๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings,

โœ Scribed by Rajiv Khosla, Robert J. Howlett, Lakhmi C. Jain


Publisher
Springer
Year
2005
Tongue
English
Leaves
1472
Series
Lecture Notes in Artificial Intelligence 3683
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005.

The 716 revised papers presented were carefully reviewed and selected from nearly 1400 submissions. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense.

The third volume is organized in topical sections on intelligent agent ontologies and environments, intelligent multimedia solutions and the security in the next generation mobile networks, intelligent email analysis, news extraction and web mining, semantic integration and ontologies, computer vision, image processing and retrieval, communicative intelligence, approaches and methods to security engineering, multimedia retrieval, multimedia compression, multimedia signal processing, emergence and self-organisation in complex systems, soft computing techniques and their applications, information engineering and ubiquitous computing, location and context-based systems, e-based systems in education, commerce and health, computational biology and bioinformatics, complex adaptive systems, speech processing and robotics, data mining and soft computing applications, multimedia security and stegnography, stegnography, soft computing approach to industrial engineering, medical text mining and natural language processing, knowledge based intelligent systems for health care, intelligent learning environment, and intelligent data analysis and applications.

โœฆ Table of Contents


Title......Page 1
Preface......Page 4
KES 2005 Conference Organization......Page 6
International Program Committee......Page 8
Invited Session Chairs Committee......Page 10
IIHMSPWorkshop Organization Committee......Page 12
IIHMSPWorkshop Technical Committee......Page 14
KES 2005 Reviewers......Page 15
KES 2005 Keynote Speakers......Page 21
Table of Contents, Part III......Page 22
Table of Contents, Part IV......Page 37
Table of Contents, Part I......Page 47
Table of Contents, Part II......Page 62
1 Introduction......Page 77
2 Scenario and Ontology Definition......Page 78
3.1 Process Algebra as Interaction Model......Page 79
3.2 Negotiation Mechanisms......Page 80
3.3 Agent Interaction......Page 81
4 Strategy Profile in VO......Page 82
References......Page 83
1 Introduction......Page 84
2 A New Approach for Modeling Collaborative Agents......Page 86
3 Modeling Collaborative Agents......Page 87
4 Application Scenario of the Proposed Approach......Page 89
References......Page 90
1 Introduction......Page 92
3 Reinforcement in Environment with Distributed Agents......Page 93
4 Route Selection Model Based on Intelligent Agents......Page 95
5 Results......Page 96
References......Page 98
1 Introduction......Page 99
2 Delegation......Page 100
3 Payoff: ${ \nu_{i} }$......Page 101
4 Rank: ${P(X_{i}\gg)}$......Page 102
5 Strategy: ${P_{i} }$......Page 104
References......Page 105
1 Introduction......Page 106
2 The Agent Model......Page 107
3 The Learning Model......Page 108
4 Discussion......Page 111
References......Page 112
1 Introduction......Page 113
3 Data-Intensive Web Sites (DIWS)......Page 114
5.1 Data Integration......Page 115
5.3.1 Distribution......Page 116
5.3.2 Caching......Page 117
References......Page 118
1 Introduction......Page 122
2 Object Oriented Probabilistic Relational Models......Page 124
3.1 PRM Inferencing Techniques......Page 125
3.2 OPRM Inferencing Techniques......Page 126
3.3 Comparison......Page 127
References......Page 128
1 Introduction......Page 130
2.1 Overview of ARP......Page 131
2.2 Mechanism of ARP Cache......Page 132
3 Network Service Access Control Framework......Page 133
3.1 Overall Architecture......Page 134
3.2 Network Blocking Algorithm......Page 135
4 Conclusions......Page 136
References......Page 137
1 Introduction......Page 138
2.1 Background Discriminant Transformation (BDT)......Page 139
3 3-D Building Reconstruction......Page 140
4 Experiments and Results......Page 141
5 Conclusions......Page 143
References......Page 144
1 Introduction......Page 145
3 Characteristics of Field Data......Page 146
4 Algorithm......Page 147
5 Concluding Remarks......Page 148
References......Page 149
1 Introduction......Page 150
3.1 System Model......Page 151
3.2 Algorism for Identifying Users......Page 152
4 Experimental Evaluation......Page 154
References......Page 156
2 Literature Review......Page 157
3.1 Determination of Optimal Locations for VMS's......Page 158
3.2 Optimal Number of VMS's......Page 159
4.3 Traffic Volume Conversion......Page 160
4.5 Locations and Numbers of VMS's......Page 161
References......Page 162
1 Introduction......Page 163
2.2 Clustering Algorithm......Page 165
2.3 Radio Energy Consumption Model......Page 166
3 Estimation of the Optimal Number of Cluster-Heads......Page 167
4 A Simulation Study......Page 168
5 Conclusion......Page 169
References......Page 170
1 Introduction......Page 171
4 Contents of Event......Page 172
5.2 Data Processing......Page 173
6.2 Types of Traffic Information......Page 174
7 Conclusion......Page 175
References......Page 176
2 Related Work......Page 177
3 Proposed Migration Model......Page 178
4 Implementation......Page 180
References......Page 182
2 Related Work......Page 183
3.2 Clustering User Groups Using the Access Path Similarity......Page 184
4 Example......Page 185
5 Conclusions......Page 186
References......Page 187
1 Introduction......Page 188
3 Data Collection......Page 189
3.2 Scanning of the News Articles by NewsAglet......Page 190
4 Insight Classification Scheme......Page 191
5 Experimental Results......Page 192
6 Conclusion and Future Work......Page 194
References......Page 195
1 Introduction......Page 197
2 Web Data Acquisition......Page 198
3 An Incremental FP-Growth Algorithm......Page 199
5 Application......Page 201
6 Conclusion......Page 202
References......Page 203
1 Introduction......Page 204
2.1 Similarity Measure......Page 205
2.1.2 Neural Weight Generator......Page 206
