eighth international conference on intelligent systems ...toc.proceedings.com/04363webtoc.pdf · an...

22
Proceedings Eighth International Conference on Intelligent Systems Design and Applications ISDA 2008 26-28 November 2008 Kaohsiung, Taiwan Edited by Jeng-Shyang Pan Ajith Abraham Chin-Chen Chang Los Alamitos, California Washington Tokyo

Upload: others

Post on 21-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Proceedings

Eighth International Conference on Intelligent Systems Design and Applications

ISDA 2008

26-28 November 2008 Kaohsiung, Taiwan

Edited by Jeng-Shyang Pan

Ajith Abraham Chin-Chen Chang

Los Alamitos, California

Washington • Tokyo

Page 2: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

TABLE OF CONTENTS

NOVEL APPROACHES TO PERVASIVE APPLICATIONS Applying Embedded Hybrid ANFIS/Quantum-Tuned BPNN Prediction to Collision Warning System for Motor Vehicle Safety .......................................................................................................1

Bao Rong Chang, Chung-Ping Young, Hsiu Fen Tsai, Jian-Jr Lin

A Sense Based Similarity Measure for Cross-Lingual Documents .................................................................7Hsun-Hui Huang, Horng-Chang Yang, Yau-Hwang Kuo

An Intelligent Intrusion Detection System Based on UPnP Technology for Smart Living.........................12Mong-Fong Horng, Bo-Chao Chang, Bei-Hao Su

Image Fusion Based on Grey Polynomial Interpolation ................................................................................17Cheng-Hsiung Hsieh, Pei-Wen Chen, Chia-Wei Lan, Kuan-Chieh Hsiung

A Method of Camera Relationship Establishment Based on Temporal and Spatial Information of Video Clips...............................................................................................................................21

Hsien-Chou Liao, Cheng-Hsiung Hsieh, Yi-Ming Hsieh, Chih-En Wu

An Intelligent Agent for Personalized E-Learning.........................................................................................25Jin-Ling Lin, Ming-Hung Chen

A Method of Pulmonary Nodules Detection with Support Vector Machines ..............................................30Liu Lu, Liu Wanyu

A New Algorithm for Power System Scheduling Problems...........................................................................34Huo-Ching Sun, Yann-Chang Huang, Kun-Yuan Huang

Fast Estimation of Communication Cost for Thread Mapping in Computation Grids Using SVD.....................................................................................................................................................................39

Ti-Hsin Wang, Tyng-Yeu Liang, Chia-Hao Chang

Performance Comparison of ADRS and PCA as a Preprocessor to ANN for Data Mining.......................45Nicholas Navaroli, David Turner, Arturo I. Concepcion, Robert S. Lynch

INTELLIGENT SYSTEMS FOR IMAGE ANALYSIS Applying the Particle Swarm Optimization and Boltzmann Function for Feature Selection and Classification of Lymph Node in Ultrasound Images .............................................................................51

Chuan-Yu Chang, Cheng-Ting Lai, Shao-Jer Chen

Adaptive Template Block-Based Block Matching for Object Tracking.......................................................57Wu-Chih Hu

Image Thresholding Using Mean-Shift Based Particle Swarm Optimization .............................................61Chien-Cheng Lee, Yu-Chun Chiang, Cheng-Yuan Shih, Wen-Sheng Hu

Object-Based Image Retrieval Using Perceptual Grouping ..........................................................................67Tian-Luu Wu, Ji-Hwei Horng

Fragile Watermarking for H.264 Video Stream Authentication ..................................................................73Chuen-Ching Wang, Yu-Chang Hsu

Research on Solar Photovoltaic Surveillance System Base on Network.......................................................77Li De Jun, Liu Jie, Tian Yu Kang

Page 3: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

A Fast Recursive Algorithm for Gradient-Based Global Motion Estimation in Sparsely Sampled Field ....................................................................................................................................................80

Yong-Ren Huang

Fuzzy Possibility C-Mean Based on Complete Mahalanobis Distance and Separable Criterion.............................................................................................................................................................85

Hsiang-Chuan Liu, Der-Bang Wu, Jeng-Ming Yih, Shin-Wu Liu

Illumination Invariant Color Model for Image Matching and Object Recognition....................................91Hui-Fuang Ng, Yen-Wei Chu

A Scene Images Classification Method Based on Local Binary Patterns and Nearest-Neighbor Classifier............................................................................................................................................96

Guang Han, Chunxia Zhao

INTELLIGENT TECHNOLOGY FOR UBIQUITOUS COMPUTING Using Resampling for Optimizing Continuous Queries in Wireless Sensor Networks .............................101

San-Yih Hwang, Pin-Yu Liu, Chien-Hsiang Lee

Discovering Moving Clusters from Spatial-Temporal Databases ...............................................................105San-Yih Hwang, Chien-Ming Lee, Chien-Hsiang Lee

Malicious Webpage Detection by Semantics-Aware Reasoning .................................................................109Shih-Fen Lin, Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng, Chi-Sung Laih

The Design and Implementation of Zero-Copy for Linux ...........................................................................115Liu Tianhua, Zhu Hongfeng, Chang Guiran, Zhou Chuansheng

Research on Intelligent Systems Applied to Tourism Development Design...............................................121Wei Min

Heuristics for Dynamic Lot-Sizing with Plan Setup Cost in a Rolling Horizon Environment .................127Yooseong Choi, In-Jae Jeong

The Development of a Creativity-Enhancing Model for Innovative Design Concepts..............................133Zhiqiang Zhu, Sev Nagalingam, Hung-Yao Hsu

An Agent Based Rough Classifier for Data Mining .....................................................................................139Azuraliza Abu Bakar, Zulaiha Ali Othman, Abdul Razak Hamdan, Rozianiwati Yusof, Ruhaizan Ismail

Equivalence Between Weight Decay Learning and Explicit Regularization to Improve Fault Tolerance of RBF ..................................................................................................................................146

John Sum, Wun-He Luo, Yung-Fa Huang, You-Ting Jheng

Low Complexity Search Method for G.723.1 MP-MLQ Algorithm ...........................................................152R. S. Lin, Y. C. Chen, F. K. Chen

BIOINFORMATICS Prediction of Protein Subcellular Localizations ...........................................................................................156

Chin-Sheng Yu, Jenn-Kang Hwang

Advanced Plasmonic Biosensing Devices and Automation Systems for Disease Diagnostic and Drug Screening Applications ..................................................................................................................162

Nan-Fu Chiu, Tzuu-Shaang Wey, Chun Yu, Tzu-Chien Hsiao, Chii-Wann Lin

Research on the Reciprocity of Transceiver in the Smart Antenna Application.......................................168Fu Haiyang, Gao Peng, Ding Haibao

Page 4: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Genetic Annealing Optimization: Design and Real World Applications ...................................................174Mostafa A. El-Hosseini, Aboul Ella Hassanien, Ajith Abraham, Hameed Al-Qaheri

Intelligent Emotion Decision System for Autonomous Agents....................................................................180Xia Mao, Haiyan Bao, Zheng Li

Using Multi-attribute Utility Theory to Rank and Select Co-branding Partners .....................................186Wei-Lun Chang

User Behavior Analysis in Masquerade Detection Using Principal Component Analysis ........................192Han-Ching Wu, Shou-Hsuan Stephen Huang

Development of an Agent-Based Distributed Multi-axis Surface Milling Machining Service System ..............................................................................................................................................................198

Yung-Chou Kao, Mau-Sheng Chen

Neural Network Integration Fusion Model and Application ......................................................................204Xiaodan Zhang, Zhendong Niu

Thinned ECOC Decomposition for Gene Expression Based Cancer Classification..................................207Nima Hatami

INTELLIGENT DATA ANALYSIS AND APPLICATIONS 1 Multilingual Information Retrieval Using GHSOM ....................................................................................213

