Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV / Edition 1

Paperback (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $73.00
Usually ships in 1-2 business days
(Save 63%)
Other sellers (Paperback)
  • All (16) from $73.00   
  • New (10) from $73.10   
  • Used (6) from $73.00   


The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005. The 716 revised papers presented were carefully reviewed and selected from nearly 1400 submissions. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the first volume are intelligent design support systems, data engineering, knowledge engineering and ontologies, knowledge discovery and data mining, advanced network application, approaches and methods of security engineering, chance discovery, information hiding and multimedia signal processing, soft computing techniques and their applications, intelligent agent technology and applications, smart systems, knowledge-based interface systems, intelligent information processing for remote sensing, intelligent human computer interaction systems, experience management and knowledge management, network (security) real-time and fault tolerant systems, advanced network application and real-time systems, and intelligent watermarking algorithms.

Read More Show Less

Product Details

Table of Contents

Innovations in Intelligent Systems and Their Applications.- A Method for Optimal Division of Data Sets for Use in Neural Networks.- Excluding Fitness Helps Improve Robustness of Evolutionary Algorithms.- Testing Voice Mimicry with the YOHO Speaker Verification Corpus.- Image Multi-noise Removal via Lévy Process Analysis.- Evaluating the Size of the SOAP for Integration in B2B.- Personalised Search on Electronic Information.- Data Mining Coupled Conceptual Spaces for Intelligent Agents in Data-Rich Environments.- Data Mining and Soft Computing Applications II.- An Evolutionary Algorithm for Constrained Bi-objective Optimization Using Radial Slots.- An Optimization Approach for Feature Selection in an Electric Billing Database.- Integrating Relation and Keyword Matching in Information Retrieval.- Production Testing of Spark Plugs Using a Neural Network.- Variable Neighborhood Search with Permutation Distance for QAP.- Using Rough Set to Induce Comparative Knowledge and Its Use in SARS Data.- Mining Class Association Rules with Artificial Immune System.- Discovering Fuzzy Association Rules with Interest and Conviction Measures.- Skill Acquisition and Ubiquitous Human Computer Interaction.- Automatic Generation of Operation Manuals Through Work Motion Observation.- A Method of Controlling Household Electrical Appliance by Hand Motion in LonWorks.- Contribution of Biological Studies to the Understanding and Modeling of Skilled Performance: Some Examples.- Measurement of Human Concentration with Multiple Cameras.- Constructive Induction-Based Clustering Method for Ubiquitous Computing Environments.- Indoor Location Determination Using a Topological Model.- Lightweight Agent Framework for Camera Array Applications.- Soft Computing and Their Applications – IV.- The Location of Optimum Set-Point Using a Fuzzy Controller.- Genetic Modeling: Solution to Channel Assignment Problem.- On Self-organising Diagnostics in Impact Sensing Networks.- A Coevolutionary Algorithm with Spieces as Varying Contexts.- Hybrid Filter Fusion for Robust Visual Information Processing.- Edge Detection in Digital Image Using Variable Template Operator.- Combining Demographic Data with Collaborative Filtering for Automatic Music Recommendation.- Agent-Based Workflows, Knowledge Sharing and Reuse.- Different Perspectives on Modeling Workflows in an Agent Based Workflow Management System.- An Agent-Enhanced Workflow Management System.- Knowledge Sharing Between Design and Manufacture.- Toward Improvement-Oriented Reuse of Experience in Engineering Design Processes.- A Hybrid Approach to Determining the Best Combination on Product Form Design.- Utilizing Active Software to Capture Tacit Knowledge for Strategic Use.- Multi-media Authentication andWatermarking Applications.- A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication.- Research on Confidential Level Extended BLP Model.- Secure Tamper Localization in Binary Document Image Authentication.- A Seal Imprint Verification with Rotation Invariance.- Robust Authenticated Encryption Scheme with Message Linkages.- BPCS-Steganography – Principle and Applications.- Improved Video Watermark Detection Using Statistically-Adaptive Accumulation.- Comparison of Feature Extraction Techniques for Watermark Synchronization.- Reversible Watermarking Based on Improved Patchwork Algorithm and Symmetric Modulo Operation.- Knowledge and Engineering Techniques for Spatio-temporal Applications.- Spatial Knowledge-Based Applications and Technologies: Research Issues.- Managing Spatial Knowledge for Mobile Personalized Applications.- Geospatial Clustering in Data-Rich Environments: Features and Issues.- Spatio-temporal Modeling of Moving Objects for Content- and Semantic-Based Retrieval in Video Data.- Calendars and Topologies as Types.- Moving Object Detection in Dynamic Environment.- A General Framework Based on Dynamic Constraints for the Enrichment of a Topological Theory of Spatial Simulation.- Automatic Geomorphometric Analysis for Digital Elevation Models.- Intelligent Data Analysis and Applications II.- The Study of Electromagnetism-Like Mechanism Based Fuzzy Neural Network for Learning Fuzzy If-Then Rules.- Statistical Data Analysis for Software Metrics Validation.- A Multi-stage Fuzzy-Grey Approach to Analyzing Software Development Cost.- A Two-Phased Ontology Selection Approach for Semantic Web.