2.1.3 Time-Series Measure Function......Page 207
3 Experimental Results and Analysis......Page 208
4 Conclusion and Future Works......Page 209
References......Page 210
1 Introduction......Page 211
3.1 Term Frequency Measurement......Page 212
3.2.3 Mapping Keyword-Pairs to Concept Hierarchy......Page 213
4 Mining Fuzzy Association Rule for Predictive Cases Selection......Page 214
References......Page 215
1 Introduction......Page 217
2.1.1 Single Classifier Approach......Page 218
2.2.4 Overall Comparisons......Page 219
3.2 Mutual Information for Feature Grouping......Page 220
4 Experimental Results......Page 221
Reference......Page 223
2 Related Work......Page 225
3.2 Web Spider......Page 226
3.3 News Extraction......Page 228
3.4.2 Sentence Weighting......Page 230
5 Conclusion......Page 231
References......Page 232
2 Related Works......Page 233
3 Procedures to Integrate MPEG-7 MDS and TV-AnyTime Metadata......Page 234
4 SM Ontology......Page 235
5.1 Application Layer......Page 236
5.2 Mediation Layer......Page 237
References......Page 238
1 Background and Motivation......Page 239
2 Related Works......Page 240
3 Comparisons of Information Models......Page 241
4 Mapping Information Models and System Architecture......Page 243
References......Page 245
1 Introduction......Page 246
2 Hybrid Keyword Search......Page 247
2.1 Case Study: Hybrid Paper Search......Page 248
3 Data Integration Hub for Hybrid Search......Page 249
References......Page 252
1 Introduction......Page 253
2 Related Research......Page 254
3 Suggested Method for Ontology Mapping......Page 255
4 Simulation and Result......Page 256
5 Conclusion......Page 258
References......Page 259
1 Introduction......Page 260
3.1.1 Searching and Classifying Instances......Page 261
3.2.3 Construction of the Ontologies......Page 262
3.3 The Semantic Adaptation Module......Page 263
3.5 Design Review Walkthrough Module......Page 264
4 Case Study . A Chemical Plant, Statistics and Results......Page 265
References......Page 266
1 Introduction......Page 267
2.2 Using Contextual Ontologies Within EIS......Page 268
3.1 EISCO Architecture......Page 269
3.1.2 EISCO Core Service......Page 270
3.1.2.2 Applications Integrator......Page 271
3.2 Scenarios of Use......Page 272
3.3 Implementation of EISCO Project......Page 273
References......Page 274
1 Introduction......Page 275
2 A Framework of Mapping Fuzzy Concept......Page 276
3 An Algorithm for the Simplified Least Upper Bounds......Page 277
References......Page 281
1 Introduction......Page 282
2 Modal Analysis......Page 283
3 Shape Similarity Estimation Using Modal Strain Energy......Page 284
4 Results and Discussion......Page 286
References......Page 287
1 Introduction......Page 289
2 Matching Algorithm......Page 290
4 Experimental Results......Page 291
References......Page 294
1 Introduction......Page 295
2 Head Image Tracking......Page 296
3 Stereo Vision for 3-D Pose Information of the Car Occupant......Page 297
4.1 Database and Behavior Patterns......Page 298
4.2 Experiments and Result......Page 299
References......Page 300
1 Introduction......Page 301
2 Multiple Classifications......Page 303
3.1 Pure-Face Formation......Page 304
3.2 Principle Component Analysis (PCA)......Page 305
3.3 Experimental Results......Page 306
References......Page 307
1 Introduction......Page 309
3 ICP-Based Normalization for Shape Comparison......Page 310
5 Experimental Results......Page 312
6 Conclusions and Future Works......Page 314
References......Page 315
1 Introduction......Page 316
2.1 Binary Classification......Page 317
2.2 Dimensionality Condensation......Page 318
3.1 Similarity Compensation......Page 319
3.2 Search Using Condensed Feature Vectors......Page 320
4 Experimental Results......Page 321
5 Conclusion......Page 322
References......Page 323
1 Introduction......Page 324
2.1 Supervised Clustering Method......Page 325
2.2 Detection of Semantic Training Sites Algorithm......Page 326
2.3 Semantic Supervised Clustering (SSC) Algorithm......Page 327
4 Conclusions......Page 328
References......Page 330
2 OWL-QL Query Language......Page 331
3 Query-Answering Web Service......Page 333
4 Conclusions......Page 335
References......Page 336
1 Introduction......Page 337
2 Related Work......Page 338
3 Centralized and Distributed Server Response Shaping......Page 339
5 Evaluation......Page 340
6 Conclusions......Page 342
References......Page 343
1 Introduction......Page 344
2 Problem Characterization......Page 345
3 An Example: Creating a Performance Prediction Model......Page 347
References......Page 349
2 Biological Information Resources......Page 351
3 Integrating Web Services into Agents......Page 352
4 Protein Structural Information System......Page 354
5 Conclusions......Page 356
References......Page 357
1 Introduction......Page 358
3 Learning in the BDI Framework......Page 359
4.1 Discussion......Page 362
5 Related Work......Page 363
References......Page 364
1 Introduction......Page 365
2.1 Opening Communication Situation......Page 366
2.5 Transition of Communication Situations......Page 367
3.1 The Upper Layer......Page 368
4 Implementation......Page 369
5 Conclusion and Discussion......Page 370
References......Page 371
2 Conversation Quantization......Page 372
3 Nature of Conversation Quanta......Page 373
3.1 ANALYSIS 1 (Video A)......Page 374
3.2 ANALYSIS 2 (Video B)......Page 376
5 Conclusion......Page 377
References......Page 378
2 Related Work......Page 379
3 Overview of Proposed Packet Marking Scheme......Page 380
5 Simulation Results and Evaluation......Page 382
6 Conclusion and Future works......Page 384
References......Page 385
1 Introduction......Page 386
2.1 Applicability of Intelligent Control Scheme for Covert Channel-Freeness......Page 387
2.2 Covert Channel-Free Validation Phase Algorithm in MLS/OCC......Page 388
3.2 Orange Locking......Page 389
4.2 Experiment 2: Effect of Write Ratio......Page 390
5 Conclusions......Page 391
References......Page 392
1 Introduction......Page 393
2 New Protocol......Page 394
3 Security and Efficiency Analysis......Page 395
