{"title":"Human factor in traffic models","authors":"Z. Tóth-Szabó, K. Kovács, R. Horvath","doi":"10.1109/ICCCYB.2006.305738","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305738","url":null,"abstract":"This paper deals with modeling of human behavior in traffic systems. The first part of the paper gives a short survey of the corresponding literature introducing the most important problems of the area. The second part of the paper contains our approach aiming the development of a driver model applicable in the widely used simulation systems to describe practical traffic situations and analyze the safety aspects.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SWOT Analysis Support Tool for Verification of Business Strategy","authors":"M. Samejima, Y. Shimizu, M. Akiyoshi, N. Komoda","doi":"10.1109/ICCCYB.2006.305700","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305700","url":null,"abstract":"To verify business strategies, it is essential to extract and analyze business information. The amount of business information is so enormous that it is time-consuming for an analyst to extract and analyze. Thus, we propose a support tool for verifying business strategies using SWOT analysis. This tool supports the extraction of factors for analysis. However, the information includes unnecessary factors, same factors in different expressions, and meaningless factors in independent use. To solve these problems, we propose a framework for this tool using our proposed keywords extraction method.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127336122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Information Modeling for Protecting Enterprise Assets from Threats","authors":"S. Fortier, J. Volk","doi":"10.1109/ICCCYB.2006.305721","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305721","url":null,"abstract":"Government agencies, non-governmental organizations (NGOs), and private industry use a wide array of software platforms for managing data about emergency conditions, resources and response activities. Most of these are stand-alone systems with very limited capability for data sharing with other agencies or other levels of government. Information technology advances have facilitated the movement towards an integrated and coordinated approach to emergency management. Other communication mechanisms, such as video teleconferencing, digital television and radio broadcasting, are being utilized to combat the challenges of emergency information exchange. The goal of our effort was to develop a proof of concept that applying information modeling to the business processes used to protect and mitigate potential loss of an enterprise was feasible. These activities would be modeled both pre- and post-incident.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Concept of Genetic Operators for Scheduling Problems","authors":"A. Ferrolho, M. Crisostomo","doi":"10.1109/ICCCYB.2006.305688","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305688","url":null,"abstract":"When a genetic algorithm (GA) is applied to scheduling problems, various crossovers and mutations can be applicable. We have to carefully select appropriate operators for constructing high performance GA, because GA performance depends on the choice of such operators as well as crossover and mutation probabilities. First, we present a new concept of genetic operators for scheduling problems. Then, we developed a software tool, called HybFlexGA, to examine the performance of various crossover and mutation operators by computing simulations of job scheduling problems. Finally, we applied in the HybFlexGA the best genetic operators obtained from our computational tests.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125994264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of IGCC Plants and Reachable Multi-Objective ThermoEconomic Optimization","authors":"Z. Ye, H. Mohamadian, Yongmao Ye","doi":"10.1109/ICCCYB.2006.305736","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305736","url":null,"abstract":"The gasification process of IGCC plants enables the production of electricity as main product and production of heat and some chemicals (e.g., sulfur, slag) as by-products. In order to testify its feasibility for large scale production, IGCC control and optimization methodologies are needed to enhance its characteristic performance and environmental sustainability via IGCC system integration. Thermoeconomic optimization has been proposed to coordinate multiple components of IGCC plants (compressor, air separation unit, gasifier, gas cleanup system, gas turbine cycle and steam turbine cycle) using advanced control technologies. IGCC technology allows the environment-friendly use of coal. It converts coal to synthesis gas and sends it to the gas turbine system. When gas turbine is fired on a gas fuel emitted from gasification of solid carbonaceous material, this cycle becomes an integrate cycle. In the mean while, control oriented thermoeconomic optimization takes an important role in this potentially widespread commercial technology.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for the Rule-Based Compilation of Decision Networks","authors":"A. Holland, M. Fathi","doi":"10.1109/ICCCYB.2006.305703","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305703","url":null,"abstract":"Among the various types of decision support systems, decision-theoretic models and rule-based systems have gained considerable attraction. Both approaches have advantages and disadvantages. Decision-theoretic models like decision networks dispose of a sound fundamental mathematical basis and comfortable knowledge engineering tools. Rule-based systems provide an efficient execution architecture and represent knowledge in an explicit, intelligible way. In this paper, we consider fuzzy rule-based systems as a special type of condensed decision model. We outline a knowledge transformation and compilation scheme which allows one to transform a decision-theoretic model into a fuzzy rule base and, hence, to combine the advantages of both approaches. An experimental example is given as demonstration of the described techniques.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122690057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functional Structure of Autonomically Emerged Network in an Environment","authors":"T. Funato, D. Kurabayashi","doi":"10.1109/ICCCYB.2006.305713","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305713","url":null,"abstract":"The structure, function and environment of a system are deeply connected: the topological features of a network affect the function of a system, and the structure is affected by the environment. This paper deals with the network that emerges as a consequence of agent motion. We assume that the agents are moving in a field and develop a task to eliminate obstacles, and we consider the relationship among interacting agents as a network. We consider the structural properties of this network from the viewpoint of functionality - the number of tasks executed. By simulation, we show the emerged structure exhibits small world (SW) characteristics, and the characteristics help in the effective execution of the tasks.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Extension to Zadeh's Truth Qualification Principle for Resolution of Self-Referential Sentences: Towards a Comprehensive Theory of Type-2 Fuzzy Possibility","authors":"M. Rajati, M. Menhaj, H. Khaloozadeh","doi":"10.1109/ICCCYB.2006.305717","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305717","url":null,"abstract":"The purpose of this paper is to formulate truth-value assignment to self-referential sentences via Zadeh's truth qualification principle and to present new methods to assign truth-values to them. Therefore, based on the truth qualification process, a new interpretation of possibilities and truth-values is suggested by means of type-2 fuzzy sets and then, the qualification process is modified such that it results in type-2 fuzzy sets. Finally, an idea of a comprehensive theory of type-2 fuzzy possibility is proposed. This approach may be unified with Zadeh's Generalized Theory of Uncertainty (GTU) in the future.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"2004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Service Composition based on Agent Societies and Ontological Concepts","authors":"F. Ensan, M. Kahani, Ebrahim Bagheri","doi":"10.1109/ICCCYB.2006.305728","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305728","url":null,"abstract":"The world has experienced a great evolution through the information technology era. Finding suitable vital industrial resources may have been the aim of the previous decades; however these goals have now changed. The pervasive computing environments have overwhelmed humans with a vast amount of information resulting in a lost in the hyperspace problem. Different methods have been proposed to structure and provide better information retrieval. The most recent developments have been the creation of the semantic web and the web services. The new challenge is to establish the basis for semantic web services that are able to be organized into a chain which satisfies the desired user functionality. In this paper we propose a framework in which multi-agent societies have been used to create an environment in which user requests are received (in a restricted English grammar format) and a suitable web service composition is formed. The framework targets distributed environments where no central web service registry is available.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Cooperation of Two Manipulators with Fractional Controllers","authors":"N. Ferreira, J. Machado, J. B. Cunha","doi":"10.1109/ICCCYB.2006.305725","DOIUrl":"https://doi.org/10.1109/ICCCYB.2006.305725","url":null,"abstract":"This paper analyzes the dynamics and the implementation of fractional-order algorithms in the position/force control of two robots holding an object. The experiments reveal that fractional algorithms lead to performances superior to classical integer-order controllers.","PeriodicalId":160588,"journal":{"name":"2006 IEEE International Conference on Computational Cybernetics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130327403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}