International Joint Conference SOCO’13-CISIS’13-ICEUTE’13: Salamanca, Spain, September 11th-13th, 2013 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2013, CISIS 2013 and ICEUTE 2013, all conferences held in the beautiful and historic city of Salamanca (Spain), in September 2013.

Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena.

After a through peer-review process, the 8th SOCO 2013 International Program Committee selected 40 papers which are published in these conference proceedings, and represents an acceptance rate of 41%. In this relevant edition a special emphasis was put on the organization of special sessions.

Four special sessions were organized related to relevant topics as: Systems, Man, and Cybernetics, Data Mining for Industrial and Environmental Applications, Soft Computing Methods in Bioinformatics, and Soft Computing Methods, Modelling and Simulation in Electrical Engineer.

The aim of the 6th CISIS 2013 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.

After a through peer-review process, the CISIS 2013 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 39%.

In the case of 4th ICEUTE 2013, the International Program Committee selected 11 papers which are published in these conference proceedings.

The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the SOCO, CISIS and ICEUTE conferences would not exist without their help.

Author(s): Andrés Sanz-García (auth.), Álvaro Herrero, Bruno Baruque, Fanny Klett, Ajith Abraham, Václav Snášel, André C.P.L.F. de Carvalho, Pablo García Bringas, Ivan Zelinka, Héctor Quintián, Emilio Corchado (eds.)
Series: Advances in Intelligent Systems and Computing 239
Edition: 1
Publisher: Springer International Publishing
Year: 2014

Language: English
Pages: 741
Tags: Computational Intelligence; Artificial Intelligence (incl. Robotics)

Front Matter....Pages 1-29
Parsimonious Support Vector Machines Modelling for Set Points in Industrial Processes Based on Genetic Algorithm Optimization....Pages 1-10
A Multi-level Filling Heuristic for the Multi-objective Container Loading Problem....Pages 11-20
Multiple Choice Strategy Based PSO Algorithm with Chaotic Decision Making – A Preliminary Study....Pages 21-30
Optimization of Solar Integration in Combined Cycle Gas Turbines (ISCC)....Pages 31-40
Performance of Chaos Driven Differential Evolution on Shifted Benchmark Functions Set....Pages 41-50
A Neural Network Model for Energy Consumption Prediction of CIESOL Bioclimatic Building....Pages 51-60
ACO Using a MCDM Strategy for Route Finding in the City of Guadalajara, México....Pages 61-70
Microcontroller Implementation of a Multi Objective Genetic Algorithm for Real-Time Intelligent Control....Pages 71-80
Solving Linear Systems of Equations from BEM Codes....Pages 81-90
Mean Arterial Pressure PID Control Using a PSO-BOIDS Algorithm....Pages 91-99
Empirical Study of the Sensitivity of CACLA to Sub-optimal Parameter Setting in Learning Feedback Controllers....Pages 101-108
Optimization Design in Wind Farm Distribution Network....Pages 109-119
Intelligent Model to Obtain Initial and Final Conduction Angle of a Diode in a Half Wave Rectifier with a Capacitor Filter....Pages 121-130
Prosodic Features and Formant Contribution for Speech Recognition System over Mobile Network....Pages 131-140
The Fuzzy WOD Model with Application to Biogas Plant Location....Pages 141-150
The Application of Metamodels Based on Soft Computing to Reproduce the Behaviour of Bolted Lap Joints in Steel Structures....Pages 151-160
Bayesian Networks for Greenhouse Temperature Control....Pages 161-170
Towards Improving the Applicability of Non-parametric Multiple Comparisons to Select the Best Soft Computing Models in Rubber Extrusion Industry....Pages 171-180
Ear Biometrics: A Small Look at the Process of Ear Recognition....Pages 181-190
Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings....Pages 191-200
Orthogonal Matching Pursuit Based Classifier for Premature Ventricular Contraction Detection....Pages 201-210
Text Classification Techniques in Oil Industry Applications....Pages 211-220
A Domestic Application of Intelligent Social Computing: The SandS Project....Pages 221-228
Clustering of Anonymized Users in an Enterprise Intranet Social Network....Pages 229-236
Intelligent Model for Fault Detection on Geothermal Exchanger of a Heat Pump....Pages 237-247
A Comparative Study of Machine Learning Regression Methods on LiDAR Data: A Case Study....Pages 249-258
Principal Component Analysis on a LES of a Squared Ribbed Channel....Pages 259-268
Modeling Structural Elements Subjected to Buckling Using Data Mining and the Finite Element Method....Pages 269-278
Design and Optimization of Welded Products Using Genetic Algorithms, Model Trees and the Finite Element Method....Pages 279-288
Gene Clustering in Time Series Microarray Analysis....Pages 289-298
Quality of Microcalcification Segmentation in Mammograms by Clustering Algorithms....Pages 299-308
Local Iterative DLT for Interval-Valued Stereo Calibration and Triangulation Uncertainty Bounding in 3D Biological Form Reconstruction....Pages 309-318
Classification of Chest Lesions with Using Fuzzy C-Means Algorithm and Support Vector Machines....Pages 319-328
RBF Neural Network for Identification and Control Using PAC....Pages 329-337
Analysis of the Effect of Clustering on an Asynchronous Motor Fuzzy Model....Pages 339-348
Modelling the Technological Part of a Line by Use of Neural Networks....Pages 349-358
Distribution of the Density of Current in the Base of Railway Traction Line Posts....Pages 359-367
Smart Home Modeling with Real Appliances....Pages 369-378
Implementation of Fuzzy Speed Controller in Control Structure of A.C. Drive with Induction Motor....Pages 379-388
Artificial Neural Network Modeling of a Photovoltaic Module....Pages 389-397
A Toolbox for DPA Attacks to Smart Cards....Pages 399-408
Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network....Pages 409-418
Supervised Machine Learning for the Detection of Troll Profiles in Twitter Social Network: Application to a Real Case of Cyberbullying....Pages 419-428
Deterministic Tableau-Decision Procedure via Reductions for Modal Logic K....Pages 429-438
Real-Time Polymorphic Aho-Corasick Automata for Heterogeneous Malicious Code Detection....Pages 439-448
Twitter Content-Based Spam Filtering....Pages 449-458
Content-Based Image Authentication Using Local Features and SOM Trajectories....Pages 459-468
Anomaly Detection Using String Analysis for Android Malware Detection....Pages 469-478
Classification of SSH Anomalous Connections....Pages 479-488
Provable Secure Constant-Round Group Key Agreement Protocol Based on Secret Sharing....Pages 489-498
Analysis and Implementation of the SNOW 3G Generator Used in 4G/LTE Systems....Pages 499-508
Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications....Pages 509-516
Disclosure of Sensitive Information in the Virtual Learning Environment Moodle....Pages 517-526
Using Identity-Based Cryptography in Mobile Applications....Pages 527-536
SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations....Pages 537-546
Identification of Degeneracies in a Class of Cryptographic Sequences....Pages 547-556
Design of Nonlinear Filters with Guaranteed Lower Bounds on Sequence Complexity....Pages 557-566
The Isomorphism of Polynomials Problem Applied to Multivariate Quadratic Cryptography....Pages 567-576
Social News Website Moderation through Semi-supervised Troll User Filtering....Pages 577-587
Secure Android Application in SOA-Based Mobile Government and Mobile Banking Systems....Pages 589-599
Extending a User Access Control Proposal for Wireless Network Services with Hierarchical User Credentials....Pages 601-610
Randomness Analysis of Key-Derived S-Boxes....Pages 611-618
A CA Model for Mobile Malware Spreading Based on Bluetooth Connections....Pages 619-629
Collaborative System for Learning Based on Questionnaires and Tasks....Pages 631-640
From Moodle Log File to the Students Network....Pages 641-650
Development of Projects as a Collaborative Tool for Competence Acquisition in the European Space for Higher Education Framework....Pages 651-658
Yes, We Can....Pages 659-668
Soft Computing Techniques for Skills Assessment of Highly Qualified Personnel....Pages 669-678
Using Web 2.0 Tools to Support the Theoretical Constructs of Organisational Learning....Pages 679-688
A Survey of Academics’ Views of the Use of Web2.0 Technologies in Higher Education....Pages 689-698
Are Web2.0 Tools Used to Support Learning in Communities of Practice....Pages 699-708
Learning Styles in Adaptive Games-Based Learning....Pages 709-717
The Use of Games as an Educational Web2.0 Technology....Pages 719-728
Adopting the Use of Enterpise Mircoblogging as an Organisational Learning Approach....Pages 729-738
Back Matter....Pages 739-741