4.2 Security and Efficiency Analysis......Page 397
References......Page 399
1 Introduction......Page 401
2 Related Works......Page 402
3.2 Signature Confirmation Protocol......Page 403
4 Security Analysis......Page 404
5 Discussion......Page 406
References......Page 407
1 Introduction......Page 408
Registration Phase......Page 409
3 Impersonation Attack on the Lin-Lai Scheme......Page 410
Login Phase......Page 411
5 Security Analysis......Page 412
6 Efficiency Analysis......Page 413
References......Page 414
1 Introduction......Page 415
3.1 Gun Process......Page 416
3.2 Mathematical Description, X-Process......Page 417
5 Performance Evaluations......Page 419
6 Conclusions......Page 420
References......Page 421
2 The Proposed Segmentation Algorithm......Page 422
Histogram Analysis......Page 423
Pixel Classification......Page 424
2.3 Region Classification......Page 425
2.5 Background Updating......Page 426
4 Conclusion......Page 427
References......Page 428
2.1 Gabor Transform Based Features......Page 429
2.2 Discrete Wavelet Frame Transform (DWFT)......Page 430
3 Experiments and Results......Page 431
References......Page 433
1 Introduction......Page 435
2.1 Detecting Moving Blobs in MPEG Bitstreams......Page 436
2.3 Characterizing Temporal Variations of MVMB Moments......Page 437
3.2 Performance Evaluation......Page 439
References......Page 440
1 Introduction......Page 442
2 Wavelet Edge Detector......Page 443
3 Concepts of Maximum Entropy Processing......Page 444
4.1 Medical Image Experiment 1......Page 445
4.2 Medical Image Experiment 2......Page 447
4.3 Medical Image Experiment 3......Page 448
References......Page 449
1 Introduction......Page 450
2 Fingerprint Retrieval......Page 451
3 Implementation of Fingerprint Retrieval......Page 453
4 Experimental Results......Page 455
References......Page 456
1 Introduction......Page 457
3 Local Motion Extraction......Page 458
4 Regions of Interest......Page 459
5 Matching Procedures......Page 460
6 Experimental Results......Page 461
7 Conclusions......Page 462
References......Page 463
2 Information Theoretic Metrics......Page 464
2.1.2 Joint Entropy......Page 465
2.1.5 Divergence......Page 466
2.2.2 Illumination Variation......Page 467
3 Experimental Results......Page 468
4 Conclusions......Page 469
References......Page 470
1 Introduction......Page 471
2 Requirements of Forensic Image Mining......Page 473
4 Detection of Component-Based Objects and Scenes......Page 474
4.1 Performance Results......Page 476
5 Grammar-Based Specification, Querying and Feedback......Page 477
6 Conclusion and Future Work......Page 478
References......Page 479
2.1 Predictive Vector Quantization......Page 481
3.1 Distortion Controlled SMPVQ (DCSMPVQ)......Page 482
3.2 Fast SMPVQ (FSMPVQ)......Page 483
4 Simulation Results......Page 485
References......Page 486
1 Introduction......Page 487
2.1 Basics of VQ......Page 488
2.3 Backgrounds for Side-Match VQ (SMVQ)......Page 489
3 Proposed Algorithm with CVQ and SMVQ......Page 490
4 Simulation Results......Page 491
References......Page 493
1 Introduction......Page 494
2.1 Continuous Tracking Diamond Search (CTDS)......Page 495
2.2 Multiple Reference Frame Selection (MRFS)......Page 496
2.3 Fast Motion Estimation on Variable Block Size Modes......Page 497
3 Experimental Results......Page 498
References......Page 499
1 Introduction......Page 501
2.1 Standstill Determination......Page 502
2.2 Homogeneity Determination......Page 503
4 Experimental Results......Page 504
References......Page 507
1 Introduction......Page 509
2.1 Encoding an MB by Different Block Partition and Directional Prediction......Page 511
3.1 Statistics of Mode Partitions in Test Video Sequences......Page 512
3.3 Proposed Algorithm......Page 513
5 Conclusions......Page 515
References......Page 516
1 Introduction......Page 518
2.2 Discrete Cosine Transform (DCT) and Zigzag Scan Ordering......Page 519
3.1 Coefficient Adjustment Block......Page 520
3.2 Adjustment Bit Map......Page 521
5 Conclusions......Page 522
References......Page 523
2 Power Reduction......Page 525
3 Implementation......Page 526
4 System Level Control Method......Page 528
5 Simulation Results......Page 529
6 Conclusion......Page 530
References......Page 531
1 Introduction......Page 532
3.1 Stroke Paths and Widths Generation......Page 533
3.2 Brush-Strokes in Chinese Painting Style......Page 534
5 Experimental Results......Page 536
References......Page 537
1 Introduction......Page 539
2 The Proposed Scheme Index-LOCO-I......Page 540
2.1 Index LOCO-I (I-LOCO-I) Data Hiding Scheme......Page 541
3 Simulation Result and Performance Analysis......Page 542
References......Page 543
2 Related Work......Page 545
3.1 Initial Parameterization......Page 546
Partitioning.......Page 547
Finding a partitioning path in uv domain.......Page 548
5 Conclusion......Page 549
References......Page 550
2 Description of Distributed Multimedia System......Page 552
3.1 Model of Communication Network......Page 553
3.3 Scheduling of Multimedia Data over Communication Network......Page 554
4 Multimedia Data Scheduling Algorithms......Page 555
5 Performance Evaluation......Page 556
6 Conclusion......Page 557
References......Page 558
2 Signal Pulse......Page 559
3 Joint Detection Algorithm......Page 561
4 Simulation Results......Page 562
References......Page 563
1 Introduction......Page 564
Register Phrase......Page 565
2.2 Security Analysis with Respect to SDPA......Page 566
3 Identity Based Cryptosystem......Page 567
4.1 Divisible Electronic Payment Scheme......Page 569
4.2 Security and Efficiency Analysis......Page 570
References......Page 571
1 Introduction......Page 573
2 Basic Embedding and Decoding Scheme......Page 574
3 Decoding Performance Analysis......Page 575
Amplitude Scaling.......Page 576
5 Watermark Detection and Content Authentication......Page 577
6 Conclusion and Future Work......Page 579
References......Page 580
1 Introduction......Page 581
3 Fractal, Percolation and Brownian Dynamics Models......Page 582
3.1 Fractal Geometry and Percolation......Page 583
3.2 Random Fractals and Brownian Dynamical Model......Page 584
