper, we design a distinct approach for identifying association rules that maximizes the interestingness in an applied context. More specifically, the interestingness of association rules is defined as the dissimilarity between corresponding clusters. In addition, the interestingness assists in filtering out those rules that may be uninteresting in applications. Experiments show the effectiveness of our algorithm. © Springer-Verlag Berlin Heidelberg 2004.
Zhenghua Yu & Jian Zhang 1970, 'Video deblocking with fine-grained scalable complexity for embedded mobile computing', Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004., Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004., IEEE, pp. 1175-1180.
View/Download from: Publisher's site
View description>>
This paper addresses the need of reducing blocking artifacts after video decompression in embedded mobile computing devices such as mobile phones and PDAs with limited computational capability, where low bit rate coding is usually employed and video deblocking is highly desirable. A novel video deblocking method has been developed which consists of two steps: deblocking mode decision and deblock filtering. Blocking artifacts are detected by examining the value of several adjacent pixels. Depending on the degree of blocking artifacts, a filter mode and a corresponding filtering center are determined for a region of pixels. The deblocking filter is chosen from five different types of candidates including variable center filters and non-symmetric filters. Extensive experiments show that the proposed algorithm has achieved both lower computational complexity and better visual quality as compared to MPEG-4 VM. Furthermore, targeting the need of embedded mobile computing platforms, a scheme is developed to dynamically scale the complexity (and hence power consumption) of the deblocking algorithm with graceful visual quality degradation.