Wednesday, June 27, 2007

Computer Science Postgraduate Colloquium

Dalam CD beberapa paper yg berkaitan:

  • Plan Nutritious Menu Using Genetic Algorithm
  • Integrating Crew Details Criterion for Team Oriented

Other available papers :

Artificial Intelligence

  • Processing of Engineering Drawings for the Purpose of Segmentation
  • Automated Fish Recognition using Fourier Descriptors and Moment Invariant
  • Agent-Based Simulation of Pedestrian Movements in Masjid Al-Haram
  • Identifying and Quantifying Rare Hypothesis in an Agent’s Prediction
  • Image Processing Approach to Brain Volume Calculation
  • A Multiplexor-based Framework For Generic Data Mining
  • Using Ontology in Image Processing: Framework
  • An Automatic Approach for Underwater Image and Video Enhancement
  • A Study on Integrating Genetic Level and Neuronal Level in Brain Modeling and Intelligent Machines
  • Analysis of Live Cell Images: A Framework
  • A Framework for Fish Recognition and Classification Using Statistical Approach
  • Image Segmentation Techniques for Fish Recognition
  • Enhancement of Learning Process for Robot Behaviors in Simulated Environment
  • Arabic number Recognition Using Neural Network
  • Solving the NP-hard Combinatorial Optimization Problem Using Ant Colony Optimization Metaheuristic and its Application
  • Implementation of the proposed translation protocol between RSW control criteria and SIP standards

Health Informatics

  • Discovering Novel Knowledge from Medical Documents: Extracting Knowledge from Disparate Sources in Automated Case Base Enrichment
  • An Ontology and Constraint-based Approach for Dynamic Personalized Planning

Information System Engineering

  • Approaches to Enhancing RosettaNet Standards Component
  • Non-Repudiation in Web Services Interactions

Natural Language Processing

  • Automatic Speech Segmentation for Continuous Speech Recognition and Speech Labeling
  • Automated Rules Extraction using Hierarchical Divide Clustering (HDC)
  • Integrating syntax and phonology in hierarchical structure in speech synthesis

Parallel and Distributed Computing

  • ELECTRE III in Virtual Organization Grid Policy Creative Agent Negotiation
  • Dynamic Image Allocation Algorithm
  • Deploying Distributed Database Management System in Grid Technology
  • Simple Belief Revision for Jadex Agent
  • Developing Mobile Phone Distributed Applications, Limitations and Considerations
  • Applying Mobile Agents on Mobile Grid Computing

Computer Networks and Communication

  • Comparison Study Among Routing Protocols (RIP, OSPF and BGP) of IPv4 Vs IPv6 Environment
  • Overhead Minimization in Nested NEMO
  • Handling Transmission Error for IPv6 Packets over Fiber Optic Links
  • Defending Servers against Naptha Attack
  • An Application Layer Fragmentation and Reassembly Algorithm for Video Conferencing to Override Firewall Rules
  • Linguistic Steganography : A Potential of Malay Language Steganography
  • Network Address Translation (NAT) from Termianal Client to Termianal Client
  • Wireless Sensor networks: An Introduction

Multimedia

  • UML-based Hypermedia Design Method: A Review on Design Processes and Modeling Elements
  • A Representation Structure of E-book Builder for personalising E-book Specification
  • Mobile Video-on-Demand in Wireless Ad-hoc Networks
  • Multi-modal Fusion for Video Analysis: An Overview

Software Engineering

  • A New Approach to 3D Morphing
  • GUI layout design for a better interface to improve software understanding

Other

  • Evaluating The Location of Middle East and East Africa Ports Using Data Envelopment Analysis (DEA)
  • Multi-Relational Data Mining – A Survey
  • NEMO Security Management with CA-PKI and Random Number
  • Fractal Public-Key Encryption Protocol
  • Neuro-Fuzzy and Intrusion Detection: A Survey
  • Policy Management System for Virtual Organization
  • A Review of Automatic Image Annotation and its Applications
  • Data Semantic Approach for Deciding Job Scheduling in Grid System
  • Development of robust digital watermarking framework for compressed video against Geometric Attacks

No comments: