Applied Computing: Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The focus of the Asian Applied Computing Conference (AACC) is primarily to bring the research in computer science closer to practical applications. The conference is aimed primarily at topics that have immediate practical bene?ts. By hosting the conf- ence in the developingnations in Asia we aim to provide a forum for engagingboth the academic and the commercial sectors in that region. The ?rst conference “Information Technology Prospects and Challenges” was held in May 2003 in Kathmandu, Nepal. Thisyear theconferencenamewas changedto “Asian AppliedComputingConference” to re?ect both the regional- and the application-oriented nature of the conference. AACC is planned to be a themed conference with a primary focus on a small set of topics although other relevant applied topics will be considered. The theme in AACC 2004 was on the following topics: systems and architectures, mobile and ubiquitous computing, soft computing, man machine interfaces,and innovative applications for the developing world. AACC 2004 attracted 184 paper submissions from around the world, making the reviewing and the selection process tough and time consuming. The selected papers covered a wide range of topics: genetic algorithms and soft computing; scheduling, - timization andconstraintsolving; neuralnetworksandsupportvectormachines;natural language processing and information retrieval; speech and signal processing; networks and mobile computing; parallel, grid and high-performance computing; innovative - plications for the developing world; cryptography and security; and machine lea- ing. Papers were primarily judged on originality, presentation, relevance and quality of work. Papers that had clearly demonstrated results were given preference.

Author(s): Rajeev Kumar, Peter Rockett (auth.), Suresh Manandhar, Jim Austin, Uday Desai, Yoshio Oyanagi, Asoke K. Talukder (eds.)
Series: Lecture Notes in Computer Science 3285
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 340
Tags: Computer Communication Networks; Information Systems Applications (incl.Internet); Artificial Intelligence (incl. Robotics); Software Engineering/Programming and Operating Systems; Theory of Computation; Information Systems and Communica

Front Matter....Pages -
Effective Evolutionary Multimodal Optimization by Multiobjective Reformulation Without Explicit Niching/Sharing....Pages 1-8
Development of Genetic Algorithm Embedded KNN for Fingerprint Recognition....Pages 9-16
Genetic IMM_NN Based Tracking of Multiple Point Targets in Infrared Image Sequence....Pages 17-25
Finding the Natural Groupings in a Data Set Using Genetic Algorithms....Pages 26-33
Volumetric Measurement of Heart Using PA and Lateral View of Chest Radiograph....Pages 34-40
On the Optimization of Fuzzy Relation Equations with Continuous t-Norm and with Linear Objective Function....Pages 41-51
Progressive Boosting for Classifier Committee Learning....Pages 52-58
Parallel SAT Solving with Microcontrollers....Pages 59-67
Flow Shop Scheduling with Late Work Criterion – Choosing the Best Solution Strategy....Pages 68-75
GA-Based Multiple Route Selection for Car Navigation....Pages 76-83
Genetic Algorithm for Airline Crew Scheduling Problem Using Cost-Based Uniform Crossover....Pages 84-91
Neural Network and Wavelets in Arrhythmia Classification....Pages 92-99
ECG Arrhythmia Analysis by Multicategory Support Vector Machine....Pages 100-107
Approximation of Multi-pattern to Single-Pattern Functions by Combining FeedForward Neural Networks and Support Vector Machines....Pages 108-114
Comparison of Numerical Integration Algorithms in Raster CNN Simulation....Pages 115-122
Morphological Analyzer for Manipuri: Design and Implementation....Pages 123-129
Using Selectional Restrictions for Real Word Error Correction....Pages 130-136
Mining Top – k Ranked Webpages Using Simulated Annealing and Genetic Algorithms....Pages 137-144
Using Document Dimensions for Enhanced Information Retrieval....Pages 145-152
Effect of Phonetic Modeling on Manipuri Digit Recognition Systems Using CDHMMs....Pages 153-160
Building Language Models for Tamil Speech Recognition System....Pages 161-168
Implementation of Tamil Speech Recognition System Using Neural Networks....Pages 169-176
Introducing Pitch Modification in Residual Excited LPC Based Tamil Text-to-Speech Synthesis....Pages 177-183
Separation Performance of ICA Algorithms on FECG and MECG Signals Contaminated by Noise....Pages 184-190
Evaluation of BER/PER Performance of a FLAMINGO Network....Pages 191-197
Fault Tolerance Studies for Wormhole Routing in Multiconnected Double-Loop Networks....Pages 198-204
Applications and Parallel Implementations of Metaheuristics in Network Design and Routing....Pages 205-213
Comparison of Integrated Micro and Macro Mobility Protocols....Pages 214-221
Genetic Algorithm Based Optimization for Location Update and Paging in Mobile Networks....Pages 222-231
Global Backfilling Scheduling in Multiclusters....Pages 232-239
Computation of Ternary Covering Arrays Using a Grid....Pages 240-246
Impact of Algorithm Design in Implementing Real-Time Active Control Systems....Pages 247-254
An Efficient Technique for Dynamic Slicing of Concurrent Java Programs....Pages 255-262
A Simple Delay Testable Synthesis of Symmetric Functions....Pages 263-270
VOBA – A Voice Based Newsgroup....Pages 271-278
An ICT Based Framework for Improving Rural Credit Delivery....Pages 279-286
An Approach Towards a Decentralised Disaster Management Information Network....Pages 287-295
A Web-Based Examination System in the Context of Bangladesh....Pages 296-301
Trust and Security Realization for Mobile Users in GSM Cellular Networks....Pages 302-309
A Software Agent Based Approach for Fraud Detection in Network Crimes....Pages 310-316
An Ontology for Network Security Attacks....Pages 317-323
Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions....Pages 324-332
Back Matter....Pages -