Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II

Overview

Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystems hostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established for almost a decade, and it cont- ues each year to attract participants from all geographical areas of the world, including Europe, the Americas, Australasia and the Pacific Rim. The KES conferences cover a wide range ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (4) from $9.99   
  • New (1) from $322.10   
  • Used (3) from $9.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$322.10
Seller since 2011

Feedback rating:

(975)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new and unread! Join our growing list of satisfied customers!

Ships from: Phoenix, MD

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystems hostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established for almost a decade, and it cont- ues each year to attract participants from all geographical areas of the world, including Europe, the Americas, Australasia and the Pacific Rim. The KES conferences cover a wide range of intelligent systems topics. The broad focus of the conference series is the theory and applications of intelligent systems. rom a pure research—eld, intel- gent systems have advanced to the point where their abilities have been incorporated into many business and engineering application areas. KES 2005 provided a valuable mechanism for delegates to obtain an e tensive view of the latest research into a range of intelligent-systems algorithms, tools and techni ues. The conference also gave de- gates the chance to come into contact with those applying intelligent systems in diverse commercial areas. The combination of theory and practice represented a uni ue opp- tunity to gain an appreciation of the full spectrum of leading-edge intelligent-systems activity. The papers for KES 2005 were either submitted to invited sessions, chaired and organi ed by respected e perts in their—elds, or to a general session, managed by an e tensive International Program Committee, or to the Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP) orkshop, managed by an International orkshop Technical Committee.

Read More Show Less

Product Details

Table of Contents

Machine Learning.- POISE – Achieving Content-Based Picture Organisation for Image Search Engines.- Estimation of the Hierarchical Structure of a Video Sequence Using MPEG-7 Descriptors and GCS.- Using Relevance Feedback to Learn Both the Distance Measure and the Query in Multimedia Databases.- Multi-level Semantic Analysis for Sports Video.- Aerial Photograph Image Retrieval Using the MPEG-7 Texture Descriptors.- Yet Another Induction Algorithm.- An Implementation of Learning Classifier Systems for Rule-Based Machine Learning.- Learning-by-Doing Through Metaphorical Simulation.- Immunity-Based Systems.- Emergence of Immune Memory and Tolerance in an Asymmetric Idiotype Network.- Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent.- A Network Self-repair by Spatial Strategies in Spatial Prisoner’s Dilemma.- A Critical Phenomenon in a Self-repair Network by Mutual Copying.- A Worm Filter Based on the Number of Unacknowledged Requests.- Comparison of Wavenet and Neuralnet for System Modeling.- Neurone Editor: Modelling of Neuronal Growth with Synapse Formation for Use in 3D Neurone Networks.- Medical Diagnosis.- A Hybrid Decision Tree – Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes Prediction.- Performance Comparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer Diagnosis.- Combining Machine Learned and Heuristic Rules Using GRDR for Detection of Honeycombing in HRCT Lung Images.- Automatic Detection of Breast Tumours from Ultrasound Images Using the Modified Seed Based Region Growing Technique.- An Automatic Body ROI Determination for 3D Visualization of a Fetal Ultrasound Volume.- Swarm Intelligence and the Holonic Paradigm: A Promising Symbiosis for a Medical Diagnostic System.- Analysis Between Lifestyle, Family Medical History and Medical Abnormalities Using Data Mining Method – Association Rule Analysis.- Intelligent Hybrid Systems and Control.- A Moving-Mass Control System for Spinning Vehicle Based on Neural Networks and Genetic Algorithm.- Two-Dimensional Fitting of Brightness Profiles in Galaxy Images with a Hybrid Algorithm.- A Hybrid Tabu Search Based Clustering Algorithm.- Neural Network Based Feedback Scheduling of Multitasking Control Systems.- An HILS and RCP Based Inter-working Scheme for Computational Evaluation of Manipulators and Trajectory Controller.- Modeling of Nonlinear Static System Via Neural Network Based Intelligent Technology.- Bayesian Inference Driven Behavior Network Architecture for Avoiding Moving Obstacles.- Loss Minimization Control of Induction Motor Using GA-PSO.- Emotional Intelligence and Smart Systems.- Context-Restricted, Role-Oriented Emotion Knowledge Acquisition and Representation.- User Preference Learning for Multimedia Personalization in Pervasive Computing Environment.- Emotion-Based Smart Recruitment System.- Evolvable Recommendation System in the Portable Device Based on the Emotion Awareness.- Emotional Extraction System by Using the Color Combination.- Research on Individual Recognition System with Writing Pressure Based on Customized Neuro-template with Gaussian Function.- Context-Aware Evolvable Systems.- Context-Aware Evolvable System Framework for Environment Identifying Systems.- Context-Aware Computing Based Adaptable Heart Diseases Diagnosis Algorithm.- Multiple Sensor Fusion and Motion Control of Snake Robot Based on Soft-Computing.- Human Face Detection Using Skin Color Context Awareness and Context-Based Bayesian Classifiers.- Adaptive Gabor Wavelet for Efficient Object Recognition.- An Evolvable Hardware System Under Uneven Environment.- An Efficient Face Location Using Integrated Feature Space.- Intelligant Fuzzy Systems and Control.- Fuzzy Predictive Preferential Dropping for Active Queue Management.- A Fuzzy Method for Measuring Efficiency Under Fuzzy Environment.- Anytime Iterative Optimal Control Using Fuzzy Feedback Scheduler.- A Coupled Fuzzy Logic Control for Routers’ Queue Management over TCP/AQM Networks.- Iris Pattern Recognition Using Fuzzy LDA Method.- Precision Tracking Based-on Fuzzy Reasoning Segmentation in Cluttered Image Sequences.- Fuzzy Lowpass Filtering.- Fuzzy Logic Based Intelligent Tool for Databases.- Knowledge Representation and Its Practical Application in Today’s Society.- Modelling from Knowledge Versus Modelling from Rules Using UML.- Meeting the Need for Knowledge Management in Schools with Knowledge-Based Systems – A Case Study.- Aspects of Consideration When Designing Educational Knowledge Based Hypermedia Systems.- Semantic Tags: Evaluating the Functioning of Rules in a Knowledge Based System.- Knowledge Management for Robot Activities in a Real World Context. A Case for Task Pattern Analysis (TAPAS).- Temporal Knowledge Representation and Reasoning Model for Temporally Rich Domains.- Reciprocal Logic: Logics for Specifying, Verifying, and Reasoning About Reciprocal Relationships.