• Non ci sono risultati.

COMPUTATIONAL METHODS AND INTELLIGENT SYSTEMS

N/A
N/A
Protected

Academic year: 2022

Condividi "COMPUTATIONAL METHODS AND INTELLIGENT SYSTEMS"

Copied!
16
0
0

Testo completo

(1)
(2)

COMPUTATIONAL METHODS AND INTELLIGENT SYSTEMS

Proceedings of the 10th WSEAS International Conference on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL

ENGINEERING (MMACTEE'08)

Hosted and Sponsored by Technical University of Sofia

Sofia, Bulgaria, May 2-4, 2008

Electrical and Computer Engineering Series A Series of Reference Books and Textbooks

Published by WSEAS Press www.wseas.org

ISBN: 978-960-6766-60-2

ISSN: 1790-5117

(3)

COMPUTATIONAL METHODS AND INTELLIGENT SYSTEMS

Proceedings of the 10th WSEAS International Conference on MATHEMATICAL METHODS AND

COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08 )

Hosted and Sponsored by

Technical University of Sofia

Sofia, Bulgaria, May 2-4, 2008

Electrical and Computer Engineering Series A Series of Reference Books and Textbooks

Published by WSEAS Press www.wseas.org

Copyright © 2008, by WSEAS Press

All the copyright of the present book belongs to the World Scientific and Engineering Academy and Society Press. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the Editor of World Scientific and Engineering Academy and Society Press.

All papers of the present volume were peer reviewed by two independent reviewers. Acceptance was granted when both reviewers' recommendations were positive.

See also: http://www.worldses.org/review/index.html

ISBN: 978-960-6766-60-2 ISSN: 1790-5117

World Scientific and Engineering Academy and Society

(4)

COMPUTATIONAL METHODS AND INTELLIGENT SYSTEMS

Proceedings of the 10th WSEAS International Conference on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL

ENGINEERING (MMACTEE'08 )

Hosted and Sponsored by Technical University of Sofia

Sofia, Bulgaria, May 2-4, 2008

Honorary Editors:

Lotfi A. Zadeh, Univ. of Berkeley, USA

Janusz Kacprzyk,, International Fuzzy Systems Association, POLAND

Editors:

Dimitar P. Dimitrov, Dean of Faculty of Automatics, Technical University of Sofia, Bulgaria

Dana Simian, University Lucian Blaga, Sibiu, Romania Valeri Mladenov, Technical University of Sofia, Bulgaria Snejana Jordanova, Technical University of Sofia, Bulgaria

Nikos Mastorakis, Military Instititutes of University Education, Hellenic Naval Academy, Greece

(5)

International Program Committee Members:

Lotfi A. Zadeh,Univ. of Berkeley, USA

Janusz Kacprzyk, International Fuzzy Systems Association, POLAND Leonid Kazovsky, Univ. of Stanford, USA

Charles Long, University of Wisconsin, USA Katia Sycara, Carnegie Mellon University, USA

Nikos E. Mastorakis, Military Inst. of University Education (ASEI), HNA, GREECE

Roberto Revetria, Univ. degli Studi di Genova, USA M. Isabel Garcia-Planas, Univ. of Barcelona, SPAIN Miguel Angel Gomez-Nieto, University of Cordoba, SPAIN Akshai Aggarwal, University of Windsor, CANADA

Pierre Borne, Ecole Centrale de Lille, FRANCE

George Stavrakakis, Technical Univ. of Crete, GREECE

Angel Fernando Kuri Morales, Univ. of Mexico City, MEXICO Arie Maharshak, ORT Braude College, ISRAEL

Fumiaki Imado, Shinshu University, JAPAN

Simona Lache, University Transilvania of Brasov, ROMANIA Toly Chen, Feng Chia University, TAIWAN

Isak Taksa, The City University of New York, USA G. R.Dattatreya, University of Texas at Dallas, USA Branimir Reljin, University of Belgrade, Serbia

Paul Cristea, University "Politehnica" of Bucharest, Romania

(6)

Preface

This book contains proceedings of the Proceedings of the 10th WSEAS International Conference on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE '08) which was held in Sofia, Bulgaria, May 2-4, 2008.

The reader can read state-of-the-art academic papers, high quality contributions and some breakthrough works on computational methods and intelligent systems from all over the world. Nice applications related to European and International industrial projects decorate a truly important panorama on computational methods and intelligent systems and their modern applications in our real life.

We thank the Technical University of Sofia for the sponsorship and the support. This conference aims to disseminate the latest research and applications in the Evolutionary Computing. The friendliness and openness of the WSEAS conferences, adds to their ability to grow by constantly attracting young researchers. The WSEAS Conferences attract a large number of well-established and leading researchers in various areas of Science and Engineering as you can see from http://www.wseas.org/reports. Your feedback encourages the society to go ahead as you can see in http://www.worldses.org/feedback.htm

The contents of this Book are also published in the CD-ROM Proceedings of the Conference. Both will be sent to the WSEAS collaborating indices after the conference: www.worldses.org/indexes

In addition, papers of this book are permanently available to all the scientific community via the WSEAS E-Library.

Expanded and enhanced versions of papers published in these conference proceedings are also going to be considered for possible publication in one of the WSEAS journals that participate in the major International Scientific Indices (Elsevier, Scopus, EI, ACM, Compendex, INSPEC, CSA .... see:

www.worldses.org/indexes) these papers must be of high-quality (break-through work) and a new round of a very strict review will follow. (No additional fee will be required for the publication of the extended version in a journal). WSEAS has also collaboration with several other international publishers and all these excellent papers of this volume could be further improved, could be extended and could be enhanced for possible additional evaluation in one of the editions of these international publishers.

Finally, we cordially thank all the people of WSEAS for their efforts to maintain the high scientific level of conferences, proceedings and journals.

We are sure that this volume will be source of knowledge and inspiration for other academicians, scholars, advisors and industrial practitioners and will be considered as one more brilliant edition of the WSEAS related with a brilliant conference sponsored by Technical University of Sofia.

(7)

COMPUTATIONAL METHODS AND INTELLIGENT SYSTEMS

Table of Contents

Plenary Lecture I: Use of Intelligent Evolutionary Agents in the Analysis of Genomic Signals

11

Paul Dan Cristea

Plenary Lecture II: Some IP Security Issues 12

Zoran Bojkovic

Plenary Lecture III: An Integrating View on DNA Computing and Membrane Computing 13 Rudolf Freund

Use of Intelligent Evolutionary Agents in the Analysis of Genomic Signals 15 Paul Dan Cristea

Contours Extraction in Grayscale Images of Sign Language Interpreter 22 Roumen Kountchev, Vladimir Todorov, Roumiana Kountcheva

Adaptive Histogram Modification for Enhancement the Visual Quality of Latent

Fingerprints 28

Roumen Kountchev, Vladimir Todorov, Roumiana Kountcheva

Adaptive preprocessing of scanned documents 34

Roumen Kountchev, Vladimir Todorov, Roumiana Kountcheva

Reconfigurable Hardware Implementation of a Fast and Efficient Motion Detection

Algorithm 40

E.M. Saad, A. Hamdy, and M.M. Abutaleb

Some aspects regarding the cooperative control problem for flying wing air

vehicles 46

Boscoianu Mircea, Pahonie Radu

Transfer Function Representation Approach of the LWR Macroscopic Traffic Flow

Model Based on the Green Function 53

Emil Nikolov

The Segment Approach Time Axis Algorithm for Proxy Bidding Application in Online

Auction 61

Po-Hsian Huang

Database Encryption Using Enhanced Affine Block Cipher Algorithm 71 Noor Habibah Arshad, Saharbudin Naim Tahir Shah, Azlinah Mohamed, Abdul Manaf Mamat

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 7 ISSN: 1790-5117

(8)

Electronic Business Communities Model Using Agent Technology 77 Azlinah Mohamed, Nor Zuraina Kamarul Ariffin, Noor Habibah Arshad, Yap May Lin, Fauzah Mohd

Mokhtar

Automated dialog systems for Romanian language 83

Chivu Catalin, Chivu Catrina

Some properties from q calculus 91

Dorin Florin Sofonea

The Fox 's H function and unsteady hydromagnetic boundary layer in a rotating

medium 96

Stelian Turbatu

Ontologies for Competence Description in Multi-agent Systems 100 Alexandru Cicortas, Victoria Iordan, Antoanela Naaji

Using Artificial Neural Networks for Modeling Suspended Sediment Concentration 108 Yu-Min Wang, Seydou Traore And Tienfuan Kerh

A Climatic Data Information Model for Computing Crop Yields in Burkina Faso 114 Yu-Min Wang, Seydou Traore And Tienfuan Kerh

Security Aspects in Wireless Networks 120

Bojan Bakmaz, Miodrag Bakmaz, Zoran Bojkovic

I-extended Databases 126

Zakaria Suliman Zubi

Some IP Security Issues 138

Zoran Bojkovic

Clustering Analysis of Motif Significance Profile in Software Networks 145 Zhang Lin, Qian Guanqun, Zhang Li

Stability of a star-shaped coupled network of strings and beams 148 Xu Gen Qi, Nikos E. Mastorakis

A Novel Correlation Pulse Echo Methodology for Transmission Line Fault Identification

and Location using Pseudorandom Binary Sequences 155

Richard A. Guinee

Enabling Gigabit IP for Intelligent Systems 162

Nick Tsakiris, Greg Knowles

Aspects of Airborne Continuous Surveillance Systems. Practical Image Encryption

Module. 167

Ciprian Răcuciu, Nicolae Jula’ Constantin Bălan, Cosmin Adomnicăi

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 8 ISSN: 1790-5117

(9)

Toward a Theory of Validation of Hybrid Fuzzy-Neuro Systems 172 Mokhtar Beldjehem

Application of geographic information systems and stochastic methods in the research

of global changes 176

Stoynov Pavel

Investigation of Technology-based Entrepreneurship and Issues with ICT Innovation in

Australia 179

Geoff Skinner

Design and Development of Embedded Control System for a Lime Delivery Machine 186 George K. Adam, Georgia Garani, Nicholas Samaras, Vilem Srovnal, Jiri Koziorek, Vladimir Kasik,and Jiri Kotzian

System for Measuring and Collecting Data-Results of Measuring on Combined System 192 Petr Mastny

A numerical algorithm for solving Laplace and Poisson type partical differential equations on a uniform rectangular mesh with Dirichlet and Neumann boundary

conditions 198

Vasos Pavlika

Business to Employee (B2E) E-Business Model: a Service to Employees or

Organisational Management? 207

Mohini Singh, Dianne Waddell, Md Mahbubur Rahim

Region Shrinking and Image Segmentation Based on the

Compressing Vector Field 217

X. D. Zhuang and N. E. Mastorakis

A New Mathematical Model Based on Laplace and Modified Z Transform For

Investigation of Three-Phase Switched Circuits 224

Jiri Klima

Cognitive Image Representation Based on Spectrum Pyramid Decomposition 230 Roumen Kountchev, Stuart Rubin, Mariofanna Milanova, Vladimir Todorov, Roumiana Kountcheva

A real-time intrusion prevention system for commercial enterprise databases and file

systems 236

Ulf T. Mattsson

Optimizing Distributed Systems Using Swarm Intelligence 245 Calin Ciufudean

Fatigue based structural design optimization implementing a generalized Frost-

Dugdale crack growth law 251

K.Krishnapillai, R. Jones, D.Peng

Short-range Principle in the Theory of the Charge Carrier Scattering in CdHgSe Solid

Solution 259

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 9 ISSN: 1790-5117

(10)

Orset Malyk

Simulation and optimization of Westinghouse cycle 263

Miroslava Smitkova, Frantisek Janicek

The Synthesis of Biological Molecules in the Universe 267 Nigel Aylward

Effects of Management Innovation on Industry Development: the Example of

Telecommunication Industry in China 274

Wu Weiweia, Chen Qianga, He Huib

Mathematical Programming Applied in the Optimal Power Flow Problem DC: Case

Studies of Market Needs 281

Emerson Eustaquio Costa, Luiz Danilo Barbosa Terra, George Leal Jamil

A data gathering algorithm for a mobile sink in large-scale sensor networks 288 E.M. Saad, M.H. Awadalla, M.A. Saleh, H. Keshk, and R.R. Darwish

Cooperative Intelligent System for Manufacturing Scheduling 295 Ana Madureira Joaquim Santos Ivo Pereira

The simulation of the adaptive systems using the MIT rule 301 Coman Adrian, Axente Corneliu, Boscoianu Mircea

Some Aspects Regarding the Adaptive Control of a Flying Wing- Micro Air Vehicle with

Flexible Wing Tips 306

Boscoianu Mircea, Pahonie Radu, Coman Adrian

Parameter Tuning and Evaluation of an Affinity Prediction Using Protein-Protein

Docking 312

T. Yoshikawa, K. Tsukamoto, Y. Hourai, K. Fukui

Business Intelligence Solution for University Management 318 Carlo Dell’aquila, Francesco Di Tria, Ezio Lefons, And Filippo Tangorra

Cognitive Conditions in Text Reading on a Visual Display Terminal

by Different Age Groups 325

Yuka Kawasaki, Hironori Sasaki, Haruhisa Yamaguchi, Yumi Yamaguchi

A Research of the Elliptic Curve Cryptology Applies to the IPv6 Protocol 331 Po-Hsian Huang

Author Index 337

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 10 ISSN: 1790-5117

(11)

Plenary Lecture I

Use of Intelligent Evolutionary Agents in the Analysis of Genomic Signals

Professor Paul Dan Cristea Bio-Medical Engineering Center, University "Politehnica" of Bucharest,

ROMANIA

E-mail: pcristea@dsp.pub.ro

Abstract: Surprising regularities in the distribution of nucleotides and pairs of nucleotides along the genomes of both prokaryotes and eukaryotes become evident when converting nucleotide sequences from symbolic to digital form. These regularities make the structure of a genome be less like that of a "plain text", which simply conveys a semantics in accordance to a grammar, and more like that of a "poem", which obeys additional structural rules that give "rhythm" and "rhyme". Direct applications of the rules satisfied by nucleotide sequences are (1) objective evaluation of sequencing process quality, (2) prediction of nucleotides sequences similarly to time series, (3) revealing of genome ancestral structure, (4) analysis of pathogen variability. Intelligent Evolutionary Agents are used to track pathogen variability, specifically to identify drug resistance mutations, without the need of the conventional lengthily and expensive phenotypic clinical studies that request pathogen culture.

Brief Biography of the Speaker: Paul Cristea graduated the Faculty of Electronics and Telecommunications of the University "Politehnica" of Bucharest (UPB) in 1962, the Faculty of Physics of the University of Bucharest in 1969, and got a Ph.D. in Technical Physics in 1970. Since then his research and teaching activities covered an extended area of Electrical Engineering and interdisciplinary domains including topics like Genomic Signals, Digital Signal and Image Processing, Neural and Evolutionary Systems, Evolutionary Intelligent Agents, Intelligent e-Learning Environments, a.o. He is the author or co-author of more then 130 published papers, 11 patents, and has contributed to more then 20 books in these fields. Currently, he is the director of the Bio-Medical Engineering Center of PUB, director of the Romanian Bioinformatics Society, and an associated member of the Romanian Academy.

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 11 ISSN: 1790-5117

(12)

Plenary Lecture II Some IP Security Issues

Dr. Zoran Bojkovic Full Prof. of Electrical Engineering,

Senior Member IEEE, WSEAS member, EURASIP member University of Belgrade

SERBIA

E-mail: z.bojkovic@yahoo.com

Abstract: IP security (IPsec) is a suite of protocols for searing Internet Protocol (IP) communications by authenticating and or encrypting each IP packet in a data stream. IP packets do not have any inherent security. As a result there is no guarantee that a received IP packet is from the claimed sender contains original data that the sender put in it or was not sniffed during transit. IPsec provides a method to protect IP datagrams and is commonly used in Virtual Private Networks (VPNs). It defines a method for specifying the traffic to protect, how that traffic is to be protected and to whom the traffic is sent. From thee point of view of multimedia networks, security is important to be recognized for current and future users and implements. In response to IP security issues, Internet Architecture Board (IAB) included authentication and encryption as necessary security features in the next-generation IP, which has been used as IPv6. Fortunately, these security capabilities were designed to be usable both with the current IPv4 and the IPv6. Following an introduction, this presentation begins by introducing Internet Key Exchange (IKE) protocol. The goal of thus protocol is to establish and maintain shared security parameters and authenticable keys between the two IPsec end points. For both IPv4 and IPv6 the choice of Encapsulating Security Payload (ESP) protocol and Authentication Header (AH) is offered. The IP ESP provides confidentiality, along with optional (but strongly recommended) authentication and integrity protection. The IP AH provides integrity and authentication and

integrity protection.

The next parts of this lecture cover frameworks for basic security concepts and security technology. The IP security architecture uses the concept of a security association as the basis for building security function into IP. A security association is simply the bundle of algorithms and parameters (such as keys) that is being used to encrypt and authenticate a parameter flow in one direction. In bi-directional traffic, the flows are secured by a pair of security associations. Security technology is a term that relates to the technical methods used to realize security requirements (cryptographic mechanisms, hash schemes, key management methods). Next part of this presentation covers infrastructure for future mobile networks because they will be open to different services and service providers. Also, five seacurity features groups (network access security, network domain security, user domain security, application domain security, visibility and configurability of security) are analyzed. Finally, infrastructure security definitions, requirements and security context together with network operator’s security requirements, requirements from user’s, network’s as well as service’s perspective are enclosed.

Brief Biography of the Speaker: Zoran S. Bojkovic received the Diploma in electrical engineering and the M.S. and Ph.D.

degree all from the Faculty of electrical engineering, University of Belgrade, Serbia. He is a professor of Electrical Engineering at the University of Belgrade. He is the co-author of the books “Introduction to Multimedia Communications”

(Wiley 2006), “Multimedia Communications Systems” (Prentice-Hall 2002) and “Packet Video Communications over ATM Networks” (Prentice-Hall 2000), all with prof. K. R. Rao from the University of Texas at Arlington, USA. He has published in international peer-reviewed journals and participated in many scientific and industrial projects. He is Editor-in-chief for the WSEAS Transactions on Communications and WSEAS Transaction Science and Applications. He is IEEE Senior member and EURASIP member.

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 12 ISSN: 1790-5117

(13)

Plenary Lecture II

An Integrating View on DNA Computing and Membrane Computing

Rudolf Freund

Vienna University of Technology Institute of Computer Science

Favoritenstr. 9–11, Vienna AUSTRIA rudi@emcc.at

Abstract: In the area of molecular computing, the two fields of DNA computing and membrane computing are dealing with different operations and objects, yet both based on biological processes. In this paper, the similaritiesbetween these two approaches are considered from a theoretical point of view, and the possibilities to transfertheoretical results from one area to the other one are exhibited.

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 13 ISSN: 1790-5117

(14)

AUTHOR INDEX

Abutaleb, M.M. 40

Adam, G.K. 186

Adomnicăi, C. 167 Adrian, C. 301

Adrian, C. 306

Ariffin, N.Z.K. 77 Arshad, N.H. 71, 77 Awadalla, M.H. 288 Aylward, N. 267

Bakmaz, B. 120

Bakmaz, M. 120

Bălan, N.J.C. 167 Beldjehem, M. 172

Bojkovic, Z. 120, 138

Catalin, C. 83

Catrina, C. 83

Cicortas, A. 100 Ciufudean, C. 245 Corneliu, A. 301 Costa, E.E. 281 Cristea, P.D. 15 Darwish, R.R. 288 Dell’aquila, C. 318 Emil Nikolov 53

