PROGRAM
5th
WSEAS International Conference on
TELECOMMUNICATIONS and INFORMATICS
(TELE-INFO '06)
Istanbul, Turkey,
Sponsored by WSEAS and WSEAS Transactions
May 27-29, 2006
Saturday, May 27, 2006
Plenary Lecture I
– Tutorial
Next Generation Optical Networks, SDH and Protocols
Professor Stamatios Kartalopoulos
The University of Oklahoma, USA
Course Description: As communication needs evolve, the current optical network requires both synchronous and asynchronous traffic with enhanced efficiently, scalability, protection strategies, and performance-cost objectives. The next generation optical network is based on DWDM technology and is designed on new standard protocols to efficiently address these requirements. This network may be viewed as an amalgamation of the best concepts from legacy synchronous and asynchronous networks, adding to it new concepts that enhance network attributes including efficiency-cost.
This short course starts with a review of critical optical network topologies, the SONET/SDH standard and DWDM technology. It describes the next generation SONET/SDH, Data-over-SONET/SDH, Packet-over-SONET/SDH, error handling, protection switching, the Link Capacity Adjustment Scheme (LCAS), the Generalized Framing Procedure (GFP), the Link Access Procedure for SDH (LAPS), Internet and Ethernet over SONET/SDH, Virtual Concatenation (VC), Multi-Service Switching Platform (MSSP), Multi-Service Provisioning Platform (MSPP), Next Generation SONET/SDH over DWDM, as well as the Optical Transport Network (OTN).
This course is supported by notes and optionally by four books authored by the instructor (published by IEEE/Wiley): “Next generation SONET/SDH” (2004), “Understanding SONET/SDH and ATM” (1999), “Introduction to DWDM Technology” (2001), and “DWDM: Networks, Devices and Technology” (2003).
Plenary Lecture
II
Hebbian Learning and Negative Feedback Neural Networks
Professor Colin Fyfe
The University of Paisley, Scotland
Abstract: The central idea of this presentation is that artificial neural networks which use negative feedback of activation can use simple Hebbian learning to self-organise in such a way that they uncover interesting structure in data sets. The network in its simplest form performs a Principal Component Analysis. Extensions to the network are shown to perform Exploratory Projection Pursuit: they find low-dimensional filters of the data which reveal interesting structure in the data. For example, we might search for outliers from the main body of the data or clusters within the data set and this search can be performed in a hierarchical manner – we find one cluster in the midst of many and then re-project the data from this one cluster to attempt to find subclusters. There are two main ways of performing these searches and these are contrasted and compared and a composite method created which exhibits useful properties from the two underlying methods.
The network can also be used to find independent components of a data set in a number of different ways. For example, one extension to the basic network is shown to perform a type of Factor Analysis – it identifies a set of factors which when OR-ed together will construct the data set. Other methods are used to perform Independent Component Analysis which is extensively used in blind source separation – extracting one signal from a linear mixture of signals. The network can also be used for clustering in a topology preserving manner: there are several ways of clustering using this network in such a way that similar data points are clustered close to one another and only similar data points are treated this way.
In part 2 of the talk, twinned networks are introduced: these networks have two input data streams on which they self-organise using simple Hebbian learning with negative feedback again. In their basic form, the networks are shown to perform Canonical Correlation Analysis, the statistical technique which finds those filters onto which projections of the two data streams have greatest correlation. Various extensions of the basic methods are devised in order to create methods which react to more than two data streams at a time or which deal with problems such as multicollinearity. A further extension is the twinning of the Exploratory Projection Pursuit methods from the first part of the book so that the new network identifies shared structure across two data streams. This new network is also shown to perform Independent Component Analysis. A final chapter deviates somewhat from the rest of the book since its emphasis is on an extension of the Principal Curve algorithm so that we now have two curves learning on two data streams simultaneously.
Since the scope of the talk is the development of new algorithms, all algorithms which are derived analytically, are illustrated on artificial data before being used on real data sets. Where it is of interest, the results are compared with those from standard statistics or from alternative artificial neural networks.
SESSION: Internet, Multimedia Applications, E-Learning
Chair: Despina Polemi, Woon-Yong Lin
Connection Management System for Web Services based on a Policy |
Woon-Yong Kim, Seok-Gyu Park |
|
A Web-Based Multimedia Environment to Support Group Creativity |
Hsien Tang Lin, Shyan Ming Yuan |
|
A Framework for Semantic Transcoding of Multimedia Learning Objects |
Jinan Fiaidhi, Sabah Mohammed |
|
Applying the sum of correlated gamma variates in approximate error probability evaluation for MC-DS-CDMA systems operating in frequency selective fading channels |
Joy Iong-Zong Chen |
|
An investment content delivery secure e-service |
Despina Polemi, Thanos Karantjias |
|
Developing A Wap-Based Application for Emergency Service System |
Y.Batu Salman, Adem Karahoca |
|
Study on Role-Based Access Control Model for Web Services and its Application |
Min Wu, Jiaxun Chen, Yongsheng Ding |
|
The Construction of Course Management System with Portfolio |
Hsien Tang Lin, Chi Huang Chiu, Shyan Ming Yuan |
|
Performance Implications of Memory Management in Java |
Averil Meehan |
SESSION: Ad-hoc and Mobile Networks
Chair: Wang Dazhen, K. Ioannou
Modified SPIHT Image Coder for Wireless Communication |
M. B. I. Reaz, M. Akter, F. Mohd-Yasin |
|
An Implementation of Time of Arrivals Location Positioning Technique for GSM Networks |
N. Deligiannis, S. Louvros, K.Ioannou, A. Garmpis, S. Kotsopoulos |
|
A L2 Transmission Feedback based buffering scheme for Mobile IP handovers in an IEEE 802.11 wireless network |
Peter De Cleyn, Chris Blondia |
|
GPCA Method for Fraud Detection in Mobile Communication Networks |
Wang Da-Zhen, Wan Fang |
|
Reduction of Interorganization Web Services Peers Incidents by Deployment of Asynchronous Computing Environment Profile Unification Methodology (ACEPUM) |
Khalil A. Abuosba, Asim A. Elsheikh |
|
Packet Scheduling in WDM Ring Networks with Non-uniform Traffic Demands and Arbitrary Transceiver Tuning Latencies |
Hann-Jang Ho, Rongjou Yang, Jungchun Liu, Singling Lee |
|
The Genetic Chromodynamics Metaheuristic |
D. Dumitrescu, Catalin Stoean |
|
Permeation of RUP and XP on Small and Middle-Size Projects |
Kresimir Fertalj, Nikica Hlupic, Damir Kalpic |
SESSION: Information Technology and Applications I
Chair: Youn-Gyou Kook, Muhammad Fauzi Mohd Zain, Elisabeth Metais
A Purpose-Directed Reachability Analysis Approach |
Abdelaziz Guerrouat, Harald Richter |
|
Addressing Formulas for Central Triangular Matrices in 1D Arrays |
Francisco Moreno, Silvia Guardati, Osvaldo Cairo, Roberto Florez |
|
IT Service Management and Normatively Regulated Activities |
Dzenana Donko, Ismet Traljic |
|
Expert System For Making Sulfate-Resistant Concrete |
Muhammad Fauzi Mohd Zain, Md. Nazrul Islam, Hassan Basri, Maslina Jamil |
|
Efficient Migration of Service Agent in P-Grid Environments based on Mobile Agent |
Youn-Gyou Kook, Woon-Yong Kim, Young-Keun Choi |
|
A Rapid Algorithm for Topology Construction from a Set of Line Segments |
Sebastian Krivograd, Mladen Trlep, Borut Žalik |
|
Developing Filtering Techniques for Securing Vector Graphics Images Applied to Ubiquitous Patient Records |
Sabah Mohammed, Jinan Fiaidhi, Ahmed Sabir Arif |
|
Tone Analysis in Harmonic-Frequency Domain and Feature Reduction using KLT+LVQ for Thai Isolated Word Recognition |
S. Predawan, P. Jiyapanichkul, C. Wutiwiwatchai, C. Kimpan |
|
A Predictive Control Approach For Nonlinear Systems |
Malik F. Alamaireh, Mohammad R. Hassan |
|
Adaptive visualization of collaboration status in process-oriented collaborative learning |
Hee-Seop Han, Hyeoncheol Kim, Sun-Gwan Han |
Sunday, May 28, 2006
SESSION: Telecommunication Systems and Applications
Chair: Mohamed Amr Mokhtar, Slobodan Babic, Andrzej Chydzinski
WarDriving: Technical and Legal Context |
Hira Sathu |
|
Mutual Inductance of Thin Coaxial Circular Coils with Constant Current Density in Air (Filament Method) |
Cevdet Akyel, Slobodan I. Babic, Ke Wu and José Fernando Mojica |
|
Design and Implementation of a Switched Bus-based Home Network Interconnection System |
Yang-Keun Ahn, Kwang-Soon Choi, Young-Choong Park, Kwang-Mo Jung, Seong-Dong Kim |
|
U-Shaped Rectangular Patch Microstrip Antenna Element for Base Station Antennas |
Enver Hamiti, Luan Ahma, Abdel Razik Sebak |
|
Buffer overflow period in a constant service rate queue |
Andrzej Chydzinski |
|
DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms |
M. Amr Mokhtar |
|
Energy Based Video Synthesis |
Ranga Rodrigo, Zhenhe Chen, Jagath Samarabandu |
|
Ubiquitous Information Gathering with SMS Query Service |
Yousef Awwad, Chia-Feng Lin and Shyan-Ming Yuan |
|
TUQR: A Topology Unaware QoS Routing Protocol for MANETs |
Ibrahim Zagli, Min Song |
|
Reversing Ticket Based Probing Routing Protocol for MANET |
Turgut Yucel, Min Song |
SESSION: Advanced Telecommunication Systems
Chair: Mohamed Amr Mokhtar, Slobodan Babic, Andrzej Chydzinski
DC-Free Turbo Coding Scheme For GPRS System |
M. Amr Mokhtar, A. Refay-Ahmed |
|
Computation of Characteristic Impedance of CPW, Grounded CPW (GCPW) and Microstrip Lines in a Wide Frequency Range Using TLM Approach |
H. Keivani, M. Fazaelifard, M. Farrokhrooz |
|
Efficient Routing Algorithms on Optoelectronic Networks |
J. Al-Sadi, Ahmad M. Awwad |
|
A Novel Multilayer Microstrip Antenna for Ultra Wideband Applications |
Yashar Zehforoosh, Changiz Ghobadi, Javad Nourinia |
|
Performance Evaluation of TCP/IP Protocol for Mobile Ad Hoc Network |
Mohd Dani Baba, Nurhayati Ahmad, Muhammad Ibrahim, Ruhani Abdul Rahman, Nurul Husna Eshak |
|
Using Nonlinear Filter for Adaptive Blind Channel Equalization |
Hamidreza Bakhshi, Mohammad Pooyan |
|
A Survey of Approximation Algorithms for Multicast Congestion Problems |
Rongjou Yang, Hann-Jang Ho, Singling Lee |
SESSION: Clusters and Distributed Environments
Chair: Nader Mir, Adem Karahoca
How clustering can be useful to supermarkets? |
Henda Bélaïd Ajroud, Hamida Amdouni |
|
Multi-Agent Systems in Distributed Communication Environments |
Camelia Chira, D. Dumitrescu |
|
A Dynamic Task Scheduling Algorithm in Grid Environment |
Wang Da-Zhen, Zhan Jun-Shan, Wan Fang, Zhu Lei |
|
A Practical Performance Comparison of Parallel Sorting Algorithms on Homogeneous Network of Workstations |
Haroon Rashid and Kalim Qureshi |
|
Comparing Clustering Techniques for Telecom Churn Management |
Adem Karahoca, Ali Kara |
|
A dynamic workload balancing technique of a text matching algorithm on a cluster |
Odysseas Efremides, George Ivanov |
|
An Energy-Efficient Decentralized Clustering Protocol for Wireless Sensor Networks |
Marzieh Veyseh, Belle Wei, Nader F. Mir |
SESSION: Security and Privacy
Chair: Eleutherios A. Papathanassiou, Odysseas Efremides
A Practical Home Security System via Mobile Phones |
Bing-Fei Wu, Hsin-Yuan Peng, Chao-Jung Chen |
|
Security Countermeasure Design by Using Block Model of T.H. Kim |
Tai-Hoon Kim, Kouichi Sakurai |
|
Privacy Online: Research and Recommendations |
Eleutherios A. Papathanassiou, Xenia J. Mamakou, Dimitris K. Kardaras |
|
Requirements for Security Protocols |
Wuu Yang and Rong-Hong Jan |
|
A bidirectional bluetooth authentication scheme based on game- theoritic framework |
Nabil El kadhi, Syrine Karoui, Foued Ben Abdelaziz |
|
Hardware Implementation on FPGA Platform for Cellular Automata Cryptosystem |
Eduard Franti, Monica Dascalu |
|
Optimizing Web Service Messaging Performance Using a Context Store for Static Data |
Sangyoon Oh, Mehmet S. Aktas, Marlon Pierce, Geoffrey C. Fox |
Monday, May 29, 2006
SESSION: Information Technology for Communications
Chair:
Stamatios Kartalopoulos
Localist Approach to Natural Language Processing |
Mladen Stanojevic, Sanja Vranes |
|
A Minimum Cost Process in Searching for a Set of Similar DNA Sequences |
M Yazid M Saman, M Nordin A Rahman, Aziz Ahmad and A Osman M Tap |
|
Automatic classification of medical reports, the CIREA project |
Elisabeth Metais, Didier Nakache, Jean-François Timsit |
|
The influence of consumers consciousness of institutional factors on initial trust building |
Li-Ting Huang, Kuo-Lien Yin, Cheng-Kiang Farn |
|
A learning-based algorithm for geometric labeling of indoor images |
Xiaoqing Liu, Jagath Samarabandu |
|
Proposed sets of Polyphase Spreading Sequences for DS-CDMA System |
Jalal Jamal Hamad-Ameen |
|
Design and Analysis of a Second Order Phase Locked Loops (PLLs) for Communication Systems |
Diary R. Sulaiman |
|
A Knowledge-based Service Creation and Execution Framework for the Adaptation of Composite Wireless Services |
Spyros Tombros, Nikiforos Ploskas, Christoforos Kavadias, Constantinos T. Angelis, Athanasios Koumasis |
SESSION: Protocols and Algorithms
Chair: Alaa Sheta, Joy Iong-Zong Chen, Jalal Jamal
Thin Subwavelength Multilayer Cavity Resonator Using Metamaterials |
Majid Ahmadlou, Mohammad Hossein Sheikhi |
|
A New Patch Antenna for UMTS Band:Narrow Compact CPW-fed Monopole |
S. Soodmand, Ch. Ghobadi, J. Nourinia |
|
Double Core Photonic Crystal Fiber |
Ebru Gedik, Ercan Topuz |
|
Link Adaptation for Spatial Multiplexing MIMO Systems |
Sreco Plevel, Tomaz Javornik, Gorazd Kandus, Igor Jelovcan |
|
A fluid model of the RED AQM algorithm and its implementation in a fluid-based network simulator |
Jose Incera, Luis Carballo |
|
Automatic Digital Modulation Identification in Dispersive Channels |
Ataollah Ebrahimzadeh, Seyed Alireza Seyedin |
|
Bluetooth–Based Approach to Monitoring Biomedical Signals |
Zilbert Tafa, Radovan Stojanovic |
|
Underwater Laser Sensor Network: A New Approach for Broadband Communication in the Underwater |
Yingzhuang Liu, Xiaohu Ge |
SESSION: Information Systems and Artificial Intelligence
Chair: Jaume Casasnovas
A Top-Down Visual Approach to GUI development |
Rosanna Cassino, Genny Tortora, Maurizio Tucci, Giuliana Vitiello |
|
On the addition of discrete fuzzy numbers |
Jaume Casasnovas, J.Vicente Riera |
|
Cooperative Model Generation For Disabled People Assistance |
Aissam Belabbas, Pascal Berruet, André Rossi, Jean Luc Phillippe |
|
Using Ontological Chain to Resolve the Translation Ambiguity of Cross-Language Information Retrieval |
Pei Cheng Cheng, Been-Chian Chien, Hao-Ren Ke, Wei-Pang Yang |
|
Analysis and Computation of Mechanical Action of Residual Stress in Milling | Wang Litao, Wang Hongfeng, Ye Huan | 531-827 |
Automation of Electro-Hydraulic Routing Design using Hybrid Artificially-Intelligent Techniques | Oliver Q. Fan, John P. Shackleton, Tatiana Kalgonova | 531-829 |
Intelligent “Health Restoration System “: Reinforcement Learning Feedback to Diagnosis and Treatment Planning |
Oya Deniz Karaduman, Aydan M. Erkmen, Nazife Baykal |
|
Failure impact on OpenAIS: an experimental evaluation |
Mu-Chi Sung, Ming-Chun Cheng, Zhi Xin Fan, Ping-Jer Yeh, Shyan-Ming Yuan, Chia-Yuan Huang, Lo-Chuan Hu |
SESSION: Coding, Compression, Satellite and Optical Communications
Chair: Zhijun Xie, Yezid Donoso
Voronoi Tessellation based Multiscale Data Compression for Sensor Networks |
Xie Zj , Wang Lei,Yh.Liu ,Chen H |
|
Satellite laser communication networks Ψ A layered approach |
B. Chidhambararajan, V. Jawahar Senthilkumar, S. Karthik, S. K. Srivatsa |
|
Multiobjective optimization for multicast transmissions on ip/mpls networks with an optical gmpls backbone |
Yezid Donoso, Carolina Alvarado, Alfredo Perez, Ivan Herazo |
|
Noise analysis of phase locked loops |
Muhammed A. Ibrahim, Jalil A. Hamadamin |
SESSION: Computer Systems and Communications
Chair: Manuel J. Lopez, Adem Karahoca
Individual Differences in Usability of Cell Phone SMS Menus |
Adem Karahoca, Dilek Karahoca, Ilker Yengin, Baris Yuce, Ilker Berkman, Serkan Simsek, Ceren Dagyar, Senay Yalcin |
|
An extensible application platform for heterogeneous smart home appliances and mobile devices |
Chi-Huang Chiu, Hsien-Tang Ling, Ping-Jer Yeh, Shyan-Ming Yuan |
|
A Critical Predecessor Duplication Scheduling Algorithm for Distributed Heterogeneous Computing Environments |
Kuan-Chou Lai, Chun-Mei Lee and Jywe-Fei Fang |
|
Hardware/software environment for process identification, robust controller design and real time implementation |
Luis Garcia, Manuel J. Lopez, Jose Lorenzo |
|
An Object Based Auto Annotation Image Retrieval System |
Pei-Cheng Cheng, Been-Chian Chien, Hao-Ren Ke, and Wei-Pang Yang |
|
Representation of rotational mechanical parts by parametric equations |
Enrique Cicurel-Uziel |
PROGRAM
5th
WSEAS International Conference on
SIGNAL
PROCESSING
(SIP'06)
Istanbul, Turkey,
Sponsored by WSEAS and WSEAS Transactions
May 27-29, 2006
Saturday, May 27, 2006
Plenary Lecture I
– Tutorial
Next Generation Optical Networks, SDH and Protocols
Professor Stamatios Kartalopoulos
The University of Oklahoma, USA
Course Description: As communication needs evolve, the current optical network requires both synchronous and asynchronous traffic with enhanced efficiently, scalability, protection strategies, and performance-cost objectives. The next generation optical network is based on DWDM technology and is designed on new standard protocols to efficiently address these requirements. This network may be viewed as an amalgamation of the best concepts from legacy synchronous and asynchronous networks, adding to it new concepts that enhance network attributes including efficiency-cost.