4 Creating a Smart System......Page 585
4.1 Quantifying Smartness......Page 586
5 Conclusion......Page 587
References......Page 588
1 Introduction......Page 589
2.2 Flow of System......Page 590
2.3 Feature of Proposed Method......Page 591
3 Construction of Experimental Environment......Page 592
3.3 Index Calculation......Page 593
3.5 Experimental Results......Page 594
References......Page 595
1 Introduction......Page 596
3 Program Puzzle Creation......Page 597
3.2 Program Partition Points......Page 598
3.4 Chromosome Expression......Page 599
Fitness Function......Page 600
References......Page 601
1 Introduction......Page 602
2 Requirements for Waste Incinerators......Page 603
4 Dioxin Prediction with Software Agent......Page 604
5 Experiment Results of Single Agent......Page 606
7 Conclusion......Page 607
References......Page 608
2 Outline of the Surveillance System......Page 609
3.1 Reaction-Diffusion Equation on a Graph......Page 610
3.2 Cooperative Control Model for Decreasing Blind Spots in the Surveillance Area......Page 611
4 Simulation......Page 612
Simulation 1......Page 613
Simulation 2......Page 614
References......Page 615
1 Introduction......Page 616
2 Experiments and Results......Page 617
3 Conclusions......Page 620
References......Page 621
2 Higher Order Associative Memory of Sequential Patterns......Page 623
The Absolute Stability.......Page 625
The Conventional Capacity.......Page 626
The Absolute Stability.......Page 627
4 Conclusions......Page 628
References......Page 629
1 Introduction......Page 630
2.1 HEXQ and a Room Problem......Page 631
2.3 Graph-Based HEXQ......Page 632
2.3.1 Graph Partition of the State-Transition Diagrams......Page 633
2.3.2 Graph Comparison . Reuse of the Values......Page 634
3 Experimental Results......Page 635
4 Future Work and Conclusion......Page 636
References......Page 637
2 Reinforcement Learning Using Neural Networks......Page 638
2.2 Reinforcement Learning and Cascade Networks......Page 639
3.2 Adding Hidden Neurons......Page 640
4 Experimental Method......Page 641
5 Results and Discussion......Page 642
6 Conclusion and Future Work......Page 643
References......Page 644
2 Kohonen's Self-organizing Maps......Page 645
3 Node Exchange and the Measure of Learning......Page 646
3.2 The Measure of Learning......Page 647
4 Experiments......Page 648
4.2 Move Distance of Nodes......Page 649
References......Page 650
1 Introduction......Page 651
3.1 Basic Concepts......Page 652
3.2 Example 1......Page 653
4.1 Idea Induced from Example 1......Page 654
4.3 SARS Data Experiment and Results......Page 655
References......Page 656
1 Introduction......Page 657
2 Support Vector Machine [5]......Page 658
4 Experiment and Results......Page 660
References......Page 662
1 Introduction......Page 664
2 User Interface......Page 665
3 Recognition......Page 667
5 Conclusions and Future Work......Page 669
References......Page 670
1 Introduction......Page 671
2 Bayesian Techniques for MLPs......Page 672
3 MLPs for Mineral Potential Mapping......Page 673
4 Empirical Results......Page 674
References......Page 677
1 Introduction......Page 678
2.1 Basic Concept......Page 679
2.2 Integrated Modeling and Process Deployment......Page 680
2.3 Partner-Independent Collaboration Modeling......Page 681
3 Example Process......Page 682
4 Conclusion and Future Work......Page 683
References......Page 684
2 Previous Researches......Page 685
3.2 Maturity Model......Page 687
4 Verification of Evaluation Indices......Page 688
6 Conclusion......Page 690
References......Page 691
2 Previous Researches......Page 692
3.1 Key Features of Latest Robot Systems......Page 693
4 CSFs for HCI......Page 694
5 Conclusion......Page 695
References......Page 696
1 Introduction......Page 697
3.1 Framework......Page 698
3.2 Subordinate Process......Page 699
4 Conclusion......Page 702
References......Page 703
2 Privacy Definitions......Page 704
3 Control Points......Page 705
3.1 Control Point in Browser......Page 706
4 Security Implementation......Page 707
4.3 Security Implementation in Database......Page 708
References......Page 709
1 Introduction......Page 711
2.1 Metadata Retrieval and Transmission of User-Centric Metadata......Page 712
2.2 Universal Description Discovery and Integration......Page 713
3.1 Broadcasting Program Retrieval Using User Preference......Page 714
3.2 TV-Anytime Metadata Service Retrieval......Page 715
References......Page 717
1 Introduction......Page 718
Ports.......Page 719
2.2 Router Design......Page 720
3.1 Agent Structure......Page 721
3.2 Agent Implementation......Page 722
4 Conclusions......Page 723
References......Page 724
2 The Proposed Scheme......Page 725
3.1 IMT-2000 Mobility Model......Page 727
3.2 Numerical Analysis......Page 728
References......Page 730
1 Introduction......Page 731
3 The Proposed Semantic Web Services Discovery System......Page 732
4 Implementation......Page 734
5 Results......Page 735
6 Conclusion......Page 736
References......Page 737
1 Introduction......Page 738
2.2 Image Segmentation Based Binarization......Page 739
3.1 Face Candidate Regions......Page 740
3.3 Detection of Candidates of Eye and a Pair of Eyes......Page 741
3.4 Ranker......Page 742
3.5 Determination a Pair of Eyes......Page 743
4 Experiments and Conclusions......Page 744
References......Page 745
2.1 Ubiquitous Computing......Page 746
3.1 Introduction of System......Page 747
3.2 Design of RSC......Page 748
3.3 Design of RSS......Page 749
4 Implementation and Result of Experiment......Page 750
5 Conclusion......Page 751
References......Page 752
2 Representation of Transportation Information......Page 753
3 Management of Multi-level Road Networks......Page 755
4 Integrated Representation of Multi-level Transportation Networks......Page 757
5 Spatial Search and Path Search......Page 758
References......Page 759
1 Introduction......Page 760
2.1 Basic Model......Page 761
2.2 Alignment......Page 762
3.1 Feature Extraction......Page 763
3.3 Index Construction......Page 764
4.2 Index Searching......Page 765
4.4 Post-processing......Page 766
