[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1364262guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
AIKED'06: Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
2006 Proceeding
  • Editors:
  • Pablo Luis Lopez Espi,
  • Jose M. Giron-Sierra,
  • A. S. Drigas
Publisher:
  • World Scientific and Engineering Academy and Society (WSEAS)
  • Stevens Point
  • Wisconsin
  • United States
Conference:
Madrid Spain February 15 - 17, 2006
Published:
15 February 2006

Reflects downloads up to 12 Jan 2025Bibliometrics
Abstract

No abstract available.

Article
Using neural networks to tune heuristic parameters in evolutionary optimization
Pages 1–6

Evolutionary optimization algorithms contain, due to their heuristic inspiration, many heuristic parameters, which need to be empirically tuned for the algorithm to work most properly. This paper deals with tuning those parameters in situations when the ...

Article
Prediction of the index fund by Takagi-Sugeno fuzzy inference systems and feed-forward neural network
Pages 7–12

The paper presents (on the basis of passive investment strategies analysis) the design of the Takagi-Sugeno fuzzy inference system and the feed-forward neural network (with pre-processing of inputs time series) for prediction of the index fund. By means ...

Article
Visualizing and classifying data using a hybrid intelligent system
Pages 13–17

In this paper, a hybrid intelligent system that integrates the SOM (Self-Organizing Map) neural network, kMER (kernel-based Maximum Entropy learning Rule), and Probabilistic Neural Network (PNN) for data visualization and classification is proposed. The ...

Article
A trajectory index for topology conserving mapping
Pages 18–22

Topology preservation during training of Self-Organizing maps is a key factor to obtain a good quality visualization in process monitoring. In this paper, different existing indexes for topology preservation measurement are exposed and also a proposed ...

Article
Premium changes effects on insurance customers using neural networks
Pages 23–26

This paper examines the use of neural networks for modelling insurance customer retention rates within similar groups. The work is part of a data mining framework for determining optimal permium prices. Clustering is used to arrive at similar groups of ...

Article
Detection of anthelmintics resistant nematodes in sheep flocks using artificial neural networks
Pages 27–30

Anthelmintic resistance is an important problem in most sheep-producing countries of the world. Studies in this field are performed by clinical tests. Identification of anthelmintic resistant nematodes without clinical test can help farmers to save ...

Article
A Petri net simulator for self-organizing systems
Pages 31–35

Self-organizing systems have the general property that the primitive elements that comprise the system interact in order to achieve emergent global properties. We describe an extended Petri net simulation architecture for such systems that is based on ...

Article
Machine learning with genetic multivariate polynomials
Pages 36–42

We present an algorithm which is able to adjust a set of data with unknown characteristics. The algorithm is based on the simple notion that a sufficiently large set of examples will adequately embody the essence of a numerically expressible phenomenon, ...

Article
A secure remote database backup system
Pages 43–46

We propose a secure remote database backup system. This application allows for secure session establishment using public key cryptography, data backup using two kinds of algorithms, compression and encryption of backups and secure storage on a remote ...

Article
Code design as an optimization problem: from mixed integer programming to a high performance simplified randomized algorithm
Pages 47–52

We begin to show that the design of optimum codes is a very difficult tasks by a set of preliminary brute force experiments where we generate all the possible optimum codes of a given length and minimum Hamming distance and then estimate the probability ...

Article
Testing genetic algorithm recombination strategies and the normalized compression distance for computer-generated music
Pages 53–58

This paper analyzes the use of the normalized compression distance as a fitness function for the automatic generation of music by means of genetic algorithms, and tests the effect on performance of several genetic recombination procedures. The ...

Article
A framework for security modeling using knowledge engineering
Pages 59–64

Organisational Information Systems - as well as related performance and control systems - were modelled on the same paradigm to enable convergence by ensuring adherence to classical information processes routines built into formal and informal ...

Article
The design and the implementation of web service security system for the secured distribution of digital contents
Pages 65–68

With the development of multi media technology, the demand on digital contents distribution is increasing. However, it is very difficult to guarantee the integrity of digital contents and to protect the copyrights of the contents. Accordingly, in this ...

Article
The confluence of human capital management and human resource management and the benefits of knowledge engineering
Pages 69–73

The practice of Human Resource Management has been in place within organizations for many years. As organizations continue to seek sources of competitive advantage, many organizations are looking to actively manage their human capital more effectively. ...