Hsin-Chang Yang, Chung-Hong Lee

An Intelligent PPQA Web Services for CMMI Assessment ........................................................................217Mei-Hui Wang, Chang-Shing Lee

A DEA/AHP Approach to Efficiency Investigation for Taiwan’s Retailing Industry via Financial Data Analysis ..................................................................................................................................223

YaFen Tseng, ShuChen Kao, TzaiZang Lee, ChienHsing Wu

Improving the Efficiency of Forward Checking Algorithm for Solving Constraint Satisfaction Problems......................................................................................................................................228

Yusef Farhang, M. R. Meybodi, A. R. Hatamlou

Fuzzy Clustering by Differential Evolution ..................................................................................................234Yucheng Kao, Jin-Cherng Lin, Shin-Chia Huang

Intelligent Aging Estimation Method for Lead-Acid Battery......................................................................239Yu-Hua Sun, Hurng-Liahng Jou, Jinn-Chang Wu

A Two-Stage Approach for AAM Fitting......................................................................................................245Mingcai Zhou, Yangsheng Wang, Xiaoyan Wang, Xuetao Feng

Analysis and Estimation of Micro-Doppler Effect in Passive Positioning System.....................................250Cai Miaohong, He Feng, Wu Lenan

Sequential Quadratic Programming Based on IPM for Constrained Nonlinear Programming...................................................................................................................................................254

Ximing Liang, Hassan A. Bashir, Shanchun Li

Notes on the Distinction of Gaussian and Cauchy Mutations .....................................................................260Kuo-Torng Lan, Chun-Hsiung Lan

Page 5: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

INFORMATION MANAGEMENT AND PROCESSING 1 Web Usage Mining Based on Clustering of Browsing Features..................................................................266

Chu-Hui Lee, Yu-Hsiang Fu

Content-Based Image Retrieval Based on Vector Quantization and Affine Invariant Region...............................................................................................................................................................272

Chin-Feng Lee, Shu-Ching Wang, Yi-Jia Wang

Novel Algorithms for Privacy Preserving Utility Mining ............................................................................276Jieh-Shan Yeh, Po-Chiang Hsu, Ming-Hsun Wen

Improvement of Wang-Li's Forward-Secure User Authentication Scheme with Smart Cards ................................................................................................................................................................282

Wen-Bing Horng, Cheng-Ping Lee

Intelligent Data Mining Approach for Fault Diagnosis ...............................................................................288Yann-Chang Huang, Huo-Ching Sun, Yu-Hsun Lin

A Rough Set and SVM Based Approach to Chinese Textual Affect Sensing.............................................292Xia Mao, Zheng Li, Haiyan Bao

Nonlinear Function Approximation Based on Least Wilcoxon Takagi-Sugeno Fuzzy Model .................297Tsung-Ying Sun, Shang-Jeng Tsai, Cheng-Han Tsai, Chih-Li Huo, Chan-Cheng Liu

An Evolutionary Classifier Based on Adaptive Resonance Theory Network II and Genetic Algorithm .........................................................................................................................................................303

I-En Liao, Shu-Ling Shieh, Hui-Ching Chen

Monitoring System for Vehicle Power Supply Based on CAN Bus ............................................................308Sujing Wang, Lide Wang, Ping Shen, Biao Liu

Fuzzy Fusion Method for Combining Small Number of Classifiers in Hyperspectral Image Classification....................................................................................................................................................312

Chun-Hsiang Chuang, Bor-Chen Kuo, Hsuan-Po Wang

INTELLIGENT USER INTERFACE DESIGN AND APPLICATION A Multi-agent Based Architecture for an Assistive User Interface of Intelligent Home Environment Control......................................................................................................................................318

Chih-Hsien Liang, Wei-Sheng Hung, Ming-Che Hsieh, Chung-Min Wu, Chin-Hsing Luo

Spoken Dialogue Agent Interface Requirements Modeling Based on PASSI Methodology.....................322Ming-Che Hsieh, Wei-Sheng Hung, Shin-Shing Shin, Shu-Wen Lin, Tsan-Hsun Huang

An Intelligent Brain Computer Interface of Visual Evoked Potential EEG ..............................................326Shih-Chung Chen, Shih-Chang Hsieh, Chih-Kuo Liang

A Multi-agent Based Testbed for Agent Interface Evaluation ....................................................................330Chung-Min Wu, Ming-Che Hsieh, Chin-Hsing Luo

CCSDS Advanced Orbiting Systems, Data Links Protocol: Study on Virtual Channels Scheduling Algorithm .....................................................................................................................................334

Qingli Liu, Chengsheng Pan, Guoren Wang, Wei Liu

Application of Neural Network Techniques on Nonlinear Channel Equalization for 16-QAM Modulation Systems .............................................................................................................................339

Chun-Yi Lo, Wan-de Weng

Page 6: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Using Chi-Square Automatic Interaction Detector to Solve the Polysemy Problems in a Chinese to Taiwanese TTS System ................................................................................................................345

Yih-Jeng Lin, Ming-Shing Yu, Chin-Yu Lin

Intelligent Focus+Context Volume Visualization .........................................................................................351Cheng-Kai Chen, Russell Thomason, Kwan-Liu Ma

An Exploratory Study on Malay Processing Tool for Acquisition of Taxonomy Using FCA ..................358Mohd Zakree Ahmad Nazri, Siti Mariyam Shamsudin, Azuraliza Abu Bakar

Using MPE with Bayesian Network for Sub-optimization to Entropy-Based Methodology ....................364Bor-Chen Kuo, Tien-Yu Hsieh, Hsuan-Po Wang

SOFT-COMPUTING TECHNOLOGIES AND APPLICATIONS ON IEM INTELLIGENT SYSTEMS 1 The Empirical Study of Fuzzy Performance Appraisal Applied on Securities Brokerage.......................370

Tien-Tsai Huang, Chien-Yi Chen

Composite Shewhart-Poisson GWMA Control Chart with Sensitizing Rules...........................................374Tse-Chieh Lin

Fuzzy Multiple Objective Programming Based on Interval-Valued Fuzzy Sets .......................................378Teng-San Shih, Huey-Ming Lee, Jin-Shieh Su

Genetic Optimization for Benefit-Oriented Data Broadcast in T-Learning Environments .....................384Chao-Chun Chen, Yong-Ming Huang, Lien-Fa Lin, Ding-Chau Wang

Term Weighting Approaches for Text Categorization Improving .............................................................390L. A. Matsunaga, N. F. F. Ebecken

Using Semi-discrete Decomposition for Topic Identification ......................................................................396Václav Snášel, Pavel Moravec, Jaroslav Pokorný

Implementation of an Intelligent HLA-Compliant Application Layer Gateway for Real-Time Flight Simulation ...................................................................................................................................402

Kuo-Wei Meng, Ming-Chuan Hung, Don-Lin Yang, Yeh-Ching Chung

Fuzzy Logic on Representation of Knowledge Structure and Measure of Similarity with Application on Mathematics Concepts for Pupils ........................................................................................408

Yuan-Horng Lin, He-Kai Chen, Wen-Liang Hung

The Influence of Order on a Large Bag of Words........................................................................................413Charles B. Prado, Felipe M. G. França, Ramon Diacovo, Priscila M. V. Lima

Improving VG-RAM WNN Multi-label Text Categorization via Label Correlation................................418Alberto F. De Souza, Claudine Badue, Bruno Zanetti Melotti, Felipe T. Pedroni, Fernando Líbio L. Almeida

INTELLIGENT DATA ANALYSIS AND APPLICATIONS 2 An Incremental FUSP-Tree Maintenance Algorithm ..................................................................................424

Chun-Wei Lin, Tzung-Pei Hong, Wen-Hsiang Lu, Wen-Yang Lin

An Evolution-Based Dynamic Scheduling Algorithm in Grid Computing Environment.........................429Kun-Ming Yu, Cheng-Kwan Chen