5.2 Experiment Results......Page 767
6 Conclusions......Page 768
References......Page 769
1 Introduction......Page 770
2 Caption: Useful Data for Video Retrieval......Page 771
3.1 Overview of Korean Stenographic System......Page 772
3.2 Time-Alignment......Page 773
4 Automatic Indexing Scheme......Page 774
4.2 Keyword Extraction......Page 775
4.3 Extraction of Color Feature in Representative Frame......Page 776
5.2 Advanced Search......Page 777
6 Conclusion......Page 778
References......Page 779
1 Introduction......Page 780
2.2 Classification of Articles Using Reporter Post Database......Page 781
3 Skimming......Page 782
3.1 Extraction of Representative Frame......Page 783
4 Experimental Results......Page 786
References......Page 788
1 Introduction......Page 789
2.2 Intelligent Tutoring System (ITS)......Page 790
3.2 System Architecture......Page 791
4 Implementation of System......Page 793
5 Evaluation of System......Page 794
References......Page 795
1 Introduction......Page 797
3.1 The Need for Timely Collaboration......Page 798
3.2 Timely Collaboration by ECA Rule Paradigm......Page 799
4 ECA Rule Programming......Page 800
5 Intelligent Active Functionality Component......Page 801
References......Page 803
1 Introduction......Page 804
3 Communication Method Among Agents......Page 805
4 Algorithm and Simulation......Page 806
4.2 Algorithm......Page 807
4.3 Simulation......Page 808
5 Conclusion......Page 809
References......Page 810
1 Introduction......Page 811
2 Goal-Based Service Provision Agent......Page 812
3.1.3 Service Part......Page 814
3.2.1 Service Composition Algorithm......Page 815
4 Conclusions and Future Works......Page 816
References......Page 817
2 Time Judgement System......Page 818
4.1 Concept Base [1][2]......Page 820
5.1 Substitution Processing of Words with the Highest Degree of Association......Page 821
5.2 Majority Decision Unknown-Word Processing with Secondary Threshold......Page 822
6 Evaluation of Time Judgement System......Page 823
References......Page 824
1 Introduction......Page 825
3 Related Work......Page 826
4.2 Web Interface......Page 827
5 System Architecture......Page 829
7 Conclusion and Future Work......Page 830
References......Page 831
1 Introduction......Page 832
2 Use of Technology on Education......Page 833
3 Development Shell......Page 835
4 The Prototype Teaching Package......Page 836
References......Page 837
1 Introduction......Page 839
2.2 Motif Representations......Page 840
2.5 Pruning of Search Space......Page 841
3 Results and Discussion......Page 842
4 Conclusion......Page 844
References......Page 845
1 Introduction......Page 846
2 Previous and Related Work......Page 847
3.1 Evaluation of Motifs......Page 848
4 Experiments and Results......Page 849
4.1 Hits and Near Misses......Page 850
References......Page 851
1 Introduction......Page 853
3 Bayesian Validation Method......Page 854
4 Experimental Results......Page 856
References......Page 859
1 Introduction......Page 861
2.1 Data Set Preparation......Page 862
Analysis of the Cleavage Sites: Sequence Logo and Decision Tree......Page 863
3 Experimental Results......Page 864
4 Conclusion......Page 865
References......Page 866
2.1 Transmembrane Region Prediction......Page 868
2.3 Problems with Previous Systems......Page 869
3.1 The SVMs Module......Page 870
4 Conclusion and Future Works......Page 872
References......Page 873
1 Introduction......Page 875
3 Kinetics of the Multi-agent System......Page 876
4 Simulation Examples......Page 877
5 Multi-agent Toolkits......Page 880
References......Page 881
2 Models of Social Dilemmas......Page 882
2.2 The Meta-norm Game......Page 884
3 Simulations and Results......Page 885
5 Closing Comments......Page 887
References......Page 888
1 Introduction......Page 889
3.1 Architecture......Page 890
3.3 Tactic Decision Making Mechanism......Page 891
3.5 Recovery......Page 892
4 Scenario Analysis......Page 893
5 Conclusion......Page 894
References......Page 895
1 Introduction......Page 896
2 Complex Adaptive Systems......Page 897
3 Analysis of the Case Study......Page 898
3.1 The Timetabling Commons: Neighbourhoods, Proximity and Interaction......Page 899
5 Conclusion......Page 901
References......Page 902
2 Related Work......Page 903
3 Superstring......Page 904
4.1 Coverage Equation......Page 905
4.2 Model Results......Page 906
5 Experimental Results......Page 907
References......Page 909
1 Introduction......Page 910
3.1 P-Timed Petri Net Based Adaptation Model......Page 911
3.3 Timing Control in P-Timed Petri Net Adaptation Model......Page 912
4.2 Link Adaptation......Page 913
4.3 Timing and Priority Adaptation......Page 914
References......Page 915
1.1 Background and Motivation......Page 917
2 Derivation of Concept Hierarchy from User Information Space......Page 918
2.1 System Architecture and User View Formulation......Page 919
3 Experiments with User View......Page 920
References......Page 923
1 Introduction......Page 924
2.2 Empathy Channel......Page 925
3 Data Analysis......Page 926
4.2 Shot Generation Module......Page 927
4.3 Gesture Generation Module......Page 928
5 Conclusion and Future Work......Page 929
References......Page 930
1 Introduction......Page 931
2 Weblog Data......Page 932
3 Finding Relations Between Weblog Data and Natural Phenomena Data......Page 933
4 Discussion......Page 934
5 Conclusion and Future Works......Page 935
References......Page 936
1 Introduction......Page 937
2 Immersible Globe Concept for Sustainable Memory System......Page 938
3 Sustainable Knowledge Globe (SKG)......Page 939
4 Contents Garden......Page 940
5 Discussion......Page 941
References......Page 942
1 Introduction......Page 944
2.2 Setting and Procedure......Page 945
Analyzing 243 Dialogs.......Page 946
Analyzing 81 Dialogs of Script Number 2.......Page 947
Analyzing 81 Dialogs in Script Number 3.......Page 948
3 Discussion and Conclusions......Page 949
References......Page 950
1 Introduction......Page 951
2.2 Key Location Control......Page 952
2.3 Conversational Locomotion Network......Page 953
3.2 Activation Functions......Page 954