Fukui, K. 312

Garani, G. 186

Guanqun, Q. 145 Guinee, R.A. 155

Hamdy, A. 40

Hourai, Y. 312

Huang, P.-H. 61, 325

Huib, H. 274

Iordan, V. 100

Jamil, G.L. 281 Janicek, F. 263

Jones, R. 251

Kasik, V. 186

Kawasaki, Y. 331

Kerh, T. 108, 114

Keshk, H. 288

Klima, J. 224

Knowles, G. 162 Kotzian, J. 186

Kountchev, R. 22, 28, 34, 230

Kountcheva, R. 22, 28, 34, 230 Koziorek, J. 186

Krishnapillai, K. 251 Lefons, E. 318

Li, Z. 145

Lin, Y.M. 77

Lin, Z. 145

Madureira, A. 295

Malyk, O. 259

Mamat, A.M. 71

Mastny, P. 192

Mastorakis, N.E. 148, 217 Mattsson, U.T. 236

Milanova, M. 230

Mircea, B. 46, 301, 306 Mohamed, A. 71, 77

Mokhtar, F.M. 77

Naaji, A. 100

Pavel, S. 176

Pavlika, V. 198

Peng, D. 251

Pereira, I. 295

Qi, X.G. 148

Qianga, C. 274

Răcuciu, C. 167

Radu, P. 46, 306

Rahim, M.M. 207

Rubin, S. 230

Saad, E.M. 40, 288 Saleh, M.A. 288

Samaras, N. 186

Santos, J. 295

Sasaki, H. 331

Shah, S.N.T. 71

Singh, M. 207

Skinner, G. 179 Smitkova, M. 263 Sofonea, D.F. 91 Srovnal, V. 186 Tangorra, F. 318 Terra, L.D.B. 281

Todorov, V. 22, 28, 34, 230 Traore, S. 108, 114,

Tria, F.D. 318

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 337 ISSN: 1790-5117

(15)

Tsakiris, N. 162 Tsukamoto, K. 312

Turbatu, S. 96

Waddell, D. 207

Wang, Y.-M. 108, 114 Weiweia, W. 274

Yamaguchi, H. 331 Yamaguchi, Y. 331 Yoshikawa, T. 312 Zhuang, X. D. 217

Zubi, Z.S. 126

10th WSEAS Int. Conf. on MATHEMATICAL METHODS AND COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING (MMACTEE'08), Sofia, Bulgaria, May 2-4, 2008

ISBN: 978-960-6766-60-2 338 ISSN: 1790-5117

(16)

Riferimenti

Documenti correlati

Proceedings of the 13th IASME/WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering (MMACTEE '11)..

This year the 13th WSEAS International Conference on MATHEMATICAL METHODS, COMPUTATIONAL TECHNIQUES AND INTELLIGENT SYSTEMS (MAMECTIS '11), the 10th WSEAS International

This year the 12th WSEAS International Conference on MATHEMATICAL and COMPUTATIONAL METHODS in SCIENCE and ENGINEERING (MACMESE '10) was held at the University of Algarve,

This year the 12th WSEAS International Conference on MATHEMATICAL METHODS and COMPUTATIONAL TECHNIQUES in ELECTRICAL ENGINEERING (MMACTEE '10) was held at the Politehnica

This year the 6th WSEAS International Conference on 12th WSEAS International Conference on MATHEMATICAL METHODS, COMPUTATIONAL TECHNIQUES AND INTELLIGENT SYSTEMS (MAMECTIS

The conference remains faithful to its original idea of providing a platform to discuss environmental protection, pollution control, environmental modeling, energy problem

The conference remains faithful to its original idea of providing a platform to discuss plasticity, fracture, and damage mechanics, mechanics of nanomaterials,

The research accomplishments are reflected through publications in an authored book (Nova Scientific Publishers), 6 chapters in books (Cambridge Scientific Publishers, Wiley