A Data Grid File Replication Maintenance Strategy Using Bayesian Networks .......................................435Chao-Tung Yang, Chien-Jung Huang, Ting-Chih Hsiao

Page 7: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

A Fast Elastic Net Method for Traveling Salesman Problem......................................................................441Junyan Yi, Weixing Bi, Gang Yang, Zheng Tang

A Dynamic Weighting Scheme for Providing Fair Communication Service to Nomadic Agents...............................................................................................................................................................447

SangWon Rhee, Kyu-Yeong Jeon, Sung Keun Song, Hyung Su Lee, Hee Yong Youn

Bounded PSO Vmax Function in Neural Network Learning ......................................................................453Y. S. Lee, S. M. Shamsuddin, H. N. Hamed

Solution of Fuzzy Relational Equation by Real-Valued GA........................................................................459Leh Luoh

Applying Experimental Statistical Method for the Preparation of Nanometric-Sized LiNi0.8Co0.2O2 Powders as a Cathode Material for Lithium Batteries....................................................464

Ching-Shieh Hsieh, Hsin-Ya Huang, Hui-Ling Fang, Wein-Duo Yang

An Approach of Chunk Parsing and Entity Relation Extracting to Chinese Based on Conditional Random Fields Model ................................................................................................................468

Jun-hua Wu, Jing Zhou

Earthquake Shelter Location Evaluation Considering Road Structure.....................................................474Yung-Lung Lee, Hiroaki Ishii, Cheng-An Tai

INFORMATION MANAGEMENT AND PROCESSING 2 Finding the Complete Set of Minimal Solutions for Fuzzy Max-Archimedean t-Norm Relational Equations .......................................................................................................................................477

Jun-Lin Lin

An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems .............................................................................................................................................................483

Shiuh-Jeng Wang, Yuh-Ren Tsai, Pin-You Chen

Interactive Mining of Frequent Patterns in a Data Stream of Time-Fading Models ................................489Ming-Yen Lin, Sue-Chen Hsueh, Chung-Yi Wang

Hierarchical P2P Networking and Two-Level Compression Scheme for Multi-agent System Supporting Context-Aware Applications.........................................................................................495

Joon Hwang Kim, Jeong Hun Chu, Seungwok Han, Chang Won Park, Hee Yong Youn

Segmentation of Brain Internal Structures Automatically Using Non-rigid Registration with Simultaneous Intensity and Geometric Match .....................................................................................501

Xiangbo Lin, Tianshuang Qiu, Su Ruan, Frederic Morain-Nicolier

Detection of the Cardiovascular Diseases by Using a Linearly Modeling System with the PSO-Based Classification Scheme .................................................................................................................507

Meng-Cheng Shen, Heng-Chou Chen, Chih-Hui Chen

NOx Estimation Based on Flame Image of High Temperature Air Combustion ......................................513Zengshou Dong, Mingjun Liu, Fengchun Zhang

Location Tracking with Power-Level Switching for Wireless Sensor Networks .......................................518Hung-Chi Chu, Chung-Jie Li, Ching-Yun Chen, Hong-Wen Yu

Traffic Identification of Tor and Web-Mix...................................................................................................524Xuefeng Bai, Yong Zhang, Xiamu Niu

Experiments with Boosted Decision Tree Classifiers ...................................................................................528Michal Wozniak

Page 8: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

EMERGING TECHNOLOGIES FOR INTELLIGENT VEHICULAR APPLICATIONS Cooperative Collision Warning Based Highway Vehicle Accident Reconstruction ..................................534

Chung-Ping Young, Bao Rong Chang, Jian-Jr Lin, Ren-Yang Fang

Design of an In-vehicle Anti-theft Component .............................................................................................539Jung-Hsuan Wu, Chien-Chuan Kung, Jhan-Hao Rao, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou

Point Clouds Construction Algorithm from a Home-Made Laser Scanner...............................................543Bagus Arthaya, Irwan Gunawan, Hendra Gunawan

The Novel Fuzzy Sliding Mode Control of Synchronous Reluctance Motor .............................................549Chien-An Chen, Huann-Keng Chiang, Chih-Huang Tseng

Immune System Assisted Radial Basis Function Network for OFDM System Channel Tracking in Dynamic Environments .............................................................................................................555

Jingchen Liu, Xiaogang Zang, Xinbao Gong

Rough Set Granularity in Mobile Web Pre-caching ....................................................................................560Sarina Sulaiman, Siti Mariyam Shamsuddin, Ajith Abraham, Shahida Sulaiman

The Innovation of Manufacturing Premise Based on Knowledge Obtained by Quality Accident Report...............................................................................................................................................566

Shujiro Murayama, Junko Shibata, Koji Okuhara, Hiroaki Ishii

Categorizing Heartbeats by Independent Component Analysis and Support Vector Machines ..........................................................................................................................................................572

Kuan-To Chou, Sung-Nien Yu

Wavelet-Based Bispectra for Motor Rotor Fault Detection ........................................................................576D.-M. Yang

An Approach for Achieving Self-Optimization in Mechatronic Systems Supported by Active Patterns ................................................................................................................................................581

J. Gausemeier, O. Znamenshchykov, S. Oberthür, H. Podlogar

SOFT-COMPUTING TECHNOLOGIES AND APPLICATIONS ON IEM INTELLIGENT SYSTEMS 2 Intelligent Stock Selecting via Bayesian Naive Classifiers on the Hybrid Use of Scientific and Humane Attributes ..................................................................................................................................587

Tien-Tsai Huang, Chir-Ho Chang

The Neural Network Algorithm for Data-Mining in Dynamic Environments ..........................................592Ching Lien Huang, Tsung-Shin Hsu, Chih-Ming Liu

Fuzzy Assessment for Sampling Survey Defuzzification by Signed Distance Method ..............................596Lily Lin, Huey-Ming Lee

Neural Network for Routing in a Directed and Weighted Graph...............................................................601Mehran Ghaziasgar, Armin Tavakoli Naeini

Petri Net Based Synthesis Method to Construct Optimal Controllers and Its Application to a Jobshop Scheduling......................................................................................................................................607

Eun Joo Lee, In-Jae Jeong, Jeehyoung Lee

Reactive Planning with Weak Plan Instances...............................................................................................613Frantisek Zboril_Jr., Vladimir Janousek, Radek Koci, Zdenek Mazal

Page 9: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

The Design of a Quality Control System of PCB with SMT Based on RFID and AOI .............................619Shih-Che Lo, Bei-Ming Li

Architecture Centric Approach to Enhance Software Testing Management ............................................624Fu-Shiau Li, Wei-Ming Ma, Architect Chao

Fault Diagnosis of Generator Based on D-S Evidence Theory....................................................................630Qingdong Du, Jin Li, Xiao Chen

SPECIAL SESSION ON NEW TECHNOLOGIES AND THEIR APPLICATIONS IN IMAGE ENGINEERING 1 A Novel Digital Watermarking Method for New Viewpoint Video Based on Depth Map .......................634

Ning Zhu, Guiguang Ding, Jianmin Wang

A Novel Algorithm for Object Tracking with Particle Filtering and GVF-Snake ....................................639Dong Chun-li, Dong Yu-ning

Anomaly Detection in Computer Networks Using Dissimilarity-Based One-Class Classifiers .........................................................................................................................................................645

Jun Ma, GuanZhong Dai

Robust Image Watermarking Using Mean Quantization in DTCWT Domain .........................................650Baolong Guo, Leida Li, Jeng-Shyang Pan, Liu Yang, Xiaoyue Wu

Design and Simulation of a Sliding Mode Controller for Reducing Radial Vibration of an Eccentric Rotor Equipped with an Automatic Dynamic Balancer .............................................................654

Chun-Lung Huang

An Embedded Fuzzy Type-2 Controller Based Sensor Behavior for Mobile Robot .................................660Siti Nurmaini, Siti Zaiton Mohd Hashim

Pattern Optimization and the Application in Question Answering ............................................................666Yongping Du, Ming He