This short course starts with a review of critical optical network topologies, the SONET/SDH standard and DWDM technology. It describes the next generation SONET/SDH, Data-over-SONET/SDH, Packet-over-SONET/SDH, error handling, protection switching, the Link Capacity Adjustment Scheme (LCAS), the Generalized Framing Procedure (GFP), the Link Access Procedure for SDH (LAPS), Internet and Ethernet over SONET/SDH, Virtual Concatenation (VC), Multi-Service Switching Platform (MSSP), Multi-Service Provisioning Platform (MSPP), Next Generation SONET/SDH over DWDM, as well as the Optical Transport Network (OTN).
This course is supported by notes and optionally by four books authored by the instructor (published by IEEE/Wiley): “Next generation SONET/SDH” (2004), “Understanding SONET/SDH and ATM” (1999), “Introduction to DWDM Technology” (2001), and “DWDM: Networks, Devices and Technology” (2003).
Plenary Lecture
II
Hebbian Learning and Negative Feedback Neural Networks
Professor Colin Fyfe
The University of Paisley, Scotland
Abstract: The central idea of this presentation is that artificial neural networks which use negative feedback of activation can use simple Hebbian learning to self-organise in such a way that they uncover interesting structure in data sets. The network in its simplest form performs a Principal Component Analysis. Extensions to the network are shown to perform Exploratory Projection Pursuit: they find low-dimensional filters of the data which reveal interesting structure in the data. For example, we might search for outliers from the main body of the data or clusters within the data set and this search can be performed in a hierarchical manner – we find one cluster in the midst of many and then re-project the data from this one cluster to attempt to find subclusters. There are two main ways of performing these searches and these are contrasted and compared and a composite method created which exhibits useful properties from the two underlying methods.
The network can also be used to find independent components of a data set in a number of different ways. For example, one extension to the basic network is shown to perform a type of Factor Analysis – it identifies a set of factors which when OR-ed together will construct the data set. Other methods are used to perform Independent Component Analysis which is extensively used in blind source separation – extracting one signal from a linear mixture of signals. The network can also be used for clustering in a topology preserving manner: there are several ways of clustering using this network in such a way that similar data points are clustered close to one another and only similar data points are treated this way.
In part 2 of the talk, twinned networks are introduced: these networks have two input data streams on which they self-organise using simple Hebbian learning with negative feedback again. In their basic form, the networks are shown to perform Canonical Correlation Analysis, the statistical technique which finds those filters onto which projections of the two data streams have greatest correlation. Various extensions of the basic methods are devised in order to create methods which react to more than two data streams at a time or which deal with problems such as multicollinearity. A further extension is the twinning of the Exploratory Projection Pursuit methods from the first part of the book so that the new network identifies shared structure across two data streams. This new network is also shown to perform Independent Component Analysis. A final chapter deviates somewhat from the rest of the book since its emphasis is on an extension of the Principal Curve algorithm so that we now have two curves learning on two data streams simultaneously.
Since the scope of the talk is the development of new algorithms, all algorithms which are derived analytically, are illustrated on artificial data before being used on real data sets. Where it is of interest, the results are compared with those from standard statistics or from alternative artificial neural networks.
SESSION: Signal Identification and System Characterization
Chair: Aydin Akan
Spectral Features Detection of Speech Emotion and Speaking Styles Recognition Based on HMM Classifier |
Monia Kammoun and Noureddine Ellouze |
|
Conditions for the Existence of Convolution Representations |
Irwin W. Sandberg |
|
Investigation of Muscle Fatigue Using Temporal and Spectral Moments |
Umut Gundogdu, Alaattin Sayin, Aydin Akan, Yunus Ziya Arslan, Elif Kocasay Orhan, Mehmet Baris Baslo |
|
A Comparative Study of Formant Frequencies Estimation Techniques |
Dorra Gargouri, Med Ali Kammoun, Ahmed Ben Hamida |
SESSION: Intelligent Techniques for Signal and Image Processing
Chair: Gulzar Khuwaja
Breast Cancer Detection Using Mammography |
Gulzar Khuwaja |
|
Locating mines in SAR imagery using change detection methods |
Nasser M. Nasrabadi, Maria Tates, Heesung Kwon |
|
Classification of Printed Chinese Characters by Using Neural Network |
Attaullah Khawaja, Abdul Fattah Chandio, Alataf Rajpar, Ali Raza Jafri |
|
Efficient Compression technique for Panorama Camera Motion |
H. Farouk, S. Mashali, M. Rashwan |
|
A Data-Hiding Scheme for Binary Images with Content-Based Hiding Rate |
Phen-lan Lin and Po-Whei Huang |
|
Recognition Persian Handwritten Digits Using Templates and Back-propagation Network with Adaptive Learning's Rate |
Kambiz Rahbar, Saeid Rahati Quchani, Muhammad Rahbar |
|
Vehicles License Plate Recognition Based on Line Scanning of Digital Image |
Heydat Toossian Shandiz, Seyed Saeid Mirsharifi |
|
Handwritten Numeral Recognition Using Multi-wavelets and Neural Networks |
Kambiz Rahbar, Muhammad Rahbar, Farhad Muhammad Kazemi |
|
Threshold optimization of contextual fire detection algorithm using fuzzy clustering |
Yong Huh, Younggi Byun, Kiyun Yu, Yongil Kim |
|
An Efficient Method for Region of Interest Coding in JPEG2000 |
Fayez Idris and Ferat Atef |
|