- Approaches and Methods into Security Engineering III.- A New Paradigm Vertical Handoff Algorithm in CDMA-WLAN Integrated Networks.- Efficient Revocation of Security Capability in Certificateless Public Key Cryptography.- A Study on Privacy-Related Considerations in Ubiquitous Computing Environment.- Optimal Operation for Cogenerating System of Micro-grid Network.- An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment.- Pilot-Symbol Aided SFBC-OFDM Channel Estimation for Intelligent Multimedia Service.- Cryptographic Prool Design Concept with Genetic Algorithms.- An Efficient Backoff Scheme for IEEE 802.11e EDCF Differential Service.- Communicative Intelligent I.- Some Properties of Grounding Modal Conjunctions in Artificial Cognitive Agents.- Multi-agent System for Web Advertising.- A Mobile Agent Approach to Intrusion Detection in Network Systems.- Non-textual Document Ranking Using Crawler Information and Web Usage Mining.- A Propagation Strategy Implemented in Communicative Environment.- Using Recommendation to Improve Negotiations in Agent-Based Systems.- Fault Diagnosis of Discrete Event Systems Using Place Invariants.- Intelligent Watermaking Algorithms and Applications.- A Robust-Fragile Dual Watermarking System in the DCT Domain.- A Data Hiding Scheme to Reconstruct Missing Blocks for JPEG Image Transmission.- Adaptive Selection of Coefficient’s Portions in the Transform Domain Watermarking.- Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme.- Image Retrieval Based on a Multipurpose Watermarking Scheme.- Compressed Domain Video Watermarking in Motion Vector.- Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions.- A Lossless Watermarking Technique for Halftone Images.- Intelligent Techniques and Control.- Implementation of Current Mode Fuzzy-Tuning PI Control of Single Phase UPS Inverter Using DSP.- Knowledge-Based Fuzzy Control of Pilot-Scale SBR for Wastewater Treatment.- Finely Tuned Cascaded Fuzzy Controllers with VHDL – A Case Study for Linerization of V-I Characteristics of a Convertor.- Control System for Optimal Flight Trajectories for Terrain Collision Avoidance.- Optimal Remediation Design in Groundwater Systems by Intelligent Techniques.- Choquet Integral-Based Decision Making Approach for Robot Selection.- Fuzzy Logic and Neuro-fuzzy Modelling of Diesel Spray Penetration.- e-Learning and ICT.- Integrating Architecture of Digital Library and e-Learning Based on Intelligent Agent.- A Pedagogical Overview on e-Learning.- Modeling Understanding Level of Learner in Collaborative Learning Using Bayesian Network.- Dynamic Generation of Diagrams for Supporting Solving Process of Mathematical Exercises.- MOLEAS: Information Technology-Based Educational Software Framework.- A Web-Based Information Communication Ethics Education System for the Gifted Elementary School Students in Computer.- Design of a Web Based Lab Administration System.- Experiences with Pair and Tri Programming in a Second Level Course.- Logic Based Intelligent Information Systems.- An Intelligent Safety Verification Based on a Paraconsistent Logic Program.- Paraconsistent Artificial Neural Network: An Application in Cephalometric Analysis.- Non-alethic Reasoning in Distributed Systems.- A Connectionist Model for Predicate Logic Reasoning Using Coarse-Coded Distributed Representations.- A General-Purpose Forward Deduction Engine for Modal Logics.- A Deductive Semantic Brokering System.- Uncertainty Management in Logic Programming: Simple and Effective Top-Down Query Answering.- Specifying Distributed Authorization with Delegation Using Logic Programming.- Intelligent Agents and Their Applications I.- The Design and Implementation of SAMIR.- Intelligent Data Analysis, Decision Making and Modelling Adaptive Financial Systems Using Hierarchical Neural Networks.- Electricity Load Prediction Using Hierarchical Fuzzy Logic Systems.- MEDADVIS: A Medical Advisory System.- Towards Adaptive Clustering in Self-monitoring Multi-agent Networks.- Shared Learning Vector Quantization in a New Agent Architecture for Intelligent Deliberation.- Patterns for Agent Oriented e-Bidding Practices.- Innovations in Intelligent Agents.- Innovations in Intelligent Agents.- Multi-agent Systems: New Directions.- Agent Technology for Coordinating UAV Target Tracking.- Cognitive Hybrid Reasoning Intelligent Agent System.- Beyond Trust: A Belief-Desire-Intention Model of Confidence in an Agent’s Intentions.- Reasoning About Time in a BDI Architecture.- A Delegation Model for Designing Collaborative Multi-agent Systems.- Ontologies and the Semantic Web.- An Interactive Visual Model for Web Ontologies.- RDF-Based Ontology View for Relational Schema Mediation in Semantic Web.- Essentialized Conceptual Structures in Ontology Modeling.- Turning Mass Media to Your Media: Intelligent Search with Customized Results.