4.1 Introduction......Page 955
4.2 The Generation of Node Coordinates in 3D Space......Page 956
5.2 Locomotion Conversation Based on Panorama Picture......Page 957
References......Page 958
1 Introduction......Page 959
2 Real-Time Human Proxy......Page 960
3.1 Behavior Model and Action Planning......Page 961
Importance of Action.......Page 962
Motion Generation.......Page 963
4 Conclusion......Page 964
References......Page 965
1 Introduction......Page 966
2 System Description......Page 968
3 Evaluation......Page 970
5 Conclusion......Page 972
References......Page 973
1 Introduction......Page 974
2.1 Artificial Vocal Cords and Its Pitch Control......Page 975
2.2 Construction of Resonance Tube and Nasal Cavity......Page 976
3.1 Adaptive Pitch Learning......Page 977
3.2.1 Information Memory Process......Page 978
3.2.3 Experiments for Vocalization Acquisition......Page 980
4 Singing Performance with Adaptive Control......Page 981
References......Page 982
1 Introduction......Page 984
2.1 Mechanism of Human Vocal Cords......Page 985
2.2 WT-4's Vocal Cords......Page 986
3.2 Vocal Cords Mechanism......Page 987
4 Experiment......Page 988
5 Conclusion and Future Work......Page 989
References......Page 990
2 Related Work......Page 991
3 Syllable Alignment Pattern Searching......Page 992
Alignment and Similarity Calculation.......Page 993
5.2 Experiment Results......Page 995
6 Conclusion......Page 996
References......Page 997
1 Object Recognition and Scene Interpretation......Page 998
2 Object Ontology......Page 999
3 Use of Ontology for Context Understanding......Page 1000
4 Ontology Document Management......Page 1001
5 Proposed Relational Data Schema......Page 1002
6 Experiments......Page 1003
7 Summary and Further Work......Page 1004
References......Page 1005
1 Intelligent Two-Way Speech Communication......Page 1006
2 Automatic Command Recognition and Verification......Page 1008
3 Research Results of Automatic Command Recognition......Page 1010
References......Page 1012
2.1 Related Works......Page 1013
3.1 Service Robot......Page 1014
3.2 Structure of Activity-Object Bayesian Network......Page 1015
4.1 Experimental Environments......Page 1017
4.2 Experiments Results......Page 1018
References......Page 1019
1 Introduction......Page 1021
2 Overview of Simultaneous-Localization-and-Spatial-Context-Recognition System......Page 1022
3.1 Detection of Harris Corners......Page 1023
3.2 Tracking of Corner Features......Page 1024
3.3 Robot Localization......Page 1025
4.1 Object Recognition......Page 1026
5 Conclusion......Page 1027
References......Page 1028
2 Event Detection Procedure......Page 1029
3 Power Boiler Case Study......Page 1030
References......Page 1033
2.1 Evolutionary Rule Induction Techniques......Page 1035
3 A Model for Evolutionary Multi-objective Classification......Page 1036
3.2 Fitness Evaluation and Selection......Page 1037
4 Simulations and Results......Page 1038
4.2 Results......Page 1039
5 Discussion and Conclusion......Page 1040
References......Page 1041
1 Associative Classifiers and Their Massive Model......Page 1042
2 Association Rules and Their Integration in Classifiers......Page 1043
3 Pruning Rules......Page 1044
4 Experimental Results and Performance Study......Page 1046
References......Page 1048
3 Hypothesis......Page 1050
4 Experimental Method......Page 1051
5 Results from the 11 Experiments......Page 1052
References......Page 1055
1 Introduction......Page 1057
2 Motor System Modeling......Page 1058
3.1 Genetic Algorithm......Page 1059
3.2 Identification of a Motor System......Page 1060
4 Experiment......Page 1061
5 Conclusion......Page 1062
References......Page 1063
1 Introduction......Page 1064
2.1 Simplification of Programs with the Same Operator Family......Page 1065
2.2 Tidy-up Rewriting of Genetic Programs......Page 1066
2.3 Simplification of Programs with Different Operator Family......Page 1067
3.1 Image Data Sets......Page 1068
Classification Accuracy.......Page 1070
5 Conclusions......Page 1071
References......Page 1072
1 Introduction......Page 1073
2 Ontology-Supported Database Refurbishing......Page 1074
Keyword Extraction......Page 1075
3 Data Mining Using PD with PH Algorithm......Page 1076
Rules of symptom to cause......Page 1077
Rules of cause to process......Page 1078
References......Page 1079
1 Introduction......Page 1081
2.2 Mandatory Access Control......Page 1082
3.1 Overview......Page 1083
3.3 Security Analysis of the Database System......Page 1084
4 Conclusions......Page 1085
References......Page 1086
1 Introduction......Page 1087
2 Inference Rules......Page 1088
3 Inference Detection Algorithm......Page 1089
4 Experimental Results and Analysis......Page 1091
References......Page 1093
1 Introduction......Page 1094
1.1 A User-Centred Approach......Page 1095
2.1 Media Types......Page 1097
2.3 A Hierarchical Peer-to-Peer Approach......Page 1098
3 Conclusion......Page 1099
References......Page 1100
1 Introduction......Page 1101
2 Steganalytic Method......Page 1102
3 Experiment and Discussion......Page 1105
References......Page 1107
1 Introduction......Page 1108
2 Side Match Vector Quantization......Page 1109
4.1 Pseudo-random Number Generators......Page 1110
4.2 Main Code Book Partitioning by Genetic Algorithms......Page 1111
5 Experiment Results......Page 1112
6 Conclusions......Page 1113
References......Page 1114
1 Introduction......Page 1115
2 Outline of the Proposed Technique......Page 1117
3.1 Secret Data......Page 1118
3.2.1 The Method to Make the Number of Characters per Line Correspond to Secret Data......Page 1119
3.2.2 The Method to Make New-Line Position in Morpheme Correspond to Secret Data......Page 1120
4 Implemenation and Evaluation......Page 1121
5 Discussion and Conclusion......Page 1123
References......Page 1124
1 Introduction......Page 1125
2.2 Attack Points......Page 1127
3 Hiding Biometric Data for Multimodal Biometric Systems......Page 1128
3.2 Hiding Fingerprint Features into Facial Images......Page 1129
4 Performance Evaluation......Page 1130
5 Conclusions......Page 1132
References......Page 1133