Geometric invariant semi-fragile image watermarking using real symmetric matrix |
Ching-Tang Hsieh, Yeh-Kuang Wu |
Sunday, May 28, 2006
SESSION: Computational Techniques in Signal Processing
Chair: Naoyuki Kubota
Visual Perception and Reproduction for Imitative Learning of A Partner Robot |
Naoyuki Kubota |
|
Hardware/Software Co-Design Using Bayesian Belief Networks |
Ahmed Sameh, Waseem Raslan |
|
Coin Identification Using Neural Networks |
Adnan Khashman, Boran Sekeroglu, Kamil Dimililer |
|
Adaptive Noise Cancellation with Computational-Intelligence-based Approach |
Chunshien Li , Kuo-Hsiang Cheng |
|
Arabic speech phoneme recognition using neural networks |
Manal El-Obaid, Amer Al- Nassiri, Iman Abuel Maaly |
|
Quanitization Errors in the Harmonic Topographic Mapping |
Stephen McGlinchey, Marian Pena, Colin Fyfe |
SESSION: Filter Design and Noise Cancellation
Chair: Victoria Rodellar
Low Power Amplifier Design using CMOS Active Inductor |
Ming-Jeui Wu, Pei-Jen Yen, Ching-Chuan Chou, Jenn-Tzer Yang |
|
Word-length optimization of an Adaptive Noise Canceller |
V. Rodellar, A. Munoz, A. Alvarez , E. Martinez, C. Gonzalez, P. Gomez |
|
Jordan representation of perfect reconstruction filter banks using nilpotent matrices |
Asha Vijayakumar, G. Abhilash |
SESSION: Computational Intelligence Techniques in Signal Processing
Chair: Stergios Papadimitriou
Clustering with Kernel-Based Self-Organized Maps Trained with Supervised Bias |
Stergios Papadimitriou, Konstantinos Terzidis |
|
Multiagent System for Home Automation |
M. B. I. Reaz, Awss Assim, F. Choong, M. S. Hussain, F. Mohd-Yasin |
|
An Adaptive Algorithm for Speech Source Separation in Overcomplete Cases Using Wavelet Packets |
Behzad Mozaffary, Mohammad A. Tinati, Ali Aghagolzadeh, Abbas Erfanian |
|
Laplacian Mixture Modeling for Overcomplete Mixing Matrix in Wavelet Packet Domain by Adaptive EM-type Algorithm and Comparisons |
Mohammad A. Tinati , Behzad Mozaffary |
|
Musical instrument classification using neural networks |
Mustafa Sarimollaoglu, Coskun Bayrak |
|
Automatic Accentuation of Words for Slovenian TTS System |
Tomaz Sef |
Monday, May 29, 2006
SESSION: Applied Digital Signal and Image Processing
Chair: Gulzar Khuwaja
Classification of Upper and Lower Face Action Units and Facial Expressions using Hybrid Tracking System and Probabilistic Neural Networks |
Hadi Seyedarabi, Won-Sook Lee, Ali Aghagolzadeh, Sohrab Khanmohammadi |
|
Progressive transmission of vector-quantized images with security and fault-tolerance |
Shang-Kuan Chen and Ja-Chen Lin |
|
Convolutional Data Transmission System Using Real-Valued Self-Orthogonal Finite-Length Sequences | Jiong Le, Yoshihiro Tanada | 531-331 |
Image Registration for a Series Chest Radiograph Images |
Omar Mohd. Rijal, Norliza Mohd. Noor, Shee Lee Teng |
|
Lossless Compression of Biometric Image Data |
Roumen Kountchev, Vladimir Todorov, Roumiana Kountcheva, Mariofanna Milanova |
|
Discriminant Functions and Multi-Resolution Analysis (MRA) for Disease Detection |
Omar Mohd Rijal, Norliza Mohd Noor, Amran Hussin, Ong Ee Ling |
|
Temporal Video Compression By Discrete Wavelet Transform |
L.P. Teo, W.K. Lim, W.N. Tan, Y.F. Tan, H.T. Teng, Y.F. Chang |
SESSION: System Modelling and Applications of Signal Processing
Chair: Markus Borschbach
An artificial neural network approach to the classification of inferred intracranial signals |
Christos E. Vasios and George K. Matsopoulos |
|
Dynamic channel scheduling for uwb-based wpan |
Khaled Amailef, Jim Wu, Mahbub Hassan |
|
Channel Estimation forWireless OFDM Communication Systems |
Erol Onen, Aydin Akan, Luis F. Chaparro |
|
A Parallel Ultrasonic Sensors System: Prototypal Realization and Validation Tests |
Alessandra Fabrucci, Andrea Usai, Paolo Di Giamberardino |
|
An Alignment Based Fingerprint Matching Algorithm |
Liu Wei, Zhou Cong, Yan Puliu, Xia Delin |
|
Automated BSS-Algorithm Performance Evaluation |
Marina Charwath, Imke Hahn, Sascha Hauke, Martin Pyka, Slawi Stesny, Dietmar Lammers, Steffen Wachenfeld, Markus Borschbach |
|
Optimum setting of active filter parameters by using genetic algorithms |
M. Ghandchi, S. H. Hosseini, S. Ghaemi |
|
Security in IPv6 |
Ali Akbari Chianeh, Mohammadali Badamchi |
|
An Innovative Video Phone System in DHCP and Firewall Network Environment | Bing-Fei Wu, Chao-Jung Chen, Hsin-Yuan Peng | 521-172 |
PROGRAM
9th
WSEAS International Conference on
APPLIED
MATHEMATICS
(MATH '06)
Istanbul, Turkey,
Sponsored by WSEAS and WSEAS Transactions
May 27-29, 2006
Saturday, May 27, 2006
Plenary Lecture I
Expectation Value Based Mathematical Methodology in Quantum Optimal Control Problems
Prof. Metin Demiralp
Informatics
Institute
Istanbul Technical University, Turkey
Abstract: Quantum Optimal Control Problems are encountered in many fields of physics, chemistry and a lot of applied sciences and their mathematical background and tools are quite rich in nature. Since the most of the cost functionals used in these problems are beyond the quadratic nature, the variationally obtained control equations are nonlinear partial differential equations coupled with one or more functional equations. The character of the motion corresponds to a boundary value problem in time. The solution of these equations can be obtained through various standing methods. One of the recently developed methods to this end is based on the expectation values of certain quantum mechanical operators. Instead of the wavefunction's evolution, these expectation values' evolution is taken into consideration. The result is a set of coupled ordinary differential equations with nonliearities both in the structure and in the accompanied boundary conditions. Nevertheless they are ordinary differential equations and there is an abundance of methods to solve them. This presentation will cover the mainlines and important aspects of this approach after an introductory historical development section. Most recent applications will also be mentioned.
