eighth international conference on intelligent systems ...toc.proceedings.com/04363webtoc.pdf · an...
TRANSCRIPT
Proceedings
Eighth International Conference on Intelligent Systems Design and Applications
ISDA 2008
26-28 November 2008 Kaohsiung, Taiwan
Edited by Jeng-Shyang Pan
Ajith Abraham Chin-Chen Chang
Los Alamitos, California
Washington • Tokyo
TABLE OF CONTENTS
NOVEL APPROACHES TO PERVASIVE APPLICATIONS Applying Embedded Hybrid ANFIS/Quantum-Tuned BPNN Prediction to Collision Warning System for Motor Vehicle Safety .......................................................................................................1
Bao Rong Chang, Chung-Ping Young, Hsiu Fen Tsai, Jian-Jr Lin
A Sense Based Similarity Measure for Cross-Lingual Documents .................................................................7Hsun-Hui Huang, Horng-Chang Yang, Yau-Hwang Kuo
An Intelligent Intrusion Detection System Based on UPnP Technology for Smart Living.........................12Mong-Fong Horng, Bo-Chao Chang, Bei-Hao Su
Image Fusion Based on Grey Polynomial Interpolation ................................................................................17Cheng-Hsiung Hsieh, Pei-Wen Chen, Chia-Wei Lan, Kuan-Chieh Hsiung
A Method of Camera Relationship Establishment Based on Temporal and Spatial Information of Video Clips...............................................................................................................................21
Hsien-Chou Liao, Cheng-Hsiung Hsieh, Yi-Ming Hsieh, Chih-En Wu
An Intelligent Agent for Personalized E-Learning.........................................................................................25Jin-Ling Lin, Ming-Hung Chen
A Method of Pulmonary Nodules Detection with Support Vector Machines ..............................................30Liu Lu, Liu Wanyu
A New Algorithm for Power System Scheduling Problems...........................................................................34Huo-Ching Sun, Yann-Chang Huang, Kun-Yuan Huang
Fast Estimation of Communication Cost for Thread Mapping in Computation Grids Using SVD.....................................................................................................................................................................39
Ti-Hsin Wang, Tyng-Yeu Liang, Chia-Hao Chang
Performance Comparison of ADRS and PCA as a Preprocessor to ANN for Data Mining.......................45Nicholas Navaroli, David Turner, Arturo I. Concepcion, Robert S. Lynch
INTELLIGENT SYSTEMS FOR IMAGE ANALYSIS Applying the Particle Swarm Optimization and Boltzmann Function for Feature Selection and Classification of Lymph Node in Ultrasound Images .............................................................................51
Chuan-Yu Chang, Cheng-Ting Lai, Shao-Jer Chen
Adaptive Template Block-Based Block Matching for Object Tracking.......................................................57Wu-Chih Hu
Image Thresholding Using Mean-Shift Based Particle Swarm Optimization .............................................61Chien-Cheng Lee, Yu-Chun Chiang, Cheng-Yuan Shih, Wen-Sheng Hu
Object-Based Image Retrieval Using Perceptual Grouping ..........................................................................67Tian-Luu Wu, Ji-Hwei Horng
Fragile Watermarking for H.264 Video Stream Authentication ..................................................................73Chuen-Ching Wang, Yu-Chang Hsu
Research on Solar Photovoltaic Surveillance System Base on Network.......................................................77Li De Jun, Liu Jie, Tian Yu Kang
A Fast Recursive Algorithm for Gradient-Based Global Motion Estimation in Sparsely Sampled Field ....................................................................................................................................................80
Yong-Ren Huang
Fuzzy Possibility C-Mean Based on Complete Mahalanobis Distance and Separable Criterion.............................................................................................................................................................85
Hsiang-Chuan Liu, Der-Bang Wu, Jeng-Ming Yih, Shin-Wu Liu
Illumination Invariant Color Model for Image Matching and Object Recognition....................................91Hui-Fuang Ng, Yen-Wei Chu
A Scene Images Classification Method Based on Local Binary Patterns and Nearest-Neighbor Classifier............................................................................................................................................96
Guang Han, Chunxia Zhao
INTELLIGENT TECHNOLOGY FOR UBIQUITOUS COMPUTING Using Resampling for Optimizing Continuous Queries in Wireless Sensor Networks .............................101
San-Yih Hwang, Pin-Yu Liu, Chien-Hsiang Lee
Discovering Moving Clusters from Spatial-Temporal Databases ...............................................................105San-Yih Hwang, Chien-Ming Lee, Chien-Hsiang Lee
Malicious Webpage Detection by Semantics-Aware Reasoning .................................................................109Shih-Fen Lin, Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng, Chi-Sung Laih
The Design and Implementation of Zero-Copy for Linux ...........................................................................115Liu Tianhua, Zhu Hongfeng, Chang Guiran, Zhou Chuansheng
Research on Intelligent Systems Applied to Tourism Development Design...............................................121Wei Min
Heuristics for Dynamic Lot-Sizing with Plan Setup Cost in a Rolling Horizon Environment .................127Yooseong Choi, In-Jae Jeong
The Development of a Creativity-Enhancing Model for Innovative Design Concepts..............................133Zhiqiang Zhu, Sev Nagalingam, Hung-Yao Hsu
An Agent Based Rough Classifier for Data Mining .....................................................................................139Azuraliza Abu Bakar, Zulaiha Ali Othman, Abdul Razak Hamdan, Rozianiwati Yusof, Ruhaizan Ismail
Equivalence Between Weight Decay Learning and Explicit Regularization to Improve Fault Tolerance of RBF ..................................................................................................................................146
John Sum, Wun-He Luo, Yung-Fa Huang, You-Ting Jheng
Low Complexity Search Method for G.723.1 MP-MLQ Algorithm ...........................................................152R. S. Lin, Y. C. Chen, F. K. Chen
BIOINFORMATICS Prediction of Protein Subcellular Localizations ...........................................................................................156
Chin-Sheng Yu, Jenn-Kang Hwang
Advanced Plasmonic Biosensing Devices and Automation Systems for Disease Diagnostic and Drug Screening Applications ..................................................................................................................162
Nan-Fu Chiu, Tzuu-Shaang Wey, Chun Yu, Tzu-Chien Hsiao, Chii-Wann Lin
Research on the Reciprocity of Transceiver in the Smart Antenna Application.......................................168Fu Haiyang, Gao Peng, Ding Haibao
Genetic Annealing Optimization: Design and Real World Applications ...................................................174Mostafa A. El-Hosseini, Aboul Ella Hassanien, Ajith Abraham, Hameed Al-Qaheri
Intelligent Emotion Decision System for Autonomous Agents....................................................................180Xia Mao, Haiyan Bao, Zheng Li
Using Multi-attribute Utility Theory to Rank and Select Co-branding Partners .....................................186Wei-Lun Chang
User Behavior Analysis in Masquerade Detection Using Principal Component Analysis ........................192Han-Ching Wu, Shou-Hsuan Stephen Huang
Development of an Agent-Based Distributed Multi-axis Surface Milling Machining Service System ..............................................................................................................................................................198
Yung-Chou Kao, Mau-Sheng Chen
Neural Network Integration Fusion Model and Application ......................................................................204Xiaodan Zhang, Zhendong Niu
Thinned ECOC Decomposition for Gene Expression Based Cancer Classification..................................207Nima Hatami
INTELLIGENT DATA ANALYSIS AND APPLICATIONS 1 Multilingual Information Retrieval Using GHSOM ....................................................................................213
Hsin-Chang Yang, Chung-Hong Lee
An Intelligent PPQA Web Services for CMMI Assessment ........................................................................217Mei-Hui Wang, Chang-Shing Lee
A DEA/AHP Approach to Efficiency Investigation for Taiwan’s Retailing Industry via Financial Data Analysis ..................................................................................................................................223
YaFen Tseng, ShuChen Kao, TzaiZang Lee, ChienHsing Wu
Improving the Efficiency of Forward Checking Algorithm for Solving Constraint Satisfaction Problems......................................................................................................................................228
Yusef Farhang, M. R. Meybodi, A. R. Hatamlou
Fuzzy Clustering by Differential Evolution ..................................................................................................234Yucheng Kao, Jin-Cherng Lin, Shin-Chia Huang
Intelligent Aging Estimation Method for Lead-Acid Battery......................................................................239Yu-Hua Sun, Hurng-Liahng Jou, Jinn-Chang Wu
A Two-Stage Approach for AAM Fitting......................................................................................................245Mingcai Zhou, Yangsheng Wang, Xiaoyan Wang, Xuetao Feng
Analysis and Estimation of Micro-Doppler Effect in Passive Positioning System.....................................250Cai Miaohong, He Feng, Wu Lenan