Automatic Learning of Semantic Region Models for Event Recognition...................................................671Lei Gao, Chao Li, Yi Guo, Zhang Xiong

Predicting Protein-Protein Recognition Using Feature Vector...................................................................676Huang-Cheng Kuo, Ping-Lin Ong, Jia-Jie Li, Jen-Peng Huang

PCA-Based Face Verification and Passport Code Recognition Using Improved FKCN Algorithm .........................................................................................................................................................682

Kwang-Baek Kim, Am-suk Oh, Young-Woon Woo

SOFTWARE AGENT TECHNOLOGY AND APPLICATIONS An Efficient Forward and Backward Fault-Tolerant Mobile Agent System .............................................689

Jong-Shin Chen, Hong-Da Shi, Ching-Mu Chen, Zeng-Wen Hong, Pei-Lin Zhong

Design of an IDML-Based Interactive Agent Drama Authoring Tool .......................................................695Tai-Hong Chen, Jim-Min Lin, Kai-Yi Chin, Zeng-Wei Hong

The Study of Backup Mechanism for Web Services Based on MAS and Topic Maps..............................701Feng-Chao Yang, Jin-Ling Liao, Cheng-Li Chang

Applying Agent Composition for Development of Service-Oriented Program Language........................707Jong Yih Kuo, Frank Hsieh, Ho Chin Lin

Page 10: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Students’ Attention in Learning Process as a Research Domain: Software Agent Promotes Human-Robot-Computer Interaction ...........................................................................................................713

Sheng-Hui Hsu, Yueh-Min Huang

Application of Polynomial Neural Networks to Exchange Rate Forecasting.............................................718R. Ghazali, A. J. Hussain, M. N. Mohd. Salleh

A Cyclic Coding Based Perceptual Hashing Algorithm...............................................................................724Hui Zhang, Yanan Wang, Xiamu Niu

Multi-user Signals Combined with Quadratic Residue Code for Monitoring System ..............................728Chien-Jung Ho, Wen-Hao Hsieh, Gwo-Jia Jong

Data Mining of Geographical Accessibility for Tourism in Regional Area ...............................................732Koji Okuhara, Kuang-Yih Yeh, Hao-Ching Hsia, Hiroaki Ishii

Some Software Engineering and Knowledge Representation Principles for the Design and Construction of Ontology-Based Linguistic Resources................................................................................738

Francisco Alvarez, Antonio Vaquero, Fernando Sáenz

INTELLIGENT MULTIMEDIA RETRIEVAL AND WATERMARKING Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain..................744

Rui-Xin Zhan, K. Y. Chau, Zhe-Ming Lu, Bei-Bei Liu, W. H. Ip

Comments on "A Semi-blind Digital Watermarking Scheme Based on Singular Value Decomposition" ...............................................................................................................................................748

Ting-Xian Zhang, Wei-Min Zheng, Zhe-Ming Lu, Bei-Bei Liu

A Novel Image Authentication and Recovery Method for Applications of Image Sharing ......................752Chiang-Lung Liu

Population Control for Multi-agent Based Topical Crawlers .....................................................................758Alban Mouton, Pierre-Francois Marteau

H-Index Analysis of Enron Corpus ...............................................................................................................763Václav Snášel, Jirí Dvorský, Anton Timofieiev, Jaroslav Pokorný

Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification .....................................................................................................................................770

Zhi-Sam Lee, Mohd Aizaini Maarof, Ali Selamat, Siti Mariyam Shamsuddin

Multi-scale Entropy Based Traffic Analysis and Anomaly Detection ........................................................776Yan Ruo-Yu, Zheng Qing-Hua

Adaptive Knowledge Retrieving on Mobile Grid .........................................................................................783Yue-Shan Chang, Pei-Chun Shih, Yu-Cheng Luo

Fuzzy Crashing Problem on Project Management Based on Confidence-Interval Estimates .................789Feng-Tse Lin

On Genetic Algorithms for Boolean Matrix Factorization..........................................................................795Václav Snášel, Jan Platoš, Pavel Krömer

NOVEL COMPUTATION ON NETWORKING AND MULTIMEDIA COMMUNICATION A Scanning Method for Dotted Data Matrix ................................................................................................801

Yuan-Fei Cheng

Page 11: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

The Development of Enhanced Hash Mechanism for Improving Performance of IEEE 802.15.4.............................................................................................................................................................806

Bih-Yaw Shih, Jyun-Ying Tseng

The Image Watermarking Technique Using Visual Secret Sharing Strategy ...........................................812Shu-Chien Huang, Chu-Fu Wang

Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks.........................................................................................................818

Chu-Fu Wang, Shu-Chien Huang

Unknown Malicious Executable Defection....................................................................................................824Yingxu Lai

A Distributed Algorithm for 0-1 Knapsack Problem Based on Mobile Agent ..........................................830Shanping Qiao, Shixian Wang, Yongzheng Lin, Ling Zhao

A Novel Algorithm for Weighted-Fair Rate Control in Wireless Sensor Network ...................................835Lufeng Mo, Yueyun Shen

Verification of Mobile SMS Application with Model Checking Agent.......................................................839Siti Dianah Abdul Bujang, Ali Selamat

A Sort-Based DBA Algorithm for EPON System.........................................................................................845Wen-Ping Chen, Shih-Wei Kau, Bin-Yih Liao, Wen-Shyang Hwang, Wen-Tsung Hu

The Reform Schema and Usability of TD-SCDMA Smart Antenna ..........................................................851Fu Haiyang, Qu Xiaochun, Han Youcai

SPECIAL SESSION ON NEW TECHNOLOGIES AND THEIR APPLICATIONS IN IMAGE ENGINEERING 2 Image Registration Using Rotation Normalized Feature Points .................................................................857

Yang Zhan-long, Guo Bao-long

Efficient Intra Refresh Using Motion Affected Region Tracking for Surveillance Video over Error Prone Networks............................................................................................................................862

Jie Jiang, Baolong Guo, Wei Mo

Convergence Analysis of PSO Inspired by r- and K-Selection....................................................................867Yunyi Yan, Baolong Guo

Inertia-Adaptive Particle Swarm Optimizer for Improved Global Search ...............................................873Kaushik Suresh, Sayan Ghosh, Debarati Kundu, Abhirup Sen, Swagatam Das, Ajith Abraham

Fuzzy Logic Controllers for a Seismic Isolation System with Variable Friction Damper ........................879Ging Long Lin, Lyan Ywan Lu

Blind Image Deconvolution via Particle Swarm Optimization with Entropy Evaluation ........................885Tsung-Ying Sun, Chan-Cheng Liu, Yu-Peng Jheng, Jyun-Hong Jheng, Shang-Jeng Tsai, Sheng-Ta Hsieh

A Hybrid Feature Selection Mechanism .......................................................................................................891Hui-Huang Hsu, Cheng-Wei Hsieh, Ming-Da Lu

A Face Image Database for Evaluating Out-of-Focus Blur.........................................................................897Qi Han, Meihui Zhang, Chen Song, Zhifang Wang, Xiamu Niu

Wavelet-Based Image Fusion by Adaptive Decomposition .........................................................................903Yao-Hong Tsai, Yen-Han Lee

Page 12: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

DNA Computing and Its Applications...........................................................................................................908Junzo Watada, Rohani binti abu Bakar

APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND SOFT-COMPUTING 1 Unsupervised Clustering by Means of Hierarchical Differential Evolution Algorithm............................915

Chih-Chin Lai, Pei-Fen Lee, Pei-Yun Hsieh

Support Vector Regression for GDOP ..........................................................................................................920Wei-Han Su, Chih-Hung Wu

2D/3D Face Recognition Using Neural Networks Based on Hybrid Taguchi-Particle Swarm Optimization ....................................................................................................................................................925