1 Introduction......Page 1134
2.1 Preprocessing of Codebook......Page 1135
2.2 Binary and Multi-way Search Schemes for Embedding the Secret Data......Page 1136
3 Experiments......Page 1138
References......Page 1139
1 Introduction......Page 1141
2 Mobile Agent Protection Issues and Related Work......Page 1142
3 Use of Opaque Predicates for Mobile Agents Obfuscation......Page 1143
4 Conclusion......Page 1146
References......Page 1147
1 Introduction......Page 1148
2.2 Analysis of FVS......Page 1149
3.1 Pedersen's Verifiable Secret Sharing Scheme......Page 1150
3.2 Locking and Unlocking Algorithms of VFVS......Page 1151
4 Conclusions......Page 1152
Appendix......Page 1153
1 Introduction......Page 1155
3 Related Works......Page 1156
4 The Covert Channels Based on FTP Command Mapping......Page 1157
5 The Covert Channels Based on FTP Command Sequence......Page 1158
5.2 Covert Channel Based on Hierarchical Sequence Length......Page 1159
References......Page 1161
1 Introduction......Page 1162
2 Digital Halftoning......Page 1163
3 Modified Halftoning Techniques for an Encoded Hologram......Page 1164
4 Hidden Data Recovery System......Page 1165
5 Conclusions......Page 1167
References......Page 1168
2 Embedding Scheme......Page 1169
3 Scan Input Image Estimation and Error Control Embedding Method......Page 1171
4 Rapid Realization Based on the Mathematic Morphology Filter Method......Page 1173
5 The Extract Procedure......Page 1174
6 Experimental Results......Page 1175
References......Page 1176
1 Introduction......Page 1177
2 Related Works......Page 1178
3.1 The Embedding Procedure......Page 1179
3.2 The Extraction Procedure......Page 1180
4 Experimental Results......Page 1181
References......Page 1183
1 Introduction......Page 1184
2.2 Coded Modulation Method......Page 1185
3.1 Anti-collusion Fingerprint Code and Embedding......Page 1186
4.1 Code Separation Experiments......Page 1187
4.2 Colluder Tracing Experiments on Video......Page 1188
5 Conclusions......Page 1189
References......Page 1190
1 Introduction......Page 1191
3 Framework of Human Meal Behavior......Page 1192
6 Test of Goodness of Fit......Page 1193
7 Agreement of Feelings......Page 1194
8 Classification of Menus......Page 1196
References......Page 1197
1 Introduction......Page 1198
2 Text Mining......Page 1199
2.1.3 Usage of Fuzzy Thesaurus......Page 1200
3.2 Data Mining from Web Data......Page 1201
4.1 Decision Making of Selecting Appropriate Books for a Library from the Results of Library Data......Page 1202
References......Page 1203
1 Introduction......Page 1205
2 Fuzzy Set Theory and Fuzzy Linear Programming......Page 1206
3.1 Problem Statement......Page 1208
Constraints......Page 1209
4 Case Studies......Page 1212
Results and Discussion......Page 1213
References......Page 1217
1 Introduction......Page 1219
2 Reduction and Solution of the Ranking Problem......Page 1220
3 Associated Probability Distributions......Page 1221
4 Maximum Likelihood Solution......Page 1223
5 Experimental Results......Page 1224
References......Page 1225
2 Directed Mutation Operators......Page 1227
3.2 Moments......Page 1228
4 NaiveSkew-Normal Mutation......Page 1229
4.2 Moments......Page 1230
6 Skew-Normal Mutation......Page 1231
6.2 Moments......Page 1232
7.2 Moments......Page 1233
9 Conclusions......Page 1234
References......Page 1235
1 Introduction......Page 1236
2 General Fuzzy Min-Max Classifier with Compensatory Neuron Architecture......Page 1237
3.1 Learning Algorithm......Page 1239
4 Results......Page 1240
B) Performance in Hybrid Mode......Page 1241
References......Page 1242
1 Introduction......Page 1244
3 Analysis on Accuracy of a BioHashing Based Cancelable Biometric......Page 1245
References......Page 1247
1 Introduction......Page 1249
2 Benefits to the Company......Page 1250
4.1 The Rationale for Condition Monitoring......Page 1251
4.3 A Strategy for Intelligent Condition Monitoring......Page 1252
4.4 Lasing Module Tests Using a Neural Network......Page 1253
5 Conclusion......Page 1254
References......Page 1255
1 Introduction......Page 1256
2 Lexeme Extraction from Texts for a Lexicon Construction......Page 1257
3 Instantiated Conceptual Schemas Acquisition......Page 1259
4 Document Annotation from Conceptual Schemas......Page 1260
References......Page 1261
1 Introduction......Page 1263
2 Background and Overview......Page 1264
3.1 From Semantic Sets to Semantic Queues......Page 1265
5.1 Decoder 1......Page 1266
6 Related Work......Page 1268
References......Page 1269
1 Introduction......Page 1271
2 Materials......Page 1272
4 Empirical Results......Page 1273
5 Related Work......Page 1274
6 Discussion......Page 1275
7 Conclusion and Future Work......Page 1276
References......Page 1277
1 Introduction......Page 1280
2.1 Cardiovascular System Model......Page 1281
2.2 Exercise Control Model......Page 1283
3 Results......Page 1284
References......Page 1285
1 Introduction......Page 1286
2 An Interactive Virtual Workbench for Collaboration......Page 1287
3.1 Interactive Deformation of Soft Tissues......Page 1289
3.2 Motion Simulation of Dynamic Organs......Page 1290
4 Results and Conclusions......Page 1292
References......Page 1293
1 Introduction......Page 1294
2 Automatically Defined Groups......Page 1295
3.1 Coronary Heart Disease Database......Page 1296
3.2 How to Apply ADG to Extraction of Risk Factors......Page 1297
4 Results......Page 1299
References......Page 1300
1 Introduction......Page 1301
2 Association Classification for Unbalanced Classes......Page 1302
3 Data Preparation and Feature Selection......Page 1303
4 Representing Association Classification Rules......Page 1304
5 Conclusion......Page 1306
References......Page 1307
1 Introduction......Page 1308
2 Leximancer Concept Mapping Tool......Page 1309
3 Applying Leximancer to Patient Case Notes......Page 1310
4 Conclusion......Page 1313
References......Page 1314
1 Introduction......Page 1315
3.2 Analysis of PPRs......Page 1316
4.1 State of CPR......Page 1317
4.2 User-Friendly Data Entry......Page 1319
References......Page 1321
1 Introduction......Page 1322
