International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, 1st Edition

  • Published By:
  • ISBN-10: 331901854X
  • ISBN-13: 9783319018546
  • DDC: 006.3
  • Grade Level Range: College Freshman - College Senior
  • 741 Pages | eBook
  • Original Copyright 2014 | Published/Released June 2014
  • This publication's content originally published in print form: 2014

  • Price:  Sign in for price



This volume contains papers presented at SOCO 2013, CISIS 2013 and ICEUTE 2013, held in Salamanca (Spain), September 2013. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena. After a through peer-review process, the 8th SOCO 2013 International Program Committee selected 40 papers, an acceptance rate of 41%. A special emphasis was put on the organization of four special sessions, organized related to relevant topics as: Systems, Man, and Cybernetics; Data Mining for Industrial and Environmental Applications; Soft Computing Methods in Bioinformatics; and Soft Computing Methods, Modelling and Simulation in Electrical Engineer. The aim of the 6th CISIS 2013 conference was to bring together academic and industry-related researchers in the vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the event. The CISIS 2013 International Program Committee selected 23 papers, reflecting an acceptance rate of 39%. For the 4th ICEUTE 2013, the International Program Committee selected 11 papers. Paper selection was rigorous to maintain the high quality of the conference.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Soco 2013.
Cisis 2013.
Iceute 2013.
1: Soco 2013.
2: General Track.
3: Evolutionary Computation and Optimization.
4: Parsimonious Support Vector Machines Modelling for Set Points in Industrial Processes Based on Genetic Algorithm Optimization.
5: A Multi-level Filling Heuristic for the Multi-objective Container Loading Problem.
6: Multiple Choice Strategy Based PSO Algorithm with Chaotic Decision Making – A Preliminary Study.
7: Optimization of Solar Integration in Combined Cycle Gas Turbines (ISCC).
8: Performance of Chaos Driven Differential Evolution on Shifted Benchmark Functions Set.
9: A Neural Network Model for Energy Consumption Prediction of CIESOL Bioclimatic Building.
10: ACO Using a MCDM Strategy for Route Finding in the City of Guadalajara, México.
11: Microcontroller Implementation of a Multi Objective Genetic Algorithm for Real-Time Intelligent Control.
12: Solving Linear Systems of Equations from BEM Codes.
13: Mean Arterial Pressure PID Control Using a PSO-BOIDS Algorithm.
14: Intelligent Systems.
15: Empirical Study of the Sensitivity of CACLA to Sub-optimal Parameter Setting in Learning Feedback Controllers.
16: Optimization Design in Wind Farm Distribution Network *.
17: Intelligent Model to Obtain Initial and Final Conduction Angle of a Diode in a Half Wave Rectifier with a Capacitor Filter.
18: Prosodic Features and Formant Contribution for Speech Recognition System over Mobile Network.
19: The Fuzzy WOD Model with Application to Biogas Plant Location.
20: Applications.
21: The Application of Metamodels Based on Soft Computing to Reproduce the Behaviour of Bolted Lap Joints in Steel Structures.
22: Bayesian Networks for Greenhouse Temperature Control.
23: Towards Improving the Applicability of Non-parametric Multiple Comparisons to Select the Best Soft Computing Models in Rubber Extrusion Industry.
24: Ear Biometrics: A Small Look at the Process of Ear Recognition.
25: Classification and Clustering Methods.
26: Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings.
27: Orthogonal Matching Pursuit Based Classifier for Premature Ventricular Contraction Detection.
28: Text Classification Techniques in Oil Industry Applications.
29: Special Sessions.
30: Systems, Man, and Cybernetics.
31: A Domestic Application of Intelligent Social Computing: The SandS Project.
32: Clustering of Anonymized Users in an Enterprise Intranet Social Network.
33: Intelligent Model for Fault Detection on Geothermal Exchanger of a Heat Pump.
34: Data Mining for Industrial and Environmental Applications.
35: A Comparative Study of Machine Learning Regression Methods on LiDAR Data: A Case Study.
36: Principal Component Analysis on a LES of a Squared Ribbed Channel.
37: Modeling Structural Elements Subjected to Buckling Using Data Mining and the Finite Element Method.
38: Design and Optimization of Welded Products Using Genetic Algorithms, Model Trees and the Finite Element Method.
39: Soft Computing Methods in Bioinformatics.
40: Gene Clustering in Time Series Microarray Analysis.
41: Quality of Microcalcification Segmentation in Mammograms by Clustering Algorithms.
42: Local Iterative DLT for Interval-Valued Stereo Calibration and Triangulation Uncertainty Bounding in 3D Biological Form Reconstruction *.
43: Classification of Chest Lesions with Using Fuzzy C-Means Algorithm and Support Vector Machines.
44: Soft Computing Methods, Modeling and Simulation in Electrical Engineering.
45: RBF Neural Network for Identification and Control Using PAC.
46: Analysis of the Effect of Clustering on an Asynchronous Motor Fuzzy Model.
47: Modelling the Technological Part of a Line by Use of Neural Networks.
48: Distribution of the Density of Current in the Base of Railway Traction Line Posts.
49: Smart Home Modeling with Real Appliances.
50: Implementation of Fuzzy Speed Controller in Control Structure of A.C. Drive with Induction Motor.
51: Artificial Neural Network Modeling of a Photovoltaic Module.
52: Cisis 2013.
53: General Track.
54: Applications of Intelligent Methods for Security.
55: A Toolbox for DPA Attacks to Smart Cards.
56: Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network.
57: Supervised Machine Learning for the Detection of Troll Profiles in Twitter Social Network: Application to a Real Case of Cyberbullying.
58: Deterministic Tableau-Decision Procedure via Reductions for Modal Logic K.
59: Real-Time Polymorphic Aho-Corasick Automata for Heterogeneous Malicious Code Detection.
60: Twitter Content-Based Spam Filtering.
61: Content-Based Image Authentication Using Local Features and SOM Trajectories.
62: Anomaly Detection Using String Analysis for Android Malware Detection.
63: Classification of SSH Anomalous Connections.
64: Infrastructure and Network Security.
65: Provable Secure Constant-Round Group Key Agreement Protocol Based on Secret Sharing.
66: Analysis and Implementation of the SNOW 3G Generator Used in 4G/LTE Systems.
67: Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications.
68: Disclosure of Sensitive Information in the Virtual Learning Environment Moodle.
69: Using Identity-Based Cryptography n Mobile Applications.
70: SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations.
71: Identification of Degeneracies in a Classof Cryptographic Sequences.
72: Design of Nonlinear Filters with Guaranteed Lower Bounds on Sequence Complexity★.
73: The Isomorphism of Polynomials Problem Applied to Multivariate Quadratic Cryptography.
74: Social News Website Moderation through Semi-supervised Troll User Filtering.
75: Secure Android Application in SOA-Based Mobile Government and Mobile Banking Systems.
76: Extending a User Access Control Proposal for Wireless Network Services with Hierarchical User Credentials.
77: Randomness Analysis of Key-Derived S-Boxes.
78: A Ca Model for Mobile Malware Spreading Based on Bluetooth Connections.
79: Iceute 2013.
80: General Track.
81: Collaborative System for Learning Based on Questionnaires and Tasks.
82: From Moodle Log File to the Students Network.
83: Development of Projects as a Collaborative Tool for Competence Acquisition in the European Space for Higher Education Framework.
84: Yes, We Can (Can We Change the Evaluation Methods in Mathematics?).
85: Soft Computing Techniques for Skills Assessment of Highly Qualified Personnel.
86: Special Session.
87: Web 2.0.
88: Using Web 2.0 Tools to Support the Theoretical Constructs of Organisational Learning.
89: A Survey of Academics’ Views of the Use of Web2.0 Technologies in Higher Education.
90: Are Web2.0 Tools Used to Support Learning in Communities of Practice A Survey of Three Online Communities of Practice.
91: Learning Styles in Adaptive Games-Based Learning.
92: The Use of Games as an Educational Web2.0 Technology A Survey of Motivations for Playing Computer Games at HE Level.
93: Adopting the Use of Enterpise Mircoblogging as an Organisational Learning Approach.
Author Index.