Article
A robust audio watermarking in frequency domain
Pages 74–79

We present an efficient audio watermarking algorithm in the frequency domain. Watermark for embedding is generated by a random number generator. The host signal is subjected to wavelet decomposition and the watermark is embedded in the DCT coefficients ...

Article
Design of a computational model of adaptative coevolution
Pages 80–84

The purpose of the immune system is to protect our bodies from infection. The system works by recognizing the molecular signature of microbes or viruses that attack our bodies, and once identified, eliminating the foreign molecules in a variety of ways.

...

Article
Multi-speed particle swarm optimization
Pages 85–89

This paper presents a modified version of the Particle Swarm Optimization (PSO). In the new version, particles are allowed to pick from among many positions to where it will move in the next generation. The new version outperforms the PSO algorithm on ...

Article
Site layout optimization with ACO algorithm
Pages 90–94

Construction site layouts concerned with the existence, positioning, and timing of the temporary facilities that are used to carry out a construction project. Typically these problems are very complicated to formulate and difficult to solve. They are, ...

Article
The change of algorithmic data dependencies and their properties in relational sets
Pages 95–99

In this article an extension of the relational model with a new method is presented; i. e., the realisation of algorithmic dependencies between attributes that are in initial data sets formed for solving a particular applied problem. The concept, ...

Article
Social behavior model for human-machine collaboration systems
Pages 100–105

Recently, human-machine collaboration systems are increasing their importance more than ever because machine evolution continues and the importance of human-centered design is increasing. In this paper, social and intelligent agents are employed to ...

Article
Splitting algorithm for solving an integral differential equation
Pages 106–116

The initial-boundary value problem for a non-stationary transport equation is considered. This is rewritten as a Cauchy problem: dϕ/dt + Aϕ = F, ϕ|t = 0 = ϕ0 The unknown ϕ represents a suitable subset of a Hilbert space, whose elements are pairs of real-...

Article
From the magic square to the optimization of networks of AGVs and from MIP to an hybrid algorithm and from this one to the evolutionary computation
Pages 117–122

In a previous work we presented an algorithm inspired in the Artificial Intelligence and in the minimax optimization that imitates the human being in the solution of the magic square and we showed that in most cases its performance was better than the ...

Article
Combinatorial complexity: are we on the right way?
Pages 123–126

We present a hypothetical approach to support existing methods in dealing with combinatorial complexity and describe the application of said approach to some typical combinatorial problems and techniques.

Article
Application of an evolutionary algorithm for VaR calculations
Pages 127–132

The Value-at-Risk (VaR) approach has been extensively used for measuring and controlling of market risks in financial institutions during the last decade. The risk control and management systems required in the new banking industry are based on the ...

Article
Combining the semantic web with dynamic packaging systems
Pages 133–138

With the growth of demand for customized tourism itineraries, agencies seek technology that provides their customers the flexibility to put together unique dynamic packages from a range of alternatives, without having to be aware of the intricacy of ...

Article
Design of a universal high-speed telecommunication network using genetic algorithms: the case of the digital divide in Andalusia
Pages 139–144

The digital revolution holds great promise for prosperity and progress. However, the Information Society evolution is supported through the telecommunication networks deployment. The high cost of such infrastructures forces the companies to focus their ...

Article
Matchmaking for semantic web services with constraints on process models
Pages 145–152

Service discovery is part of the service-oriented architectural model and supported by any of the realising technologies including Web Services. This paper presents an agent-based system for discovering semantic Web Services whose behaviour is described ...

Article
Electronic funds transfer service over GPRS and secure TCP/X.25 gateways
Pages 153–158

This paper shows a complete description of a new EFT (Electronic Funds Transfer) service over IP for the traditional payment terminals. This new EFT service carries all the electronic transactions, generated from the POS (Point Of Sale) Terminals to the ...

Article
A hybrid greedy-simulated annealing algorithm for the optimal location of controllers in wireless networks
Pages 159–164

This paper presents preliminary work on the location of controllers in wireless communication networks using hybrid heuristics. We propose a model in which N base stations out of the total M of the network must be selected as controllers. The primary ...

Article
Network transformation algorithm for supply chain plant location problem
Pages 165–170

Through analyzing the product structure tree, the complete supply chain network (SCN) including materials supplying, products manufacturing and distribution is established. The directions of all the flows in the original SCN are narrowed down into one ...

Contributors
  • University of Alcalá
  • Complutense University of Madrid
  • National Centre for Scientific Research "DEMOKRITOS"
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations