ABSTRACT

These proceedings of the 2014 Pacific-Asia Workshop on Computational Intelligence in Industrial Application (CIIA 2014) include 81 peer-reviewed papers. The topics covered in the book include: (1) Computer Intelligence, (2) Application of Computer Science and Communication, (3) Industrial Engineering, Product Design and Manufacturing, (4) Automatio

part |2 pages

Section 1: Computer intelligence

chapter |6 pages

Research and implementation of component extraction based on design document

ByY.Q. Shi, J.W. Zhou & X.Y. Guo

chapter |8 pages

Learning to rank experts in heterogeneous academic networks through mutual reinforcement

ByZ.R. Liu, H.Y. Huang, X.C. Wei & X.L. Mao

chapter |6 pages

Research on security defense model of oil & gas gathering and transferring scada based on factor neural network

ByP. Liang, X.D. Cao, Y. Qin, W.W. Zhang & Q.H. Hu

chapter |4 pages

Research and implementation of K-means algorithm based on Hama

ByH.Y. Wei, H.L. Chen & L. You

chapter |4 pages

Education in the age of big data

ByY.L. Yang & H. Li

chapter |6 pages

Research on FPN-based security defense model of oil and gas SCADA network

ByW.W. Zhang, X.D. Cao, Q.C. Hu, P. Liang & Y. Qin

chapter |8 pages

Classification tag sorting algorithm based on web group behavior

ByD. Gao & S.H. Guo

chapter |4 pages

Integration of autonomous, cooperative and exploratory learning in modern college education

ByY.H. Zhang, X.H. Su & H.L. Zhang

chapter |6 pages

Identifying optimum time interval in a sequence database

ByA.K. Reshamwala & S.M. Mahajan

chapter |6 pages

Introduction of uncertainty in complex event processing

ByN. Mao & J. Tan

chapter |6 pages

QGA-SVM study on temperature compensation of liquid ammonia volumetric flowmeter

ByT. Lin, P. Wu, F.M. Gao, Y. Yu & L.H. Wang

chapter |8 pages

A NetFlow-based trac and direction analysis software

ByY. Chen & Y.J. Niu

chapter |4 pages

Teaching method investigation in international education

ByM.Y. Xiao, Y.F. Nie & G. Crouk

chapter |6 pages

A GIS simulation system development with oine GPS data generation

ByZ.L. Wang, Y.F. Hua, B.G. Cai, Z.H. Huang, G.G. Wang & T.B. Zhang

chapter |6 pages

Topology relations based on the integrative data model of vector and raster

ByY.T. Jin, X.F. Yang, Y.C. Wang & Z.W. Zhang

chapter |4 pages

Virtual machine migration strategy based on multi-objective optimization

ByZ.G. Chen & X.J. Wang

chapter |6 pages

Essential protein identification by a bootstrap k-nearest neighbor method based on improved edge clustering coecient

ByY.Q. Jiang, Y. Wang, G.S. Wang, G. Ou, C. Su & L. Huang

chapter |6 pages

An energy consumption model for the cooperative communication in wireless ad hoc networks

ByJ. Tang, X. Zou, L. Dong & W. Wang

part |2 pages

Section 2: Application of computer science and communication

chapter |4 pages

MOOC and advanced education reform in China

ByY.L. Yang & H. Li

chapter |6 pages

Fast single image dehazing method based on physical model

ByH.B. Liu, J. Yang, Z.P. Wu & Q.N. Zhang

chapter |4 pages

Data fusion of cyber physical systems

ByL. Chen, L.X. Shi & L.L. Kong

chapter |6 pages

Convergence analyses for the FOM and GMRES algorithm

ByL. Li & G.L. Wu

chapter |4 pages

Centralized log server construction and application in network management

ByJ.N. Yang, J.K. Yang & K. Lin

chapter |8 pages

A strong-security protocol based on AES algorithm for passive RFID tags

ByL.Q. Han, F. Yuan & Z.C. Xu

chapter |8 pages

An optimized nonlinear grey Bernoulli model and its application for epidemic prediction

ByL.P. Zhang, Y.L. Zheng, Y.J. Zheng, K. Wang & X.L. Zhang

chapter |8 pages

Study on communication interface solutions between FPGA and DSP

ByB. Song, Y.S. Liu, L. Feng & Z.Y. Zhang

chapter 3|8 pages

Three novel chaotic polynomials for image encryption using three dierent MOD operators

ByH.B. Kekre, P. Halarnkar & T. Sarode