- A Method for Acquiring Fingerprint by Linear Sensor.- Evaluation and NLP.- Creativitiy Support Environment and Its Social Applications.- A Handwriting Tool to Support Creative Activities.- Natural Storage in Human Body.- Computerized Support for Idea Generation During Knowledge Creating Process.- Awareness in Group Decision: Communication Channel and GDSS.- Aware Group Home: Person-Centered Care as Creative Problem Solving.- COLLECT-UML: Supporting Individual and Collaborative Learning of UML Class Diagrams in a Constraint-Based Intelligent Tutoring System.- Using Affective Leaner States to Enhance Learning.- Collective Intelligence.- Three Foraging Models Comprised of Ants with Different Pheromone Sensitivities.- Emerging of an Object Shape Information Caused by Signal-Transmission Relay of Multi-robots.- Autonomous Synchronization Scheme Access Control for Sensor Network.- Supporting Design for Manufacture Through Neutral Files and Feature Recognition.- A Programmable Pipelined Queue for Approximate String Matching.- A Framework for Mining Association Rules.- Computational Methods for Intelligent Neuro-fuzzy Applications.- Near-Optimal Fuzzy Systems Using Polar Clustering: Application to Control of Vision-Based Arm-Robot.- Door Traversing for a Vision-Based Mobile Robot Using PCA.- Local Feature Analysis with Class Information.- Training of Feature Extractor via New Cluster Validity – Application to Adaptive Facial Expression Recognition.- Adaptive Fuzzy Output-Feedback Controller for SISO Affine Nonlinear Systems Without State Observer.- High-Speed Extraction Model of Interest Region in the Parcel Image of Large Size.- Using Interval Singleton Type 2 Fuzzy Logic System in Corrupted Time Series Modelling.- Evolutionary and Self-organizing Sensors, Actuators and Processing Hardware.- Defining and Detecting Emergence in Complex Networks.- Annealing Sensor Networks.- Measuring Global Behaviour of Multi-agent Systems from Pair-Wise Mutual Information.- In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States.- Knowledge Based Systems for e-Business and e-Learning I.- Self-restructuring Peer-to-Peer Network for e-Learning.- An Improvement Approach for Word Tendency Using Decision Tree.- A New Technique of Determining Speaker’s Intention for Sentences in Conversation.- New Approach for Speeding-up Technique of the Retrieval Using Dynamic Full-Text Search Algorithm.- Multi-agent Systems and Evolutionary Computing.- Dafo, a Multi-agent Framework for Decomposable Functions Optimization.- Parameter Space Exploration of Agent-Based Models.- Efficient Pre-processing for Large Window-Based Modular Exponentiation Using Ant Colony.- COSATS, X-COSATS: Two Multi-agent Systems Cooperating Simulated Annealing, Tabu Search and X-Over Operator for the K-Graph Partitioning Problem.- Building Hyper-heuristics Through Ant Colony Optimization for the 2D Bin Packing Problem.- Real-Time Co-composing System Using Multi-aspects.- Ubiquitous Pattern Recognition.- Empirical Study on Usefulness of Algorithm SACwRApper for Reputation Extraction from the WWW.- New Logical Classes of Plausibility Functions in Dempster-Shafer Theory of Evidence.- Person Tracking with Infrared Sensors.- Entropy Criterion for Classifier-Independent Feature Selection.- Finding and Auto-labeling of Task Groups on E-Mails and Documents.- Person Recognition by Pressure Sensors.- Extraction and Revision of Signboard Images for Recognition of Character Strings.- Neural Networks for Data Mining.- Model Selection and Weight Sharing of Multi-layer Perceptrons.- Detecting Search Engine Spam from a Trackback Network in Blogspace.- Analysis for Adaptability of Policy-Improving System with a Mixture Model of Bayesian Networks to Dynamic Environments.- Parallel Shastic Optimization for Humanoid Locomotion Based on Neural Rhythm Generator.- Visualizing Dynamics of the Hot Topics Using Sequence-Based Self-organizing Maps.- Intelligent Consumer Purchase Intention Prediction System for Green Products.- Intelligent Systems for e-Business and e-Learning II.- Reverse-Query Mechanism for Contents Delivery Management in Distributed Agent Network.- A My Page Service Realizing Method by Using Market Expectation Engine.- Multi-agent Modeling of Peer to Peer Communication with Scale-Free and Small-World Properties.- A Case-Oriented Game for Business Learning.- Learning Value-Added Information of Asset Management from Analyst Reports Through Text Mining.- HHM-Based Risk Management for Business Gaming.- An Efficient Method for Creating Requirement Specification of Plant Control Software Using Domain Model.- Knowledge-Based Technology in Crime Matching, Modelling and Prediction.- The Study and Application of Crime Emergency Ontology Event Model.- From Links to Meaning: A Burglary Data Case Study.- A Methodology for Constructing Decision Support Systems for Crime Detection.- AASLMA: An Automated Argument System Based on Logic of Multiple-Valued Argumentation.- Trust and Information-Taking Behavior in the Web Community.- Soft Computing Applications.- Robust Intelligent Tuning of PID Controller for Multivarlable System Using Clonal Selection and Fuzzy Logic.- Intelligent Control of AVR System Using GA-BF.- Fault Diagnosis of Induction Motor Using Linear Discriminant Analysis.- Classifier Fusion to Predict Breast Cancer Tumors Based on Microarray Gene Expression Data.- An Efficient Face Detection Method in Color Images.- A Robust and Invisible Watermarking of 3D Triangle Meshes.- Advances of MPEG Scalable Video Coding Standard.- Extended Fuzzy Description Logic ALCN.- Automated Operator Selection on Genetic Algorithms.- Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)