Plenary Lecture
II
Hebbian Learning and Negative Feedback Neural Networks
Professor Colin Fyfe
The University of Paisley, Scotland
Abstract: The central idea of this presentation is that artificial neural networks which use negative feedback of activation can use simple Hebbian learning to self-organise in such a way that they uncover interesting structure in data sets. The network in its simplest form performs a Principal Component Analysis. Extensions to the network are shown to perform Exploratory Projection Pursuit: they find low-dimensional filters of the data which reveal interesting structure in the data. For example, we might search for outliers from the main body of the data or clusters within the data set and this search can be performed in a hierarchical manner – we find one cluster in the midst of many and then re-project the data from this one cluster to attempt to find subclusters. There are two main ways of performing these searches and these are contrasted and compared and a composite method created which exhibits useful properties from the two underlying methods.
The network can also be used to find independent components of a data set in a number of different ways. For example, one extension to the basic network is shown to perform a type of Factor Analysis – it identifies a set of factors which when OR-ed together will construct the data set. Other methods are used to perform Independent Component Analysis which is extensively used in blind source separation – extracting one signal from a linear mixture of signals. The network can also be used for clustering in a topology preserving manner: there are several ways of clustering using this network in such a way that similar data points are clustered close to one another and only similar data points are treated this way.
In part 2 of the talk, twinned networks are introduced: these networks have two input data streams on which they self-organise using simple Hebbian learning with negative feedback again. In their basic form, the networks are shown to perform Canonical Correlation Analysis, the statistical technique which finds those filters onto which projections of the two data streams have greatest correlation. Various extensions of the basic methods are devised in order to create methods which react to more than two data streams at a time or which deal with problems such as multicollinearity. A further extension is the twinning of the Exploratory Projection Pursuit methods from the first part of the book so that the new network identifies shared structure across two data streams. This new network is also shown to perform Independent Component Analysis. A final chapter deviates somewhat from the rest of the book since its emphasis is on an extension of the Principal Curve algorithm so that we now have two curves learning on two data streams simultaneously.
Since the scope of the talk is the development of new algorithms, all algorithms which are derived analytically, are illustrated on artificial data before being used on real data sets. Where it is of interest, the results are compared with those from standard statistics or from alternative artificial neural networks.
SPECIAL SESSION: Numerical Modelling On Coastal Processes
Chair: Lale Balas
Numerical modelling of turbulent coastal processes |
Lale Balas, Alp Kucukosmanoglu |
|
Litter Categorization of Beaches in Wales, UK by Multi-layer Neural Networks |
Can Elmar Balas, Rifat Tur |
|
A Computational Risk Assessment Model for Breakwaters |
Can E. Balas, Rifat Tur |
|
A Nonlinear Wave Propagation Model |
Asu Inan, Lale Balas |
|
Free surface flow with moving rigid bodies. part 2. on the development of a numerical simulation tool |
Larisa A. Mironova, Oleg I. Gubanov, Serpil Kocabiyik |
SPECIAL SESSION: Application of Adomian Decomposition Method in Applied Mathematics
Chair: M. Najafi
On The Application Of Adomian Decomposition Method And Oscillation Equations |
M. Najafi, M. Moghimi, H. Massah, H. Khoramishad, M. Daemi |
|
On the application of ADM for solving a system of coupled Euler-Bernoulli Beams |
M. Najafi, M. Moghimi, H. Massah, H. Khoramishad, M. Daemi |
|
Approximated Solutions to Tow-dimensional and Axisymetric Jet Impinging Flows, Using Adomian Decomposition Method |
M. Najafi, M. Taeibi-Rahni, Kh. Javadi, S. F. Hosseinzadeh |
|
Fin and Slab Heat Transfer and Property Distribution, Using Adomian Decomposition Method |
M. Najafi, M. Ramezanizadeh, M. Taeibi-Rahni, M. H. Saidi |
|
An Approximated Solution to the Two-dimensional Lid-driven Cavity Flow, Using Adomian Decomposition Method and the Vorticity-Stream Function Formulation |
M. Najafi, M. Taeibi-Rahni, K. A. Avani |
|
A Study of Blasius Viscous Flow: An ADM Analytical Solution |
M. Najafi, H. Khoramishad, H. Massah, M. Moghimi, M. Daemi |
|
An ADM Closed Form Solution for Vibrating Strings |
M. Najafi, H. Khoramishad, H. Massah, M. Moghimi |
|
On the MADM Solution of Coupled Wave System with Mixed Boundary Condition |
M. Najafi, M. Daemi, H.R. Massah, M. Moghimi, H. Khoramishad |
|
A New Algorithm for Solving Riccati Equation Using Adomian Decomposition Method |
A. Fakharian, M. T. Hamidi Beheshti, M. Najafi |
|
Analytical and Computational Study of the Stability of Coupled Wave Equations |
M. Najafi, H. R. Massah |
SPECIAL SESSION: Application of the asymptotic method in non-linear dynamics of mechanical systems
Chair: Mihai Bugaru, Reza Tavakkoli-Moghaddam
Non-linear dynamic behavior of thin rectangular plates parametrically excited using the asymptotic method. Part1: Computation of the amplitude |
Mihai Bugaru, Eugen Trana, Tudor Chereches, Sorin Gheorghian |
|
Non-linear dynamics of geared systems using the asymptotic method. Part 1: Computation of the amplitude |
Mihai Bugaru, Tudor Chereches, Eugen Trana, Adrian Rotariu |
|
Non-linear dynamics of geared systems using asymptotic method. Part 2: Computation of the phase angle |
Mihai Bugaru, Sorin Gheorghian, Eugen Trana, Adrian Rotariu |