2.2 Electric Medical Record from the Viewpoint of the SOAP Format......Page 1323
3.2 Analysis of the Characteristics of Medical Record......Page 1324
4 Processing Flow of Preprocessing......Page 1325
5 Conclusion and Future Works......Page 1327
References......Page 1328
1 Introduction......Page 1329
2.2 The Function of Agents......Page 1330
2.4 The Scanning Vulnerability of Software......Page 1331
3.1 Learning of Data Communication......Page 1332
3.2 Estimating Method of Data Transmission......Page 1334
References......Page 1335
2 Questionnaires in HSISD......Page 1336
3 Patient Authentication by Mobile Phone with IC Card......Page 1338
4 Conclusive Discussion......Page 1340
References......Page 1341
2 The Measuring System of Food Intake......Page 1342
2.2 Image Processing Program and Communicating with DBP......Page 1343
3 Result and Investigation......Page 1345
3.1 Evaluation of the System......Page 1347
References......Page 1348
1 Introduction......Page 1350
2 Approach of Raku Raku Pasokon e-namokun......Page 1351
3 Actual Web Mail System......Page 1352
3.2 Securing of Portability by Web Mail......Page 1353
4 Evaluation Experiment......Page 1354
5 Conclusions......Page 1355
References......Page 1356
1 Introduction......Page 1357
2.2 Interactive History......Page 1358
2.3 ihComparator......Page 1359
3 Evaluation......Page 1361
4 Conclusion......Page 1362
References......Page 1363
1 Introduction......Page 1364
2 Current Research Activities and Problems......Page 1365
3 Organizing Research Information with a Transition Graph......Page 1366
4 Converting an RITG to a Common View......Page 1368
6 A Support System for Research Activities......Page 1370
References......Page 1371
2.1 Overview of the Learning Processes......Page 1372
2.4 Web-Based Examinations......Page 1373
3 Analysis of Students......Page 1375
4 Servers and Networks......Page 1376
References......Page 1378
1 Introduction......Page 1379
2.2 Generating Answer in Mathematical Exercise......Page 1380
3.1 Structure......Page 1381
3.2 Conditions on Links......Page 1382
3.3 Descriptions of Answer......Page 1383
4.2 Experimental Result......Page 1384
References......Page 1385
1 Introduction......Page 1386
2 Problem Types and Plans......Page 1387
3 A Collaborative Environment for Learning by Problem-Solving......Page 1388
4 Scaffolding Discovery of Plans......Page 1389
Appendix: Examples of Problem Types and Plans......Page 1390
1 Introduction......Page 1393
2.2 Lessons Learned from IES studies......Page 1394
2.3 Overlooking SCORM2004 from the Viewpoint of AIED Research......Page 1395
3.1 An Activity Tree as a Decision-Making Tree for Delivering Learning Object......Page 1396
3.3 Patterns for Designing an Activity Tree......Page 1397
5 Conclusion......Page 1398
References......Page 1399
1 Introduction......Page 1400
2 Relevant Researches......Page 1401
3 Multi-dimensional Repertory Grid Approach......Page 1402
4 Experiments and Evaluations......Page 1403
6 Conclusion......Page 1404
References......Page 1405
2 The Proposed WebPAN Algorithm......Page 1407
2.1 PA Scan......Page 1408
3 An Example......Page 1410
4 Performance Evaluation......Page 1411
References......Page 1412
1 Introduction......Page 1414
2 Related Work......Page 1415
3.2 Algorithm RGA_MSR......Page 1416
4 Experiments......Page 1418
References......Page 1419
1 Introduction......Page 1421
3.1 Framework......Page 1422
3.2 Data Distortion Method......Page 1423
3.3 Data Mining Approach......Page 1424
4.1 Analysis......Page 1425
4.2 Experiments......Page 1426
References......Page 1427
1 Introduction......Page 1428
2 Review of Wireless Networks for Mobile Users......Page 1429
4 Mining Linguistic Mobility Patterns......Page 1430
5 An Example......Page 1431
References......Page 1433
1 The Trend Towards Product Customization......Page 1435
2 Enhancement on Conventional Design Planning......Page 1436
3 Basic Design of the Evolutionary Algorithm Approach......Page 1437
4 The Fitness Function......Page 1438
5 Enhancement Towards Structure Optimization......Page 1439
References......Page 1441
1 Introduction......Page 1442
2 Features Extraction and Fuzzy Similarity Measure......Page 1443
3 Fractional Matching with Maximum Relation Spanning Tree......Page 1444
4 Simulation Results......Page 1445
5 Conclusion......Page 1447
References......Page 1448
2 Linguistic Description of the Helicopter System......Page 1449
3.1 Linguistic Fuzzy Rules......Page 1450
3.2 Qualitative Description of Membership Functions......Page 1452
5 Fuzzy Control System......Page 1453
6 Results......Page 1454
References......Page 1455
Author Index......Page 1456


๐Ÿ“œ SIMILAR VOLUMES


Knowledge-Based Intelligent Information
โœ Rajiv Khosla, Robert J. Howlett, Lakhmi C. Jain ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<P>The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005.</P> <P>The 716 revised papers p

Knowledge-Based Intelligent Information
โœ Rajiv Khosla, Robert J. Howlett, Lakhmi C. Jain ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<P>The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005.</P> <P>The 716 revised papers p

Knowledge-Based Intelligent Information
โœ Rajiv Khosla ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<P>The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005.</P> <P>The 716 revised papers p

Knowledge-Based Intelligent Information
โœ Takashi Yamashita, Kotaro Hirasawa, Jinglu Hu (auth.), Rajiv Khosla, Robert J. H ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p>Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established

Knowledge-Based Intelligent Information
โœ Da Deng, Heiko Wolf (auth.), Rajiv Khosla, Robert J. Howlett, Lakhmi C. Jain (ed ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<P>The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005.</P><P>The 716 revised papers pre

Knowledge-Based Intelligent Information
โœ Li Li, Baolin Wu, Yun Yang (auth.), Rajiv Khosla, Robert J. Howlett, Lakhmi C. J ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p>Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established