Cheng-Jian Lin, Chen-Hsiang Chu, Chi-Yung Lee, Ya-Tzu Huang

Design of Self-Learning Fuzzy System by GA Approach ............................................................................931Shian-Tang Tzeng

Ant System Algorithm with Negative Pheromone for Course Scheduling Problem .................................937Djasli Djamarus, Ku Ruhana Ku-Mahamud

Compute the Term Contributed Frequency .................................................................................................943Cheng-Lung Sung, Hsu-Chun Yen, Wen-Lian Hsu

Output-Feedback PID Controllers for Robot Manipulators with Jacobian Uncertainty.........................947Chunqing Huang, Xiafu Peng

Intelligent Control for Principal Axis of Variable Vector Propeller of Submersible Vehicle ..................953Liu Sheng, Xu Dong-hao

A Novel Template Protection Algorithm for Iris Recognition ....................................................................958Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch

Implementation of Wiki-Based Knowledge Management Systems for Small Research Groups..............................................................................................................................................................964

Chia-Han Yang, Ming-Ying Wu, Chien-Min Lin, Don-Lin Yang

COMPUTATIONAL INTELLIGENCE AND SECURITY 1 A Stressed Syllable Labeling Approach Using Fractal Dimensions ...........................................................968

Qingcai Chen, Dandan Wang, Xiaolong Wang

A High Efficiency Protocol for Reporting Integrity Measurements ...........................................................973Chang Chaowen, He Rongyu, Xie Hui, Xu Guoyu

Chinese Unknown Word Recognition Using Improved Conditional Random Fields ...............................978Yisu Xu, Xuan Wang, Buzhou Tang, Xiaolong Wang

A Modified Cluster-Based Routing Protocol with Cloud Model.................................................................983Yong Zhang, Yan-jun Yang, Jian-peng Xu, He Wang

Immune Network for Classifying Heterogeneous Data ...............................................................................988Mazidah Puteh, Khairuddin Omar, Abdul Razak Hamdan, Azuraliza Abu Bakar

Chattering-Free Fuzzy Sliding Mode Control Strategy for Uncertain Discrete Systems with Input Saturation ..............................................................................................................................................993

Linsheng Li, Jianning Li

Comparing Query Similarity Measures for Collaborative Web Search ....................................................998Pavel Krömer, Václav Snášel, Jan Platoš

Page 13: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Evaluation of Automatic Text Summarization Methods Based on Rhetorical Structure Theory ............................................................................................................................................................1004

Vinícius Rodrigues Uzêda, Thiago Alexandre Salgueiro Pardo, Maria das Graças Volpe Nunes

Two Evolutionary Multiobjective Approaches for the Component Selection Problem ..........................1010Andreea Vescan, Crina Grosan

Uniform Parallel Machines Scheduling Using a Genetic Algorithm ........................................................1016Alin Mihaila, Cristina Mihaila

INTELLIGENT DATABASE SYSTEMS Ontology-Supported Focused-Crawler for Specified Scholar’s Webpages..............................................1022

Sheng-Yuan Yang, Chun-Liang Hsu

A Modular Method for Estimating Null Values in Relational Database Systems ...................................1028Shin-Jye Lee, Xiaojun Zeng

PNagent: A Framework for Modelling BDI Agents Using Object Oriented Petri Nets..........................1033Zdenek Mazal, Radek Kocí, Vladimír Janoušek, František Zboril

Deductive E-Bargaining System...................................................................................................................1039H. F. Lai, S. G. Chen, W.-H. Jeng

Application of Grey Relational Analysis for Multivariate Time Series....................................................1045Roselina Sallehuddin, Siti Mariyam Hj. Shamsuddin, Siti Zaiton Mohd Hashim

Research on Properties of Max-Product Fuzzy Associative Memory Networks .....................................1051Shuiling Zeng, Weihong Xu, Jingyu Yang

Rescheduling for Manufacturing Based on Ontology and Problem Solving Method .............................1057Muhammad Firdaus B. Mustapha, Safaai B. Deris

Control Strategy of Dynamic Leontief Input-Output Model ....................................................................1063Xiumei Wu, Lei Jiang

GM (1, 1) and DEA Application Model for Strategic Alliance in Taiwan ...............................................1067Chia-Nan Wang, Ya-Ru Lee

Ontology Model for Multi-relational Data Mining Application................................................................1073Silvio Bortoleto, Nelson F. F. Ebecken

SPECIAL SESSION ON NEW TECHNOLOGIES AND THEIR APPLICATIONS IN IMAGE ENGINEERING 3 A Statistical Speckle Suppression Algorithm for Underwater Laser Image Based on Nonsubsampled Contourlet Transform ......................................................................................................1077

Liu Yang, Baolong Guo, Wei Ni

A Panoramic Image Stabilization System Based on Block Motion Iteration...........................................1083Zhu Juanjuan, Guo Baolong

FFT-Based Orientation Recognition Algorithm in Mirosot ......................................................................1088Xian-xiang Wu, Bao-long Guo

Robust Object Tracking via Hierarchical Particle Filter ..........................................................................1092Wei Sun, Bao-long Guo

Spider Search: An Efficient and Non-Frontier-Based Real-Time Search Algorithm .............................1097Chao Lin Chu, Russell J. Abbott, Debora K. Shuger

Page 14: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Estimation of Skin Color Range Using Achromatic Features ...................................................................1103Wen-Hung Liao, Yu-Hao Chi

Shape-Based Trademark Retrieval Using Cosine Distance Method.........................................................1108Bei-ji Zou, Marie Providence Umugwaneza

A High Performance Filter Based on Statistic Methods for Image Processing .......................................1115Pao-Ta Yu, Yui-Lang Chen, Bae-Muu Chang

Design and Application of a Reconfigurable Embedded System ..............................................................1121Ching-Biau Tzeng, Tzuu-Shaang Wey, Li-Dao Fang

Semi-supervised Laplacianfaces from Pairwise Constraints for Face Recognition ................................1127Na Wang, Xia Li

APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND SOFT-COMPUTING 2 Design of Fractional PID Control via Hybrid of Electromagnetism-Like and Genetic Algorithms .....................................................................................................................................................1133

Fu-Kai Chang, Ching-Hung Lee

The Application of Genetic Algorithm on Control of Discrete Multiple Time-Delay Singularly Perturbation Systems .................................................................................................................1139

Shin-Jang Pan, Jason S.-H. Tsai

Differential Evolution Algorithm on Robust IIR Filter Design and Implementation .............................1145Shing-Tai Pan, Bo-Yu Tsai, Chao-Shun Yang

A Study on the Applications of Learning Paths Concepts to the Teaching in Elementary School .............................................................................................................................................................1151

Huan-Ming Chuang, Chia-Cheng Shen

A Renewed Matrix Model for XML Data ...................................................................................................1157Jaroslav Pokorný, Jan Vávra, Vaclav Snášel

Combining Clustering and Bayesian Network for Gene Network Inference...........................................1165Suhaila Zainudin, Safaai Deris

A Fieldbus Comprehensive Evaluation and Selection Method Based on Entropy-Ideal Point ...............................................................................................................................................................1172

Wei-ming Tong, Hong-wei Gao

Facility Location Problem under Fuzzy Construction Cost and Preference of Candidate Sites.................................................................................................................................................................1177

Hiroaki Ishii, Yung Lung Lee

Boosted Voting Scheme on Classification....................................................................................................1181Chien-Hsing Chen, Chung-Chian Hsu

Context and Learning Based Approach to Programming of Intelligent Equipment ..............................1186Andrey V. Gavrilov

COMPUTATIONAL INTELLIGENCE AND SECURITY 2 Research on Access Control Based on Certainty Factor ...........................................................................1191

He Rongyu, Yin Jianchun, Chang Chaowen

P2P Recommendation Trust Model.............................................................................................................1197Xuan Wang, Lei Wang

Page 15: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Risk Dominance Strategy in Imperfect Information Multi-player Game ................................................1202Xuan Wang, Jiajia Zhang, Xinxin Xu, Zhaoyang Xu

