{"title":"Characterization of Internal Learning Parameters in Artificial Neural Networks","authors":"Engr. Raheela Mustafa","doi":"10.1109/IACSIT-SC.2009.92","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.92","url":null,"abstract":"As modern computers become even more powerful, scientists continue to be challenged to use machines effectively for tasks that are relatively simple for humans. Based on examples, together with some feedback from a \"teacher\", we learn easily to recognize the letter A or distinguish a cat from a bird. More experience allows us to refine our responses and improve our performance. Although eventually, we may be able to describe rules by which we can make more decisions, these do not necessarily reflect the actual process we use. Even without a teacher we can group similar patterns together. Yet another common human activity is trying to achieve a goal that involves maximizing a resource (time with one's family, for example) while satisfying certain constraints (such as need to earn a living). Each of these types of problems illustrates tasks for which computer solutions may be sought. Traditional, sequential, logic based digital computing excels in many areas, but has been less successful for other types of problems. The development of artificial neural networks began approximately 50 years ago, motivated by a desire to try both to understand the brain and to emulate some of its strengths.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115634755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Prediction Method of Muscle Force Using sEMG","authors":"Gang Li, Haifeng Chen, Jungtae Lee","doi":"10.1109/IACSIT-SC.2009.11","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.11","url":null,"abstract":"Surface electromyography (sEMG) technology is used to record and display the electrical activities of human muscles, by which researchers are able to make a muscle force evaluation. In this study, in order to accurately feedback the information about athletes' forearm force training, the Maximum Voluntary Contraction (MVC) is proved as the indicator of maximum forearm muscle force by developing a winner prediction method of arm wrestling game. Experiment results based on healthy 12 volunteers' (all males, average age is 25±3) are reported in this paper. The results show that the prediction method can be accurately performed so as to estimate who is the winner.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114939811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling the Self-Propagating Growth Function of Science and Technological Diffusion for Selected Asian Countries","authors":"Chan‐Yuan Wong, K. Goh","doi":"10.1109/IACSIT-SC.2009.19","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.19","url":null,"abstract":"In the transition to a knowledge-based economy, many Asian emerging countries attempt to raise the national investment to develop their science and technological capacity. Science and technological production can be the result of self-propagating growth in the process of diffusion. By theoretical analysis and empirical demonstration, this paper attempts to analyze science and technology by investigating the self-propagating behavior of science and technological diffusion for South Korea, Malaysia and Japan. The dynamics of the self-propagating behavior in these selected countries are examined through the logistic growth function with a dynamic carrying capacity. Evidence suggests that this function is particularly relevant for an advanced country like Japan.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130145955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatically Locating Spots in DNAMicroarray Image Using Genetic Algorithm without Gridding","authors":"A. Sreedevi, D. S. Jangamashetti","doi":"10.1109/IACSIT-SC.2009.59","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.59","url":null,"abstract":"Microarray technology has made the possibility in analyzing expression profiling, monitoring tens of thousands of genes simultaneously. Microarray image analysis is complicated, time consuming task and requires manual intervention. Gridding of Microarray image is performed before spot segmentation. The spatial non-uniformity of spots results in non-uniform grid alignment, which leads to inconsistency of extracted feature from the spot. This paper presents a novel automatic approach to locate the spots without the formation of grids. An approach using Genetic algorithm is proposed, in which searching for the spots in sub image is done and the relevant information of the spot is extracted. The process is repeated for the entire image. This algorithm is novel as it is independent of the spot size, colour, and location. The code is developed using MATLAB and test is carried on oligonucleotide array. From the results it is observed that even low intensity spots can be determined accurately.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Family of Chromatically Unique k-Bridge Graphs","authors":"Abdul Jalil M. Khalaf, Y. Peng","doi":"10.1109/IACSIT-SC.2009.125","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.125","url":null,"abstract":"Let P (G, λ) denotes the chromatic polynomial of a graph G. Two graphs G and H are chromatically equivalent, written G ~ H, if P (G, λ) = P (H, λ). A graph G is chromatically unique written χ−unique, if for any graph H, G ~ H implies that G is isomorphic with H. In this paper we prove the chromatic uniqueness of a new family of k-bridge graphs.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Behavioral Preference and Utility Coordination Evaluation in Supply Chains","authors":"Yu Tian, Shao-chao Sun, Yanxue Gong","doi":"10.1109/IACSIT-SC.2009.75","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.75","url":null,"abstract":"Behavioral issues become one of the main concerns of research on supply chain coordination. Within the frame-work of Behavioral Decision Theory, the impact of reference point and gains risk aversion/losses risk seeking effects is respectively investigated on supply chain performance under Pareto optimality criterion. It indicates that for the former the relative risk of losses in supply chains is still shared among those agents with the least loss aversion while the optimal order quantity decreases; for the later the influence depends on parameters and aversion coefficients. Furthermore, an original coordination evaluation criterion combining group utility function with Pareto optimality principle is presented to incorporate heterogeneous utility structures. Then the procedure is developed and a numerical example is also included.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123380497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do Egyptian Managers Differentiate between Task and Personal Conflicts?","authors":"S. Elbanna","doi":"10.1109/IACSIT-SC.2009.84","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.84","url":null,"abstract":"to understand its effect on strategic decision making (SDM) and both decision and organisation outcomes. Previous empirical research in the US setting shows that people differentiate between task conflict and personal conflict. Hence, it is expected that one dimension of conflict will be found to play a positive role in SDM, while another dimension plays a negative role. Inconsistent with related research in the US setting, our study shows that Egyptian decision makers are not able to differentiate between personal conflict and task conflict in the SDM process. We conclude that in the era of increasing globalisation, culture is likely to have considerable power to explain differences in the perception of people of strategic management concepts and then their behaviours and actions.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Treatment of the Incomplete Data Based on WaveCluster and Weighted 1-Nearest Neighbor","authors":"Xing-yi Li, Junyun Lu, Huaji Shi, Suqin Ma","doi":"10.1109/IACSIT-SC.2009.38","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.38","url":null,"abstract":"For the incomplete data that usually exists in the process of pretreatment, this article presents an approach for treatment of the incomplete data based on WaveCluster and weighted 1-Nearest Neighbor (1-NN).The proposed method firstly carries out the WaveCluster in the complete record set of the whole set, which can reduce the volume of comparative data and rule out outliers, improve computational efficiency of the algorithm and the clustering accuracy. Then, the weighted 1-NN method is used, according to the contribution attributes made to the classification in the algorithm, the information gain of attribute is calculated and each attribute is endowed with certain weight using in the nearest neighbor measure, thus it can enhance the filling precision of the missing value. Experimental results show the proposed method is an appropriate and effective method in treatment of the incomplete data.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hypothesis Driven Secondary Network Mining from PubMed Using Epiphany","authors":"Jesmin, H. Jamil","doi":"10.1109/IACSIT-SC.2009.116","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.116","url":null,"abstract":"Incomplete knowledge about biological objects and a universal set of rules can be used to guide the exploration of PubMed literature to aggregate knowledge for secondary network inferencing. Epiphany is a novel text mining architecture in which users are able to express what is known about an object, what general rules apply for conclusion drawing, and what hypothesis is being expected. Once stated, Epiphany mines the PubMed abstracts first to generate a possible primary weighted and annotated interaction network, and then generate a secondary and higher level interaction network from a subset of more relevant publications. This candidate network serves as a basis for secondary network prediction as a final step. This paper describes the proposed architecture of Epiphany as a higher level text mining tool in Life Sciences and presents a case study in which the mechanism of Dengue virus has been predicted solely from literature mining.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132622200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Routing Protocols and It's Metrics for Wireless Mesh Networks","authors":"Hassen A. Mogaibel, M. Othman","doi":"10.1109/IACSIT-SC.2009.51","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.51","url":null,"abstract":"WMNs are low-cost internet access networks built on cooperative routing over a backbone composed ofstationary wireless routers. In hybrid mesh WMNs both client mesh and backbone has ability to forward the data to destination. Many ad hoc routing protocols have been adapted to work in WMN without considering the differences between both technologies. Due to the differences between ad hoc network and WMN network, many Researchers started to revisit the routing protocol design of existing wireless mesh networks (WMNs), especially of IEEE 802.11 networks, and ad hoc networks from the perspectives of WMNs which provide internet for large distances area and consist of two tiers where the heterogeneity exists between them, the heterogeneity between backbone nodes and client nodes are many, for example, the backbone nodes are immobile with a fixed location and high capacity while the client nodes are mobile devices with low capacity and must take care of power consumption and mobility. However, these perspectives should be taken care of in designing the routing protocol to enhance the routing algorithm in order to work well in WMN. There are two ways to enhance the performance of routing protocol in WMN. One way is to improve the metric used in the selection path, the second way is to modify the routing algorithms by considering new characteristics of WMN or integrating the routing protocols with other technologies. In this paper, we present a detailed review of current state-of-the-art routing protocol and its metric for wireless mesh networks in order to provide a better understanding of the research challenges in WMN routing protocol.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133537357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}