|
Non-linear dynamics of geared systems using the asymptotic method. Part 3: Computation of instability frontiers |
Mihai Bugaru, Sorin Gheorghian, Eugen Trana, Adrian Rotariu |
SESSION: Simulation and Modelling I
Chair: Parvin Kadivar
Intelligent Mining on Asynchronous E-learning Information System |
Genadijus Kulvietis, Jelena Mamcenko, Irma Sileikiene |
|
Multilevel Analysis in Complex Wavelet Transform Domain for Signal Processing Applications |
Ashish Khare, Uma Shanker Tiwary |
|
Unsymmetrical and Symmetrical Sparse Iterative Algorithm with Multiple Right-Hand-Sides Strategies |
D.T. Nguyen, A.P. Honrao, G. Hou, O. Akan, and O. Baysal |
|
Rollover Analysis of a Bus Using Beam and Nonlinear Spring Elements |
Su-Jin Park, Wan-Suk Yoo, Yuen-Ju Kwon |
|
Integration algorithms to construct semi-analytical Planetary theories |
Jose A. López, Miguel Barreda, Jorge Artés |
|
A Fuzzy Goal Programming Approach for a Single Machine Scheduling Problem |
Reza Tavakkoli-Moghaddam, Babak Javadi, Nima Safaei |
|
A Proposed Hierarchical Production Planning Structure for Combined MTS/MTO Environments |
A. H. Gharehgozli, M. Rabbani, R. Tavakkoli-Moghaddam |
|
Spectral generalized inverses of Toeplitz-related matrices |
M. C. Gouveia |
|
Control and Enslavement of Input DC Voltages of multilevel NPC inverter cascade |
F. Bouchafaaa, E. M. Berkouk, M. S. Boucherit |
|
Modelling and analysis and feedback control of nine-level NPC PWM rectifier - clamping bridge - nine-level NPC inverter Cascade |
A. Talha, F. Bouchafaa, E. M. Berkouk, M. S. Boucherit |
SESSION: Ordinary and Partial Differential Equations I
Chair: Mahadevan Ganesh
A Mathematical Model for Erythroid Regulation |
Kanchana Kumnungkit, I. Ming Tang |
|
Study of Prediction of Linear Motion Guide Rigidity through Grey Modeling of Linear Differential and Linear Difference Equations |
Y. F. Hsiao, Y. S. Tarng, K. Y. Kung |
|
The series expansions of generalized hypergeometric functions |
G. Bognar, E. Rozgonyi |
|
A second-order combined compact upwind difference scheme for the Navier-Stokes equations |
Xian Liang , Zhenfu Tian |
|
The Numerical Solution for Singular Integro- Differential Equations in Generalized Holder Spaces |
Iurie Caraus, Nikos E. Mastorakis |
|
High-order Approximations to the Mie–series for Electromagnetic Scattering in Three Dimensions |
M. Ganesh, S. C. Hawkins |
|
An improved genetic algorithm for the dynamic cargo crew pairing problem |
Shaw Ching Chang |
|
Benjamin-Feir Type Instability of Sine-Gordon Equation and Spectrum of Lame Equation II |
Mayumi Ohmiya, Hiroshi Ohkura, Daisuke Okaue |
SESSION:
Simulation and Modelling II
Chair: Parvin Kadivar
Noncommutative Analysis: Application to Quantum Information Geometry |
Hiroshi Hasegawa |
|
Noncommutative Analysis: Application to Quantum Information Geometry II. Uniqueness Theorem |
Hiroshi Hasegawa |
|
Experimental Results in Shape Description |
Dorina Purcaru, Elena Niculescu |
|
The Role of Mathematics self-efficacy and Mathematics ability in the structural model of Mathematics performance |
Mahmood Kamali Zarch , Parvin Kadivar |
|
Homogenization in Nonlinear Chemical Reactive Flows |
Claudia Timofte |
|
Quantization of Nonconservative Systems |
Eqab M. Rabei, Abdul-Wali Ajlouni and Humam B. Ghassib |
Sunday, May 28, 2006
SESSION: Optimization and Modelling
Chair: Dimitrios Magos
An Application Of Lagrangean Decomposition To The Scheduling Of Hot Charged Rolling In Steel Production |
Ta-Cheng Chen |
|
Technologies Ranking by Super-Efficiency Analysis |
Reza Farzipoor saen |
|
Use of IAs based approach for the Cooperative Periodic Market |
Ta-Cheng Chen, Yi-Chih Hsieh |
|
Numerical, graphical and symbolic calculations with the only requirement of a web browser |
Javier Bilbao, Eugenio Bravo, Purificación González |
|
MPI Management of Hermite Collocation Computation on a Distributed-Shared Memory System |
E. N. Mathioudakis, P. Papadopoulou |
|
A dual heuristic for set partitioning |
Dimitrios Magos |
SESSION: Intelligent Systems and Applications
Chair: Ignacio Rojas
Skin-Cancer Region of Interest Detection using Jensen-Shannon Divergence |
C. Atae-Allah, A. Atae-Allah, I.Rojas, F.Rojas,O.Valenzuela, J.F.Gómez Lopera |
|
Fuzzy Boundaries of Sample Selection Model |
L. Muhamad Safiih, Anton Abdulbasah Kamil, M. T. Abu Osman |
|
Contribution Of Classical And Robust Principal Component Analysis To Depth Estimation |
Elena Castillo, Vicente Bayarri, Rafael Ferrer |
|
On Machine Dependency in Shop Scheduling |
Evgeny Shchepin, Nodari Vakhaniay |
|
Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval |
Nawara Chansiri , Siriporn Supratid , Chom Kimpan |
|
Complete convergence for negatively dependent random variables |
Hassan Zarei |
|
On a Convergence Result for Sequences of Functions with Multiple Scales |
Anders Holmbom, Jeanette Silfver |
SESSION: Discrete Mathematics and Optimization I
Chair: Yanping Bai
A Model Identification Approach Using MINLP Techniques |
Stefan Emet |
|
An Efficient Growing Ring SOM and Its Application to TSP |
Yanping Bai, Wendong Zhang |
|
An improved version of back-propagation algorithm with effective dynamic learning rate and momentum |
Mammadagha Mammadov, Engin Tas |
|
(2; 3; t)-Generations for the Tits simple group 2F4(2) |
Mohammed Ali Faya Ibrahim, Faryad Ali |
|
Nonsmooth Continuous-Time Multiobjective Optimization Problems with Invexity |
S. K. Mishra, S. Y. Wang, K. K. Lai |
|
A combined filter line search and trust region method for nonlinear programming |
Choong Ming Chin, Abdul Halim Abdul Rashid, Khalid Mohamed Nor |
SESSION: Numerical Methods I
Chair: Saulius Valentinavicius
Postprocessing error estimation taking to the account singularity effect |
Lina Vasiliauskiene, Saulius Valentinavicius, Romualdas Bausys |
|
Flank milling surface design with the least square approach |
Chenggang Li, Sanjeev Bedi, Stephen Mann |
|
