No abstract available.
Using neural networks to tune heuristic parameters in evolutionary optimization
Evolutionary optimization algorithms contain, due to their heuristic inspiration, many heuristic parameters, which need to be empirically tuned for the algorithm to work most properly. This paper deals with tuning those parameters in situations when the ...
Prediction of the index fund by Takagi-Sugeno fuzzy inference systems and feed-forward neural network
The paper presents (on the basis of passive investment strategies analysis) the design of the Takagi-Sugeno fuzzy inference system and the feed-forward neural network (with pre-processing of inputs time series) for prediction of the index fund. By means ...
Visualizing and classifying data using a hybrid intelligent system
In this paper, a hybrid intelligent system that integrates the SOM (Self-Organizing Map) neural network, kMER (kernel-based Maximum Entropy learning Rule), and Probabilistic Neural Network (PNN) for data visualization and classification is proposed. The ...
A trajectory index for topology conserving mapping
Topology preservation during training of Self-Organizing maps is a key factor to obtain a good quality visualization in process monitoring. In this paper, different existing indexes for topology preservation measurement are exposed and also a proposed ...
Premium changes effects on insurance customers using neural networks
This paper examines the use of neural networks for modelling insurance customer retention rates within similar groups. The work is part of a data mining framework for determining optimal permium prices. Clustering is used to arrive at similar groups of ...
Detection of anthelmintics resistant nematodes in sheep flocks using artificial neural networks
Anthelmintic resistance is an important problem in most sheep-producing countries of the world. Studies in this field are performed by clinical tests. Identification of anthelmintic resistant nematodes without clinical test can help farmers to save ...
A Petri net simulator for self-organizing systems
Self-organizing systems have the general property that the primitive elements that comprise the system interact in order to achieve emergent global properties. We describe an extended Petri net simulation architecture for such systems that is based on ...
Machine learning with genetic multivariate polynomials
We present an algorithm which is able to adjust a set of data with unknown characteristics. The algorithm is based on the simple notion that a sufficiently large set of examples will adequately embody the essence of a numerically expressible phenomenon, ...
A secure remote database backup system
We propose a secure remote database backup system. This application allows for secure session establishment using public key cryptography, data backup using two kinds of algorithms, compression and encryption of backups and secure storage on a remote ...
Code design as an optimization problem: from mixed integer programming to a high performance simplified randomized algorithm
We begin to show that the design of optimum codes is a very difficult tasks by a set of preliminary brute force experiments where we generate all the possible optimum codes of a given length and minimum Hamming distance and then estimate the probability ...
Testing genetic algorithm recombination strategies and the normalized compression distance for computer-generated music
This paper analyzes the use of the normalized compression distance as a fitness function for the automatic generation of music by means of genetic algorithms, and tests the effect on performance of several genetic recombination procedures. The ...
A framework for security modeling using knowledge engineering
Organisational Information Systems - as well as related performance and control systems - were modelled on the same paradigm to enable convergence by ensuring adherence to classical information processes routines built into formal and informal ...
The design and the implementation of web service security system for the secured distribution of digital contents
With the development of multi media technology, the demand on digital contents distribution is increasing. However, it is very difficult to guarantee the integrity of digital contents and to protect the copyrights of the contents. Accordingly, in this ...
The confluence of human capital management and human resource management and the benefits of knowledge engineering
The practice of Human Resource Management has been in place within organizations for many years. As organizations continue to seek sources of competitive advantage, many organizations are looking to actively manage their human capital more effectively. ...
A robust audio watermarking in frequency domain
We present an efficient audio watermarking algorithm in the frequency domain. Watermark for embedding is generated by a random number generator. The host signal is subjected to wavelet decomposition and the watermark is embedded in the DCT coefficients ...
Design of a computational model of adaptative coevolution
The purpose of the immune system is to protect our bodies from infection. The system works by recognizing the molecular signature of microbes or viruses that attack our bodies, and once identified, eliminating the foreign molecules in a variety of ways.
...Multi-speed particle swarm optimization
This paper presents a modified version of the Particle Swarm Optimization (PSO). In the new version, particles are allowed to pick from among many positions to where it will move in the next generation. The new version outperforms the PSO algorithm on ...
Site layout optimization with ACO algorithm
Construction site layouts concerned with the existence, positioning, and timing of the temporary facilities that are used to carry out a construction project. Typically these problems are very complicated to formulate and difficult to solve. They are, ...
The change of algorithmic data dependencies and their properties in relational sets
In this article an extension of the relational model with a new method is presented; i. e., the realisation of algorithmic dependencies between attributes that are in initial data sets formed for solving a particular applied problem. The concept, ...
Social behavior model for human-machine collaboration systems
Recently, human-machine collaboration systems are increasing their importance more than ever because machine evolution continues and the importance of human-centered design is increasing. In this paper, social and intelligent agents are employed to ...
Splitting algorithm for solving an integral differential equation
The initial-boundary value problem for a non-stationary transport equation is considered. This is rewritten as a Cauchy problem: dϕ/dt + Aϕ = F, ϕ|t = 0 = ϕ0 The unknown ϕ represents a suitable subset of a Hilbert space, whose elements are pairs of real-...
From the magic square to the optimization of networks of AGVs and from MIP to an hybrid algorithm and from this one to the evolutionary computation
In a previous work we presented an algorithm inspired in the Artificial Intelligence and in the minimax optimization that imitates the human being in the solution of the magic square and we showed that in most cases its performance was better than the ...
Combinatorial complexity: are we on the right way?
We present a hypothetical approach to support existing methods in dealing with combinatorial complexity and describe the application of said approach to some typical combinatorial problems and techniques.
Application of an evolutionary algorithm for VaR calculations
The Value-at-Risk (VaR) approach has been extensively used for measuring and controlling of market risks in financial institutions during the last decade. The risk control and management systems required in the new banking industry are based on the ...
Combining the semantic web with dynamic packaging systems
With the growth of demand for customized tourism itineraries, agencies seek technology that provides their customers the flexibility to put together unique dynamic packages from a range of alternatives, without having to be aware of the intricacy of ...
Design of a universal high-speed telecommunication network using genetic algorithms: the case of the digital divide in Andalusia
The digital revolution holds great promise for prosperity and progress. However, the Information Society evolution is supported through the telecommunication networks deployment. The high cost of such infrastructures forces the companies to focus their ...
Matchmaking for semantic web services with constraints on process models
Service discovery is part of the service-oriented architectural model and supported by any of the realising technologies including Web Services. This paper presents an agent-based system for discovering semantic Web Services whose behaviour is described ...
Electronic funds transfer service over GPRS and secure TCP/X.25 gateways
This paper shows a complete description of a new EFT (Electronic Funds Transfer) service over IP for the traditional payment terminals. This new EFT service carries all the electronic transactions, generated from the POS (Point Of Sale) Terminals to the ...
A hybrid greedy-simulated annealing algorithm for the optimal location of controllers in wireless networks
This paper presents preliminary work on the location of controllers in wireless communication networks using hybrid heuristics. We propose a model in which N base stations out of the total M of the network must be selected as controllers. The primary ...
Network transformation algorithm for supply chain plant location problem
Through analyzing the product structure tree, the complete supply chain network (SCN) including materials supplying, products manufacturing and distribution is established. The directions of all the flows in the original SCN are narrowed down into one ...
Index Terms
- Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases