468x60 ads





This is featured post 1 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation test link ullamco laboris nisi ut aliquip ex ea commodo consequat.

This is featured post 2 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation test link ullamco laboris nisi ut aliquip ex ea commodo consequat.

This is featured post 3 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation test link ullamco laboris nisi ut aliquip ex ea commodo consequat.

This is featured post 4 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation test link ullamco laboris nisi ut aliquip ex ea commodo consequat.

This is featured post 5 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation test link ullamco laboris nisi ut aliquip ex ea commodo consequat.

Profil Groups 4

0 komentar

hello dear reader,,
I will introduce my groups :
Name : I Gede Alit Yoga Sedana
Nim : 110010013
hobbi : networking, playing badminton, read manga, watch anime
University : Stikom Bali 2011


Name : Agus Eka Jiwandanha
Nim : 110010122
Hoby : Sport
University : Stikom Bali 2011



Names   : Herry sasmito utomo
University : Stikom Bali 2011
Nim   : 110010417
Hobi       : Read Manga and watch Anime
Twitter   : @Herry_scarlet
Facebook   : http://facebook.com/Harry.shichibukai


Name : I Made Yoga Giovala
Nim : 110010074
Hoby : playing game and guitar
University : Stikom Bali 2011


Name : Adi Bayu Saputra
Nim : 110010066
hoby : photo editing and watch anime
University : Stikom Bali 2011


Nama : Rahmat Hadi Susanto
Nim : 110010183
Hoby : Futsal

SOFT COMPUTING APLICATION

5 komentar


Preface
The digital revolution and the explosive growth of the Internet have helped create collection of huge amounts of useful data of diverse characteristics. Data is a valuable and intangible asset in any business today. Databases and database technologies play a crucial role in maintaining and manipulating data. Various database models exist such as relational, hierarchical, network, flat, and object-oriented. Each model organizes data in a different way to make them suitable for the intended application.
Real world data are diverse and imprecise in nature. They are growing at a phenomenal rate. As the application needs are diverse they demand a completely different set of requirements on the underlying models. The conventional relational database model is no longer appropriate for heterogeneous data. The diverse characteristics of data and its huge volume demand new ways of carrying out data analysis. Soft computing is a new, emerging complementary discipline for traditional computing principles. It exploits the tolerance for imprecision and uncertainty to achieve solutions for complex problems.
Soft computing methodologies include fuzzy sets, neural networks, genetic algorithms, Bayesian belief networks and rough sets. Fuzzy sets provide a natural framework for dealing with uncertainty. Bayesian belief networks, neural networks, and rough sets are widely used for classification and rule generation. Genetic algorithms handle various optimization and search processes like query optimization and template selection. Rough sets handle uncertainty arising from granules in the domain of discourse.
The advent of soft computing marks a significant paradigm shift in computing. Currently it has a wide range of application. The various techniques of soft computing and their applications in database technologies are discussed in the chapters of this book.
The first chapter, titled “Fuzzy Database Modeling: An Overview and New Definitions,” by Angélica Urrutia and José Galindo gives an overview of fuzzy database modeling. Much of data in real world is not precise, but fuzzy. Zadeh’s fuzzy logic gives a tool to handle fuzzy data in decision making. Modeling of fuzzy data has been studied by a number of researchers. The authors of this chapter discuss further extensions in the field of fuzzy database modelling. This chapter starts with a review of contributions of previous authors with respect to fuzzy database modeling, particularly the FuzzyEER model. The chapter then proceeds to introduce and explain their proposed newly definitions pertaining to the FuzzyEER Model regarding fuzzy attributes, fuzzy degrees, and fuzzy entities. The newly introduced concepts are amply illustrated through suitable examples. The authors hope that the new definitions will further enhance FuzzyEER model to facilitate fuzzy queries and fuzzy data mining.
The author Pierre Collet, in the chapter “A quick presentation of Evolutionary Computation,” gives an easy-to-grasp exposition of generic evolutionary computation paradigm. After giving a brief historical perspective, the author presents a unified evolutionary algorithm. The various concepts involved are lucidly explained with examples. This chapter will be quite useful to get a gentle introduction and survey of generic evolutionary computation.
The third chapter, “Evolutionary Algorithms in Supervision of Error-free Control,” by Bohumil Sulc and David Klimanek, reports application of certain soft computing techniques in combustion control. Specifically, genetic and simulated annealing algorithms have been employed in a model-based controlled variable sensor discredibility detection. The authors outline procedure of incorporating genetic and simulated annealing algorithms in the control loop. They claim that such application of these soft computing techniques has a great importance in industrial practice because a timely predicted sensor malfunction helps to save additional costs resulting from unplanned shutdowns.
In the next chapter titled “Soft Computing Techniques in Spatial Databases,” its author Markus Schneider explains how two different soft computing techniques with different expressiveness can be used for spatial data handling in the context of spatial databases and Geographic Information Systems. The focus of this chapter is the design of the algebra systems named Vague Spatial Algebra (VASA) and Fuzzy Spatial Algebra (FUSA). A formal definition of the structure and semantics of both types of systems are also provided. Further, spatial set operations for both the algebras have also been discussed. Finally, a description of how these data types can be embedded into extensible databases is explained with sample queries.
In the fifth chapter, “Type-2 Fuzzy Interface for Artificial Neural Network”, the author Priti Srinivas Sajja introduces another hybrid soft computing technique. The field of applications of soft computing technique discussed by the author is the process of course selection performed by students. The author introduces a generic framework of type-2 fuzzy interface to an Artificial Neural Network system. The author covers the introduction of fuzzy logic, fuzzy membership functions, type-1 and type-2 fuzzy systems and Artificial Neural Networks (ANN) for novice readers. Also, the author gives the need for hybridization of ANN and fuzzy logic. Next, the author illustrates an experimental prototype with fuzzy interface and base ANN. In this system, the author uses type-2 fuzzy interface to feed input to the base ANN. The author claims that with sufficient amount of good quality input data, the system performs well and with minor modification, the system may be used for HR Management, aptitude testing and general career counseling.
In chapter VI, “A Combined GA-Fuzzy Classification System for Mining Gene Expression Databases,” the authors Gerald Schaefer and Tomoharu Nakashima introduce yet another hybrid soft computing technique. The field of application of soft computing technique discussed by the authors is gene expression database. After explaining fuzzy rule generation and fuzzy rule classification, the authors point out the very many fuzzy if-then rules that would result. The number of generated rules increases exponentially with the number of attributes involved and with the number of partitions used for each attribute. The genetic algorithm technique is employed to reduce the number of rules to a compact set. The authors discuss genetic operations employed and give their algorithm in detail and ways of improving its performance. The authors demonstrate their hybrid technique on three gene expression data sets that are commonly used in the literature, viz., Colon dataset, Leukemia dataset and Lymphoma dataset. Exhaustive simulation results are given. The authors state that their technique yields good results.
The chapter on “Fuzzy Decision Rule Construction Using Fuzzy Decision Trees (FDT): Application to E-Learning Database” by Malcolm J. Beynon and Paul Jones (Chapter VII) discusses an application of fuzzy logic–specifically fuzzy decision tree. The authors give two sets of extensive FDT analysis. The first analysis deals with a small example dataset to illustrate the concepts. The second FDT analysis is in the field of E-Learning and considers the student’s weekly online activities and subsequent performance in a university course. The authors emphasize visualization of results throughout the chapter.
Chapter VIII, “A Bayesian Belief Network Methodology for Modeling Social Systems in Virtual Communities: Opportunities for Database Technologies,” is contributed by the authors Ben K. Daniel, Juan-Diego Zapata-Rivera, and Gordon I.Mc Calla. Bayesian belief networks are used to model situations involving uncertainty arising in fields like social sciences. A Bayesian model encodes domain knowledge, showing relationships, interdependencies, and independencies among variables. However, knowledge engineering effort is required to create conditional probability for each variable in the network. This chapter describes an approach that combines both qualitative and quantitative techniques to elicit knowledge from experts without worrying about computing initial probabilities for training the model. The authors demonstrate their technique on a computational model of social capital in virtual communities.
The importance of preserving the accuracy and integrity of data in a database is highlighted in the chapter titled “Integrity Constraints Checking in a Distributed Database” by Hamidah Ibrahim. This chapter discusses checking integrity constraints in distributed databases. The author describes different integrity constraint tests that could be conducted in distributed databases. A review of the integrity constraints available in the literature is clearly given. Finally the author explains several strategies for checking the integrity constraints in distributed databases. The author also discusses important criteria for evaluating the integrity tests.
Authors G. Castellano, A. M. Fanelli, and M. A. Torsello in chapter X, “Soft Computing techniques in Content-Based Multimedia Information Retrieval,” clearly explain the basic concepts of the four techniques coming under the purview of softcomputing, viz., Fuzzy Logic, Neural Networks, Rough Sets, and Genetic Algorithm. They give a good literature survey on the application of each soft computing technique to Content Based Multimedia Information Retrieval(CB-MIR). They also give a good survey of the applicaiton of hybrid, neuro-fuzzy technique to CB-MIR. Next, the authors discuss in detail about applying hybrid neuro-fuzzy techniques to CB-MIR. They have contributed a system called VIRMA(Visual Image Retrieval by Shape MAtching) that enables users to search for images having a shape similar to the sketch of a submitted sample image. The neuro-fuzzy strategy enables one to extract a set of fuzzy rules that classify image pixels for the extraction of contours included in the processed image, so that this can be stored in the database. The authors show how the neuro-fuzzy technique is useful for CB-MIR.
Chapter XI, “An Exposition of Feature Selection and Variable Precision Rough Set Analysis: Application to Financial Data,” by Malcolm J. Beynon and Benjamin Griffiths presents a Variable Precision Rough Sets (VPRS) analysis of certain Fitch Individual Bank Rating (FIBR) datasets. There are two parts of elucidation undertaken in this chapter. First, the levels of possible pre-processing necessary for undertaking a Rough Set based Theory (RST) analysis and then the presentation of an analysis using VPRS. The vein graph software enables one to select a single β-reduct and derive the rules associated with the β-reduct. Two algorithms are used for feature selection namely ReliefF and RST_FS. The predictions based on the training and validation sets are displayed in the ‘Predictive Summary Stat’s panel.
Xenia Nadenova introduces the concept of Good Diagnostic Test (GDT) as the basis of her approach in “Interconnection of Class of Machine Learning Algorithms with Logical Commonsense Reasoning Operations” in chapter XII. This chapter explains the possibility of transforming a large class of machine learning algorithms into a commonsense reasoning processes by using well-known deduction and induction logical rules. The lattice theory is used for constructing a good classification test. The rules for implementing variant transitions have been constructed such as rules of generalization and specialization, inductive diagnostic rules, and dual inductive diagnostic rules. The commonsense reasoning rules have been divided into two classes. An algorithm DIAGaRa for inferring GMRTs has been proposed for incremental inferring of good diagnostic tests. The algorithm for inferring good tests is decomposed into subtasks and operations that are in accordance with main human common sense reasoning rules.
In chapter XIII, the authors Erhan Akdoğan, M. Arif Adlı, Ertuğrul Taçgın, and Nureddin Bennett propose a human-machine interface (HMI) to control a robot manipulator that has three-degrees of freedom for the rehabilitation of the lower limbs. This system uses a rule-based intelligent controller structure, combined with conventional control algorithms. It also has a user friendly GUI which can be used on the Internet, thereby allowing the patients to receive treatment at home. With HMI, the progress and the current state of a patient’s rehabilitation can be stored in the database. The system proposed in this chapter can handle common problems such as the transportation of patients, storage of data and availability of data of the progress of patient’s rehabilitation. The authors claim that by utilizing this system physiotherapists can treat several patients at the same time.
In the last chapter, “Congestion Control using Soft Computing”, the authors T.Revathi, and K.Muneeswaran discuss the phenomenon of network congestion. They recapitulate some of the important existing techniques for congestion control. Then they take up the congestion avoidance problem and explain the need for Active Queue Management (AQM). They review some of the AQM techniques available in the literature. Then the authors propose a soft computing technique called Fuzzy-enabled Active Queue Management (F-AQM) which addresses the influence of the queuing behavior in handling the traffic in a network. They design a fuzzy rule base represented in the form of a matrix indexed by queue length and rate of change of queue. They have studied the performance of their scheme by suitable simulation and compared the performance with that of Adaptive Virtual Queue (AVQ) techniques. It is claimed that the proposed method outperforms AVQ in reducing the number of dropped packets for different settings of Explicit Congestion Notification (ECN) and queue size.
Author(s)/Editor(s) Biography
K. Anbumani
Kalirajan Anbumani obtained his Bachelor of Engineering degree from the University of Madras (1962), Master of Engineering degree from the University of Pune (1967) and Ph.D degree from the Indian Institute of Science, Bangalore – all in India. Initially, he served in the industry for 2 years. Subsequently, he took up engineering teaching in government and private engineering colleges, Bharathiar university and Karunya University. After holding his last position as the Director, School of Computer Science and Technology, Karunya University, he has recently taken time off to engage in writing a book. Prof. Anbumani has many research publications, including chapters in books, in areas such as information security, data mining, data compression, multimedia information retrieval, soft-computing, object-oriented methodology, real-time systems and control. He has completed many funded projects and has conducted a number of conferences and chaired conference sessions. Current interest of Prof. Anbumani covers security, including data hiding in multimedia.

R. Nedunchezhian
Raju Nedunchezhian
 is currently working as the Vice-Principal of Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India. Previously, he served as Research Coordinator of the Institute and Head of Computer Science and Engineering Department (PG) at Sri Ramakrishna Engineering College, Coimbatore. He has more than 17 years of experience in research and teaching. He obtained his BE(Computer Science and Engineering) degree in the year 1991, ME(Computer Science and Engineering) degree in the year 1997 and Ph.D(Computer Science and Engineering) in the year 2007. He has guided numerous UG, PG and M.Phil projects and organized a few sponsored conferences and workshops funded by private and government agencies. Currently, he is guiding many Ph.D scholars of the Anna University, Coimbatore and the Bharathiar University. His research interests include knowledge discovery and data mining, Soft Computing, distributed computing and database security. He has published many research papers in national/international conferences and journals. He is a Life member of Advanced Computing and Communication Society and ISTE.
Reviews and Testimonials
"The advent of soft computing marks a significant paradigm shift in computing. Currently it has a wide range of application. The various techniques of soft computing and their applications in database technologies are discussed in the chapters of this book."
- K. Anbumani

DETECTIVE CONAN

0 komentar





This series are about highschool detective Shinichi Kudo. When investigatin a case, he vas drugged and shrunk to a small kid. Now he calls himself Conan Edogawa and lives with his girlfrien Ran Mouri and her father, who is a detective. He is trying to find members of the Black organization to get the drug and cure himself. There is only one truth!
link download : http://www.arga7.net/2011/05/detective-conan.html

One Piece

0 komentar




A boy named Monkey D. Luffy, inspired by his childhood hero "Red-HairedShanks, sets out on a journey to find One Piece, the legendary treasure of the King of the PiratesGol D Roger. To accomplish this, he must reach the end of the most deadly and dangerous ocean: The Grand Line.
Luffy captains the Straw Hat Pirates first through the sea of East Blue and then through the Grand Line. He follows the path of the deceased King of the PiratesGol D. Roger, from island to island on his way to the great treasure One Piece. On his way his crew grows to have a swordsman Pirate Hunter Roronoa Zoro, anavigator Cat thief Nami, a sniper Sokeking Ussop, a cook Black leg Sanji, a doctor Tony Tony Choppa, an archaeologist Nico Robin, a shipwright Cyborg Franky, and a musician Dead Bone Brook.

During the course of the story, the crew contend with both other less moral pirate crews and the Marines. The latter are the subordinates of the corrupt World Government, who apparently seek justice by ending the Golden Age of Pirates. Many background story elements involve the delicate balance of power between the World Government and the world's most powerfulpirate crews, especially the yonkou, the four most powerfulpirates in the world.

link download : one piece

Nurarihyon no Mago: Sennen Makyou

0 komentar


At first glance, Nura Rikuo seems like nothing more than a normal middle-schooler. In actual fact, he is grandson of Nurarihyon, master of a youkai clan. Having only recently resolved the hostilities between the Nura Clan and the Shikoku Yokai, Rikuo finds no rest as an ancient enemy of the Nura Clan, Haguromo-Gitsune, resurfaces. After 400 years of inactivity, Haguromo-Gitsune suddenly sweeps through Kyoto with overwhelming power.



mengunci add or remove program

0 komentar


add-or-remove-programPernah ngalamin ga? Salah satu program di PC yang telah terinstall, tiba-tiba ada yang menghapus atau meremove…? Baik sengaja atau ga sengaja…, tapi yang jelas bikin kita dongkol,.., kesel and jengkol.
Nah sobat orb, untuk menghindari hal-hal tersebut ada sedikit tips dari orb yaitu dengan mengunci hak akses ke Add or Remove Programs, demi menjaga keamanan program-program yang terinstall dari mereka-mereka yang tidak atau kurang bertanggung jawab “manusia”. Hehhe……
Caranya mudah, dan tidak diperlukan keahlian khusus, seperti misalnya harus kuliah dulu,, wakakaka…….,
Klik Start > Run > ketik gpedit.msc kemudian ENTER atau OK tunggu beberapa saat hingga muncul menu editor seperti gambar di bawah.
add-remove-1
Kemudian Klik User Configuration > Administrative Templates > Control Panel >Add or Remove Programs sehingga muncul seperti gambar di bawah ini.
add-remove-2



Kemudian pada sisi sebelah kanan, klik double Add or Remove Program sehingga muncul dialog box seperti gambar di bawah ini.
add-remove-3
Kemudian pilih Enabled pada pilihan opsi tersebut. Setelah itu klik Apply dan/atau Ok. Setelah itu tutup jendela gpedit.msc.
Sekarang coba Anda buka Control Panel > klik Add or Remove Programs. Maka akan muncul konfirmasi bahwa Menu ini dibatasi hak aksesnya (Add or Remove Program has been restricted, please check with your Administrator), seperti gambar di bawah ini.
add-remove-4
Untuk membuka hak akses kembali, ulangi langkah di atas sampai pada pilihan opsi (Not configured, Enabled disabled). Pada opsi ini, pilih Not Configured, kemudian pilih Apply dan/atau OK, kemudian tutup jendela gpedit.msc.
Sekarang Menu Add or Remove Programs di Control Panel sudah bisa diakses lagi.
mudah kan.?? ga perlu kuliah dulu… hehhe….
met mencoba.
salam

beridiri sebuah blog baru

0 komentar

akhirnya blog yang saya buat selesai juga.
semoga blog yang saya buat dapat puas
hehehe

 

English Group 4 © 2011 Design by Best Blogger Templates | Sponsored by HD Wallpapers