Non-linear dynamic behavior of thin rectangular plates parametrically excited using the aymptotic method. Part 2: Computation of the phase angle |
Mihai Bugaru, Eugen Trana, Adrian Rotariu, Sorin Gheorghian |
SESSION: Non-Linear Systems and Non-Linear Dynamics I
Chair: Metin Demiralp, Teruji Sekozawa
Adaptive control architecture-based supply chain management (SCM) |
Pyoung Yol Jang |
|
A New Iterative Learning Control Method for Stabilizing a Class of Nonlinear Systems |
Mehdi Roopei |
|
An Adaptive Neural-Network Model-Following Speed Control of PMSM Drives for Electric Vehicle Applications |
Fayez F. M. El-Sousy |
|
Logarithmic High Dimensional Model Representation |
Metin Demiralp |
|
Necessary Conditions for the optimal control of the double-membrane system |
Ismail Kucuk |
SESSION: Discrete Mathematics and Optimization II
Chair: Taher Abualrub, Panos Tsikouras
On the Constructions of Cyclic Codes over the Ring Z2+uZ2 |
Taher Abualrub, Irfan Siap |
|
Estimation by MinxEnt Principle |
Aladdin Shamilov, Zerrin Asan, Cigdem Giriftinoglu |
|
Reversible Quaternary Cyclic Codes |
Taher Abualrub, Irfan Siap |
|
Dyck paths statistics |
A. Sapounakis, I. Tasoulas and P. Tsikouras |
|
Approximate subdi erentials of marginal Functions: the Lipschitzian case |
K. Allali |
SESSION: Non-Linear Systems and Non-Linear Dynamics II
Chair: Metin Demiralp, Teruji Sekozawa
Recent Advances in Nonlinear Optimal Feedback Control Design |
Tayfun Çimen |
|
Low Fuel Consumption Control Scheme Based on Nonlinear Optimzation for Engine and Continuously Variable Transmission |
Teruji Sekozawa |
|
A New Approach to Stabilize a Class of Nonlinear Systems by ILC Method |
Mehdi Roopaei, Meimanat Soleimanifar, Hadi Roopaei |
|
Application Of Wavelets To The Optimal Control Of A Parallel System Of Beams |
Ibrahim Sadek, Taher Abualrub, Marwan Abukhaled |
SESSION: Linear Systems and Applications I
Chair: Yiannis Saridakis
Preconditioning for solving Hermite Collocation by the Bi-CGSTAB |
E.N.Mathioudakis, E.P. Papadopoulou and Y.G.Saridakis |
|
The Matrix Analogs of Firey’s Extension of Minkowski Inequality and of Firey’s Extension of Brunn-Minkowski Inequality |
Poramate Pranayanuntana, John Gordon |
|
The Matrix Analog of the Kneser-Suss Inequality |
Poramate Pranayanuntana, Patcharin Hemchote, Praiboon Pantaragphong |
Monday, May 29, 2006
Tutorial I
High Dimensional Model Representation from Beginning to Present Status
Prof. Metin Demiralp
Istanbul Technical University, Turkey
Tutorial II
System Identification Using Evolutionary Algorithms
Prof. Alaa Sheta
Al-Balqa Applied University, Jordan
SESSION: Ordinary and Partial Differential Equations II
Chair: Andreas Boukas
A reformulation of the Ramsey model |
Elvio Accinelli and Juan Gabriel Brida |
|
On the uniqueness theorem for one nonstationary 3-D inverse heat conductivity problem in a layered domain |
Sharif Guseinov |
|
Quantum stochastic calculus and some of its applications |
Andreas Boukas |
|
Continues model for vertical vibration of tension leg platform |
M. R. Tabeshpour, A. A. Golafshani and M. S. Seif |
|
Six New Sequences of Orthogonal Polynomials |
Maitree Podisuk, Pongpan Rattanathanawan and Netchanok Kongchouy |
|
Solving the Initial Value Problem of Ordinary Differential of Higher Order by Integration Method |
Maitree Podisuk, Wannaporn Sanprasert, Chinda Chaichuay |
SESSION: Linear Algebra and Applications
Chair: Uwe Naumann
On Symbolic Jacobian Accumulation |
Ebadollah Varnik, Uwe Naumann |
|
Sensitivity of Closed Loop System Eignvalues to Structured Perturbations in System Parameters |
Ibrahim Hamarash, Ali Baqi, Shawbo AbdulKarem |
|
Lower Bound on the Size of Keys in Authentication Codes with Arbitration |
Boubacar Abba, You Hong |
|
On eigenvalues and eigenvectors of subdirect sums |
Francisco Pedroche Sάnchez |
SESSION: Numerical Methods II
Chair: Colin Fyfe
Comparison of Central and Upwind Flux Averaging in Overlapping Finite Volume Methods for Simulation of Super-Critical Flow with Shock Waves |
Saeed-Reza Sabbagh-Yazdi |
|
Non-Stationary Components Fixing Jacobi Iteration |
Jun Srisutapan, Sirikul Bunditsaovapak |
|
Numerical Modeling of Seawater Intrusion in Coastal Aquifer Using Finite Volume Unstruc |
Mehdi Hamidi and Saeed Reza Sabbagh Yazdi |
|
High Relative Precision of Eigenvalues Calculate with Jacobi Methods |
Ana Julia Viamonte, Rui Ralha |
|
Some Methods for Computing RMS Values and Phase Differences of Currents and Voltages |
Dorina Purcaru, Ion Purcaru, Elena Niculescu |
|
Calculation of the coupled thermal stress of a cylinder with non-linear surface heat-transfer coefficient and phase transformation during the quenching with various quenching media |
Cheng Heming, Xie Jianbin Li Jianyun, Hou Lijun |
|
A 4th-order Implicit Procedure for the Simulation of Acoustics |
Seongjai Kim |
SESSION: Statistics and Probabilistical Models I
Chair: Yasemin Ulu, Hassan Zarei
The Distribution of Minimizing Maximum Entropy: Alternative to Weibull distribution for wind speed |
Aladdin Shamilov , Ilhan Usta , Yeliz Mert Kantar |
|
Sparsification of Probabilistic Canonical Correlation Analysis |
Daniel Livingstone and Colin Fyfe |
|
An approach to generalize entropy optimization principles and related aspects of newtonΤs method |
A. Kh. Shamilov |
|
Forecasting with a Linex Loss: A Monte Carlo Study |
Yasemin Ulu |
|
Prediction under Multivariate Asymmetric Loss: A Monte Carlo Study |
Yasemin Ulu |
|
On a Functional defined by means of Kullback-Leibler Measure and Its Statistical Applications |
Aladdin Shamilov, Yeliz Mert Kantar, lhan Usta |
SESSION: Statistics and Probabilistical Models II
Chair: Yasemin Ulu, Hassan Zarei
Statistical Structure of Printed Turkish, English, German, French, Russian and Spanish |
Aladdin Shamilov, Senay Yolacan |
|
The Individuals Control Charts For BURR Distributed Data |
Betul Kan, Berna Yazici |
|
Adaptive Checkpointing Schemes for Fault Tolerance in Real-Time Systems with Task Duplication |
Zhongwen Li, Hong Chen |