Video Content Authentication Technique Based on Invariant Feature Detection and Cloud Watermark ....................................................................................................................................................1208

Chang-yin Liang, Hao Wu, Ang Li

One/T-Time Signatures Using Self-Certified Public Keys.........................................................................1214Dai-Rui Lin, Chih-I Wang, D. J. Guan

Untraceable Identity Management Framework for Mobile Access ..........................................................1220Min-Chih Kao, Yi-Shiung Yeh, Chuan-Chi Wang

An Efficient Heuristic for Minimizing Maximum Lateness on Parallel Batch Machines.......................1227Tsung-Che Chiang, Hsueh-Chien Cheng, Li-Chen Fu

A Comparison Between a KNN Based Approach and a PNN Algorithm for a Multi-label Classification Problem ..................................................................................................................................1234

Elias Oliveira, Patrick Marques Ciarelli, Claudine Badue, Alberto Ferreira De Souza

Human Action Retrieval via Spatio-temporal Cuboids .............................................................................1240Qingshan Luo, Guihua Zeng

An Improved PSO with Time-Varying Accelerator Coefficients..............................................................1244Zhihua Cui, Jianchao Zeng, Yufeng Yin

INTELLIGENT SYSTEM DESIGN AND APPLICATIONS FOR DIGITAL HOME USERS A Novel Fitness Function in Genetic Algorithms to Optimize Neural Networks for Imbalanced Data Sets ...................................................................................................................................1250

Kuan-Chieh Huang, Yau-Hwang Kuo, I-Cheng Yeh

An Efficient Data Retrieval Indexing Structure for Wireless Broadcasting System...............................1254Lien-Fa Lin, Chao-Chun Chen

An Intelligent Monitoring System for Local-Area Network Traffic.........................................................1260Ming-Han Wan, Mong-Fong Horng

Mobile Robot Path Planning Base on the Hybrid Genetic Algorithm in Unknown Environment ..................................................................................................................................................1264

Yong Zhang, Lin Zhang, Xiaohua Zhang

Constructing Intelligent Living Space Controlling System with Bluetooth and Speech-Recognition Microprocessor.........................................................................................................................1269

Chun-Liang Hsu, Sheng-Yuan Yang

Research on the Architecture of Policy-Based Satellite Network Management ......................................1275Wen-bo Zhang, Ye Xu, Yue-qiu Jiang

Knowledge Management on Concept Structure Analysis with Weighted Polytomous Ordering Theory and Cluster Analysis .......................................................................................................1280

Yuan-Horng Lin, Shin-Yu Chang, Sen-Chi Yu

State Estimation of ALV Integrated Navigation System Based on BP Neural Network ........................1285Meiling Wang, Yongwei Fu

Classifier Fusion Based on Weighted Voting - Analytical and Experimental Results ............................1290Michal Wozniak

Page 16: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

A Fuzzy Neural Network Based on Particle Swarm Optimization Applied in the Speech Recognition System .......................................................................................................................................1296

Xueying Zhang, Ying Sun, Xiaomei Zhang, Peng Wang

E-COMMERCE SECURITY 1 Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem .........................1301

Jen-Ho Yang, Chin-Chen Chang

A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction ....................................................................................................................................................1304

Yu-Yi Chen, Jun-Chao Lui, Shin-I Chen

A Fair-Use DRM System Based on Web Service........................................................................................1309Yu-Yi Chen, Yao-Jen Wang, Cheng-Jie Chen

Design of Proxy Signature in ECDSA .........................................................................................................1315Ming-Hsin Chang, I-Te Chen, Ming-Te Chen

A Lock-Based Protocol for XML Metadata Knowledge Bases .................................................................1321Kuen-Fang Jea, Tsui-Ping Chang

Key-Dependent Compressed Domain Audio Hashing ...............................................................................1327Yuhua Jiao, Mingyu Li, Qiong Li, Xiamu Niu

LMSS: A Location-Based Multimedia Service System Using Wireless Networks ..................................1331Yiqiang Chen, Juan Qi, Zhuo Sun

Frequency Spectrum Prediction Method Based on EMD and SVR .........................................................1337Chang-Jun Yu, Yuan-Yuan He, Tai-Fan Quan

The Synchronous Drive System in Gantry-Moving Milling Machine Based on Dynamic Compensation and Fuzzy Control ...............................................................................................................1343

Gong Yishan, Qian Na

Enhanced Self-Adaptive Search Capability Particle Swarm Optimization .............................................1347Hu Juan, Yu Laihang, Zou Kaiqi

OPTIMIZATION METHODS, BINOMIAL SYSTEMS, AND APPLICATIONS TO THE MARKET EQUILIBRIUM Generation of Permutations Based Upon Factorial Numbers...................................................................1352

Alexei A. Borisenko, Vyacheslav V. Kalashnikov, Igor A. Kulik, O. E. Goryachev

Solving Bilevel Toll Assignment Problem by Penalty Function Algorithm .............................................1357Vyacheslav V. Kalashnikov, Nataliya I. Kalashnykova, José Fernando Camacho Vallejo

Inexact Newton Algorithm to Solve Nonlinear Complementarity Problems ...........................................1362Nataliya I. Kalashnykova, Vyacheslav V. Kalashnikov, Aarón Arévalo Franco

Liberalization of Mexican Electricity Market: Various Modeling Approaches with Numerical Simulation Results ......................................................................................................................1367

Vitaly V. Kalashnikov, Nataliya I. Kalashnykova, Felipe de Jesús Castillo Pérez, Armando César Uranga Sifuentes, Claudia Mayela Avila Garza

A Fuzzy Temporal Model and Query Language for FTER Databases ....................................................1372Liguo Deng, Zhiheng Liang, Yong Zhang

Page 17: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

A New Support Vector Machine with Fuzzy Hyper-Plane and Its Application to Evaluate Credit Risk.....................................................................................................................................................1378

Pei-Yi Hao, Min-Shiu Lin, Lung-Biao Tsai

FPGA-Realization of Adaptive Fuzzy Controller for the Linear X-Y Table ...........................................1384Ying-Shieh Kung, Le Thi Van Anh, Shin-Hung Jou

The Self-Organizing Map Applying the "Survival of the Fittest Type" Learning Algorithm ...............1390Junko Shibata, Koji Okuhara, Shogo Shiode, Hiroaki Ishii

A New Iterative Learning Controller for Electro-Pneumatic Servo System............................................1396Shaojuan Yu, Jincai Bai, Shibo Xiong, Rucheng Han

Adaptive H8 Tracking Control Design in Robotic Systems with Parameter Perturbation and External Disturbance.............................................................................................................................1401

Huang Chun-Qing

MACHINE LEARNING, EVOLUTIONARY COMPUTATION AND THEIR APPLICATIONS Genetics-Based Machine Learning Approach for Rule Acquisition in an AGV Transportation System .................................................................................................................................1407

Kazutoshi Sakakibara, Yoshiro Fukui, Ikuko Nishikawa

Effective Integration of Imitation Learning and Reinforcement Learning by Generating Internal Reward ............................................................................................................................................1413

Keita Hamahata, Tadahiro Taniguchi, Kazutoshi Sakakibara, Ikuko Nishikawa, Kazuma Tabuchi, Tetsuo Sawaragi

Multimodal Medical Image Registration Using Particle Swarm Optimization.......................................1419Yen-Wei Chen, Chen-Lun Lin, Aya Mimori

A Heuristic Decoding Method for Coded Images of Uniformly Redundant Array.................................1424Shinya Nozaki, Shinsuke Fujioka, Yen-wei Chen

3D Function Approximation with rGCS Classifier System .......................................................................1428Lukasz Cielecki, Olgierd Unold

Attentiveness Assessment in Learning Based on Fuzzy Logic Analysis ...................................................1434Kuo-An Hwang, Chia-Hao Yang