- Improving Search on WWW.HR Web Directory by Introducing Ontologies.- Designing a Tool for Configuring an Intelligent and Flexible Web-Based System.- Location-Sensitive Tour Guide Services Using the Semantic Web.- Semantic Discovery of Web Services.- Knowledge Discovery in Data Streams.- Making Sense of Ubiquitous Data Streams – A Fuzzy Logic Approach.-—-SCLOPE: Clustering Categorical Streams Using Attribute Selection.- Extraction of Gene/Protein Interaction from Text Documents with Relation Kernel.- Combining an Order-Semisensitive Text Similarity and Closest Fit Approach to Textual Missing Values in Knowledge Discovery.- Support for Internet-Based Commonsense Processing – Causal Knowledge Discovery Using Japanese “If” Forms.- APForecast: An Adaptive Forecasting Method for Data Streams.- Finding Closed Itemsets in Data Streams.- Computational Intelligence Tools Techniques and Algorithms.- An Efficient Schema Matching Algorithm.- A Divisive Ordering Algorithm for Mapping Categorical Data to Numeric Data.- A Mutual Influence Algorithm for Multiple Concurrent Negotiations – A Game Theoretical Analysis.- Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition.- Algorithms for CTL System Modification.- A Robust Approach for Improving Computational Efficiency of Order-Picking Problems.- An Efficient MDS Algorithm for the Analysis of Massive Document Collections.- Approaches and Methods to Security Engineering IV.- (SE-33)Intelligent ID-Based Threshold System by an Encryption and Decryption from Bilinear Pairing.- Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization.- A Study on the Centralized Database of the Multi-agents Based Integrated Security Management System for Managing Heterogeneous Firewalls.- Adaptive Modulation and Coding Scheme for Wireless Mobile Communication System.- Performance Analysis of a Antenna Array System Using a New Beamforming Algorithm in the CDMA2000 1X Wireless Communication.- Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL.- Design and Implementation of SMS Security System for Wireless Environment.- Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim’s Block Model.- Watermaking Applications I.- Print and Generation Copy Image Watermarking Based on Spread Spectrum Technique.- Audio CoFIP (Contents Fingerprinting) Robust Against Collusion Attack.- A Low Cost and Efficient Sign Language Video Transmission System.- A New Watermark Surviving After Re-shooting the Images Displayed on a Screen.- Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform.- Shadow Watermark Extraction System.- Development of Nearly Lossless Embedding Technology of Contactless Sensible Watermarks for Audio Signals.- SVG-Based Countermeasure to Geometric Attack.- Watermaking Applications II.- Watermarking Prool Compatible with Secret Algorithms for Resisting Invertibility Attack.- System Architecture Analysis of a Hybrid Watermarking Method.- Audio Secret Sharing for 1-Bit Audio.- Watermarking with Association Rules Alignment.- A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression.- Improved Method of Spread Spectrum Watermarking Techniques Using Pixel-Correlations.- Apply Semi-fragile Watermarking to Authentication of Compressed Video Data.- Multimedia Retrieval I.- An Approach of Multi-level Semantics Abstraction.- Effective Video Scene Detection Approach Based on Cinematic Rules.- 3-DWT Based Motion Suppression for Video Shot Boundary Detection.- Neural Network Based Image Retrieval with Multiple Instance Leaning Techniques.- Shot Type Classification in Sports Video Using Fuzzy Information Granular.- Method for Searching Similar Images Using Quality Index Measurement.- Edge Projection-Based Image Registration.- Automated Information Mining on Multimedia TV News Archives.- Soft Computing Approach to Industrial Engineering.- An Emergency Model of Home Network Environment Based on Genetic Algorithm.- A Distributed Backup Agent Based on Grid Computing Architecture.- A Dynamic Supervising Model Based on Grid Environment.- An Intelligent Extracting Web Content Agent on the Internet.- A Rendering System for Image Extraction from Music and Dance.- Trend of Fuzzy Multivariant Analysis in Management Engineering.- Kansei Engineering for Comfortable Space Management.- Experience Management and Information Systems.- Fuzzy Logic Experience Model in Human Resource Management.- Development of Business Rule Engine and Builder for Manufacture Process Productivity.- Automatic Detection of Failure Patterns Using Data Mining.- Logic Frameworks for Components Integration Process.- Automatic Classification Using Decision Tree and Support Vector Machine.- Opportunity Tree Framework Design for Quality and Delivery of Software Product.- Breeding Value Classification in Manchego Sheep: A Study of Attribute Selection and Construction.- Learning Method for Automatic Acquisition of Translation Knowledge.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)