A Novel Prediction Algorithm of Thermostable Proteins by Using Hurst Exponent and Choquet Integral Regression Model ............................................................................................................1439

Hsiang-Chuan Liu, Yu-Chieh Tu, Bai-Cheng Jeng, Tung-Sheng Liu

Feature Selection for Cancer Classification on Microarray Expression Data .........................................1445Hui-Huang Hsu, Ming-Da Lu

FPGA Realization of Activation Function for Artificial Neural Networks ..............................................1451Venakata Saichand, Nirmala Devi M., Arumugam S., N. Mohankumar

Use of NER Information for Improved Topic Tracking............................................................................1457Wang Xiaowei, Jiang Longbin, Ma Jialin, Jiangyan

INTELLIGENT WATERMARKING TECHNIQUES, IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY 1 Color Visual Cryptography Scheme Using Meaningful Shares ................................................................1463

Hsien-Chu Wu, Hao-Cheng Wang, Rui-Wen Yu

Page 18: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Robustness of Structure-Based Watermark by Using Balanced Incomplete Block Designs ..................1469Zhi-Fang Yang, Mong-Shu Wu

A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding.............................................................................................................................................................1473

Wien Hong, Chih-Wei Shiu, Tung-Shou Chen

Mining Region-Based Movement Patterns for Energy-Efficient Object Tracking in Sensor Networks ........................................................................................................................................................1478

Vincent S. Tseng, Ming Hua Hsieh, Kawuu W. Lin

Reversible Watermarking for Compressed Speech ...................................................................................1487Mingyu Li, Yuhua Jiao, Xiamu Niu

A Novel Algorithm for Completely Hiding Sensitive Association Rules ..................................................1492Chih-Chia Weng, Shan-Tai Chen, Hung-Che Lo

Lossless and Lossy Image Secret Sharing for Data Transmission ............................................................1499Faxin Yu, Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu

Microcomputer Based Smart Engine Ignition Control System for Motorcycles.....................................1505Ching-Biau Tzeng, Tzuu-Shaang Wey, Tsung-Yu Su

Backward-Forward Combined Convolutive Blind Source Separation ....................................................1512Xiaoyue Jiang, Hichem Sahli, Werner Verhelst, Yanning Zhang

Solving TSP with Shuffled Frog-Leaping Algorithm .................................................................................1518Xue-hui Luo, Ye Yang, Xia Li

E-COMMERCE SECURITY 2 Efficient Authentication Schemes for Handover in Mobile WiMAX .......................................................1523

Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, Shin-Yan Chiou

The Essential Design Principles of Verifiable Non-interactive OT Protocols ..........................................1529Ya-Fen Chang, Wei-Cheng Shiao

An Exchangeable E-Cash Scheme by E-Mint.............................................................................................1534Jung-Wen Lo, Min-Shiang Hwang, Yen-Ping Chu

Multiple-Image Encryption by Rotating Random Grids...........................................................................1540Tzung-Her Chen, Kai-Hsiang Tsao, Kuo-Chen Wei

Hospital Management Based on Data Mining ............................................................................................1545Shusaku Tsumoto, Shoji Hirano

E-Business Social Network Optimization and Visualization .....................................................................1551Siti Nurkhadijah Aishah Ibrahim, Ali Selamat, Mohd Hafiz Selamat

Efficient Mining of Frequent Closed Itemsets without Closure Checking ...............................................1557Chih-Hsien Lee, Don-Lin Yang, Jungpin Wu, Kuo-Cheng Yin

An Efficient Approximate Approach to Mining Frequent Itemsets over High Speed Transactional Data Streams .........................................................................................................................1563

Kuen-Fang Jea, Chao-Wei Li, Tsui-Ping Chang

Detection Method Based on Reverse Proxy against Web Flooding Attacks ............................................1569Chu-Hsing Lin, Jung-Chun Liu, Chih-Chieh Lien

Study on X-VRML-Based Modelling of Virtual Museum .........................................................................1573Shengnan Zhang, Limin Song, Lianqiang Niu

Page 19: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

DIGITAL CRIME AND FORENSICS 1 A Model for a Distance Learning System over the Internet ......................................................................1577

Alessandro Brawerman, Cícero F. Marques, Francisco J. K. G. Navarro, Rafael Ribeiro Macedo

E-Business Model Approach to Determine Models to Datawarehouse ....................................................1579Diego Alex Harmatiuk, Silvio Bortoleto, Wesley Pereira de Oliveira, Durval Neto, Everson Volaco

A Reversible Steganographic Algorithm for Point-Sampled Geometry...................................................1582Peng-Cheng Wang, Kuo-Chen Wu, Chung-Ming Wang

Secret Sharing Scheme with Non-expansible Shadow Size for Color Images..........................................1588Chia-Chen Lin, Wen Xiu Zhang

An Ordered Multi-proxy Multi-signature Scheme.....................................................................................1594Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou

Adaptive Image Hiding Algorithm Based on Classification ......................................................................1600Shengbing Che, Qiangbo Huang, Bin Ma

Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process............................................................................................................................................................1606

Lin-Yu Tseng, Yung-Kuan Chan, Yu-An Ho, Yen-Ping Chu

The Improvement of Public Key Cryptography Based on Chaotic Neural Networks ............................1612Yunpeng Zhang, Tongtong Xue, Zhengjun Zhai, Chunyan Ma, Xiaobin Cai

Reversible Watermarking Based on the Invariant Sum Value .................................................................1617Shaowei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni

A GA-Based Image Halftoning Technique..................................................................................................1621Chih-Cheng Lo, Yi-Ting Chen, Shu-Chuan Chu, Jeng-Shyang Pan

INTELLIGENT VIDEO PROCESSING 1 Face Recognition Based on Digital Curvelet Transform ...........................................................................1625

Yi-Chun Lee, Chin-Hsing Chen

Subpixel Edge Location Using Orthogonal Fourier-Mellin Moments Based Edge Location Error Compensation Model .........................................................................................................................1630

Wen-Chia Lee, Chin-Hsing Chen

A Watermarking Method for Still Images Using Modified Code Division Multiple Access ..................1636Ji-Hong Chen, Chin-Hsing Chen, Wen-Yuan Chen

A Fast and Stable Superresolution Reconstruction Method for Compressed Video Sequences .......................................................................................................................................................1642

Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang

A New Multi Criteria Aid Model for Process Piloting Using Case-Based Reasoning .............................1647Dhouib Diala, Chabchoub Habib, Addouche Sid-Ali, Abderrahman ElMhamedi

A Fast Mode Decision Scheme with Variable Block Sizes in H.264/AVC ................................................1652Pengyu Liu, Kebin Jia

An Edge-Recovery-Based Error Concealment Method for Video ............................................................1656Jifeng Sun, Wenkai Huang, Zhiyong Zhang

Mesh-Based In-band Motion Estimation Method ......................................................................................1660Deng Chen-wei, Zhao Bao-jun

Page 20: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

Development of a Portable Automatic Inspection System for Printed Labels Using a Web Camera ...........................................................................................................................................................1665

Yuhki Shiraishi, Fumiaki Takeda

A Kind of Parallel Reference Frame Display Control Algorithm.............................................................1670Bowen Fu, Wenhe Zhang, Lianqiang Niu

INTELLIGENT WATERMARKING TECHNIQUES, IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY 2 Suffix Tree Based Approach for Chinese Information Retrieval .............................................................1675

Jin Hu Huang, David Powers

Efficient Image Recovery Based on Self-Embedding .................................................................................1680Yuan-Liang Tang, Chin-Feng Lee, Huai-En Lee

Tamper Detection of Relational Database Based on SVR Predictive Difference ....................................1685Hsien-Chu Wu, Fang-Yu Hsu, Hwang-Yu Chen

A Blind Associative Watermarking Technique Using Self-Embedding ...................................................1691Chin-Feng Lee,Tsung-Chia Yang

A Novel Algorithm for Ultrasonic Stereovision Data Enhancement ........................................................1696Liu Lu, Liu Wanyu

Optimal Tuning of PI Speed Controller Using Nature Inspired Heuristics.............................................1702Millie Pant, Radha Thangaraj, Ajith Abraham

A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC)...........................1708Tung-Shou Chen, Jeanne Chen, Yuan-Hung Kao, Tsang-Chou Hsieh

Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding .................1713Hao Luo, Faxin Yu, Jeng-Shyang Pan, Zhe-Ming Lu

Tardiness in Fuzzy Flow Shop Scheduling Problems Based on Possibility and Necessity Measures ........................................................................................................................................................1719

Peng-Jen Lai, Ming-Hung Shu

Fast Parallel Molecular Solution to the Hitting-Set Problem...................................................................1724Nung-Yue Shi, Chih-Ping Chu

E-COMMERCE SECURITY 3 A Mobile Trading Scheme for Digital Content Based on Digital Rights ..................................................1730

Chia-Chen Lin, Po-Hsuan Chiang

Fast Modular Multiplication for E-Commerce Cryptosystem ..................................................................1736Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang

Multi-recastable E-Bidding Scheme ............................................................................................................1741Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun

Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol ........................................1746Chin-Chen Chang, Jung-San Lee

An Efficiently Online/Offline Signcryption for Firewall ...........................................................................1751Dai-Rui Lin, Chih-I Wang, D. J. Guan

Self-Certified Proxy Convertible Authenticated Encryption Scheme ......................................................1758Han-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh

Page 21: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

The 2D Bar-Code Technology Applications in Medical Information Management................................1763Yao-Lung Yeh, Jing-Cyun You, Gwo-Jia Jong

Cultural-Based Genetic Algorithm: Design and Real World Applications..............................................1767Mostafa A. El-Hosseini, Aboul Ella Hassanien, Ajith Abraham, Hameed Al-Qaheri

Improvement of SCTP Performance in Vertical Handover ......................................................................1773Chin-Shiuh Shieh, I-Cheng Lin, Wei Kuang Lai

A Prediction Mechanism of Mail Retrieval Based on the User Behavior Analysis for Electronic Mail Database System ................................................................................................................1778

Wei-Ru Lai, Che-Hui Liao, Chang-Ching Lu, Ming-Kuan Liao

DIGITAL CRIME AND FORENSICS 2 Model of Approach and Determination of the Failure Pertaining to School ...........................................1784

Katia Bortoleto, Silvio Bortoleto

KDD on IVR Navigation Trees: Case Study ...............................................................................................1787Thiago T. Angélico, Thais Santos Bueno, Silvio Bortoleto, Anderson Ravanello

A Block-Based Authentication Watermarking Technique for Binary Images ........................................1790Hsien-Chu Wu, Yu-Chi Liu, Kuo-Ching Liu, Chwei-Shyong Tsai

An Image Steganographic Scheme Based on Support Vector Regression ...............................................1796Hsien-Chu Wu, Kuo-Ching Liu, Jun-Dong Chang, Ching-Hui Huang

Complete Double Layered Embedding Scheme for Information Hiding .................................................1802Chin-Feng Lee, Jau-Ji Shen, Hung-Lin Chao

NGN Service Pricing Support Decision System Based on Fuzzy Neural Network: NPDSS ...................1806Zhang Jin-Yu, Liang Man-Gui

A Collision Avoidance Protocol for Supporting All-Optical Ring Network ............................................1812Wen-Ping Chen, Shih-Wei Kau, Wen-Shyang Hwang, Bin-Yih Liao, Wen-Tsung Hu

A Robust Audio Watermarking Algorithm Based on DCT and Vector Quantization ...........................1818Ji-Xin Liu, Zhe-Ming Lu, Jeng-Shyang Pan

A Weight Method of Decoding the Binary BCH Code...............................................................................1822H. P. Lee, H. C. Chang, T. C. Lin, T. K. Truong

Digital Watermark for 3D Face Model Authentication and EER Performance Analysis ......................1827Wenjun Huang, Xiamu Niu, Wei Song, Meiyu Lu

INTELLIGENT VIDEO PROCESSING 2 Video Stabilization by Feature-Block Motion Estimation .........................................................................1832

Chao-Ho (Thou-Ho) Chen, Che-Wei Hsu, Chin-Hsing Chen

The Study on Video Enhancement in the Low-Light Environment by Spatio-temporal Filtering..........................................................................................................................................................1836

Tsong-Yi Chen, Thou-Ho (Chao-Ho) Chen, Che-Ping Su, Yi-Jun Chen

People Counting System for Getting In/Out of a Bus Based on Video Processing ..................................1840Chao-Ho (Thou-Ho) Chen, Yin-Chan Chang, Tsong-Yi Chen, Da-Jinn Wang

A Video Similarity Matching Algorithm Supporting for Different Time Scales .....................................1845Zhi-pin Deng, Ke-bin Jia

Page 22: Eighth International Conference on Intelligent Systems ...toc.proceedings.com/04363webtoc.pdf · An Intelligent Agent for Personalized E-Learning ... Fuzzy Possibility C-Mean Based

An Actor-Based Video Segmentation System Using Visual and Audio Information in E-Learning .........................................................................................................................................................1850

Yi-Chun Liao, Ming-Hong Syu

Prediction Filling Differences for Compress a Set of HDR Images ..........................................................1856Jeanne Chen, Tung-Shou Chen, Ping-Feng Chen

Building a Flexible Energy Management System with LonWorks Control Network .............................1862Ching-Biau Tzeng, Tzuu-Shaang Wey, Sheng-Hsiung Ma

Efficient Scalable Distributed Video Coding Based on Residual SW-SPIHT..........................................1869Anhong Wang, Yao Zhao, Jeng-Shyang Pan

Applying the Extended Classifier System to Trade Interest Rate Futures Based on Technical Analysis.........................................................................................................................................1873

An-Pin Chen, Yu-Chia Hsu, Chien-Hua Huang, Ya-Chun Yang

A Moving Objects Detection Algorithm Based on Improved Background Subtraction .........................1879Lianqiang Niu, Nan Jiang

INTELLIGENT WATERMARKING TECHNIQUES, IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY 3 Bioinformatics Approach to Discover the Relationship Between Single Nucleotide Polymorphisms and Tumors ........................................................................................................................1883

Fang Rong Hsu, Wen Chun Lo

A Lossless Secret Image Sharing Method ...................................................................................................1888Hao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, Chiang-Lung Liu

Non-embedded Image Protection Approaches Based on Vector Quantization .......................................1892Cheng-Hsing Yang, Shu-Chien Huang, Cheng-Ta Huang, Shiuh-Jeng Wang

The Technique of Information Hiding Based on Modification Function and LSB Matching................1898Tzu-Chuen Lu, Li-Ling Hsu

Lossless Data Hiding for Color Images .......................................................................................................1904Ching-Hui Huang, Chih-Chiang Lee, Hsien-Chu Wu, Chung-Ming Wang

A Novel Shape-Texture Approach to Palmprint Detection and Identification........................................1910Michal Choras, Rafal Kozik, Aleksandra Zelek

A Novel Image Annotation Scheme Based on Neural Network ................................................................1916Yufeng Zhao, Yao Zhao, Zhenfeng Zhu, Jeng-Shyang Pan

Database-Driven Disease Prevention by Daily Menu Management and Physical Condition .................1920Eri Domoto, Koji Okuhara, Hiroaki Ishii

Towards a Suitable Reconciliation of the Findings in Collaborative Fuzzy Clustering..........................1924Rafael Falcón, Benoît Depaire, Koen Vanhoof, Ajith Abraham

A Real Time Spatial/Temporal/Motion Integrated Surveillance System in Compressed Domain ...........................................................................................................................................................1930

Chen-Chiung Hsieh, Wei-Ru Lai, Albert Chiang

Author Index