Sequential Quadratic Programming Based on IPM for Constrained Nonlinear Programming...................................................................................................................................................254
Ximing Liang, Hassan A. Bashir, Shanchun Li
Notes on the Distinction of Gaussian and Cauchy Mutations .....................................................................260Kuo-Torng Lan, Chun-Hsiung Lan
INFORMATION MANAGEMENT AND PROCESSING 1 Web Usage Mining Based on Clustering of Browsing Features..................................................................266
Chu-Hui Lee, Yu-Hsiang Fu
Content-Based Image Retrieval Based on Vector Quantization and Affine Invariant Region...............................................................................................................................................................272
Chin-Feng Lee, Shu-Ching Wang, Yi-Jia Wang
Novel Algorithms for Privacy Preserving Utility Mining ............................................................................276Jieh-Shan Yeh, Po-Chiang Hsu, Ming-Hsun Wen
Improvement of Wang-Li's Forward-Secure User Authentication Scheme with Smart Cards ................................................................................................................................................................282
Wen-Bing Horng, Cheng-Ping Lee
Intelligent Data Mining Approach for Fault Diagnosis ...............................................................................288Yann-Chang Huang, Huo-Ching Sun, Yu-Hsun Lin
A Rough Set and SVM Based Approach to Chinese Textual Affect Sensing.............................................292Xia Mao, Zheng Li, Haiyan Bao
Nonlinear Function Approximation Based on Least Wilcoxon Takagi-Sugeno Fuzzy Model .................297Tsung-Ying Sun, Shang-Jeng Tsai, Cheng-Han Tsai, Chih-Li Huo, Chan-Cheng Liu
An Evolutionary Classifier Based on Adaptive Resonance Theory Network II and Genetic Algorithm .........................................................................................................................................................303
I-En Liao, Shu-Ling Shieh, Hui-Ching Chen
Monitoring System for Vehicle Power Supply Based on CAN Bus ............................................................308Sujing Wang, Lide Wang, Ping Shen, Biao Liu
Fuzzy Fusion Method for Combining Small Number of Classifiers in Hyperspectral Image Classification....................................................................................................................................................312
Chun-Hsiang Chuang, Bor-Chen Kuo, Hsuan-Po Wang
INTELLIGENT USER INTERFACE DESIGN AND APPLICATION A Multi-agent Based Architecture for an Assistive User Interface of Intelligent Home Environment Control......................................................................................................................................318
Chih-Hsien Liang, Wei-Sheng Hung, Ming-Che Hsieh, Chung-Min Wu, Chin-Hsing Luo
Spoken Dialogue Agent Interface Requirements Modeling Based on PASSI Methodology.....................322Ming-Che Hsieh, Wei-Sheng Hung, Shin-Shing Shin, Shu-Wen Lin, Tsan-Hsun Huang
An Intelligent Brain Computer Interface of Visual Evoked Potential EEG ..............................................326Shih-Chung Chen, Shih-Chang Hsieh, Chih-Kuo Liang
A Multi-agent Based Testbed for Agent Interface Evaluation ....................................................................330Chung-Min Wu, Ming-Che Hsieh, Chin-Hsing Luo
CCSDS Advanced Orbiting Systems, Data Links Protocol: Study on Virtual Channels Scheduling Algorithm .....................................................................................................................................334
Qingli Liu, Chengsheng Pan, Guoren Wang, Wei Liu
Application of Neural Network Techniques on Nonlinear Channel Equalization for 16-QAM Modulation Systems .............................................................................................................................339
Chun-Yi Lo, Wan-de Weng
Using Chi-Square Automatic Interaction Detector to Solve the Polysemy Problems in a Chinese to Taiwanese TTS System ................................................................................................................345
Yih-Jeng Lin, Ming-Shing Yu, Chin-Yu Lin
Intelligent Focus+Context Volume Visualization .........................................................................................351Cheng-Kai Chen, Russell Thomason, Kwan-Liu Ma
An Exploratory Study on Malay Processing Tool for Acquisition of Taxonomy Using FCA ..................358Mohd Zakree Ahmad Nazri, Siti Mariyam Shamsudin, Azuraliza Abu Bakar
Using MPE with Bayesian Network for Sub-optimization to Entropy-Based Methodology ....................364Bor-Chen Kuo, Tien-Yu Hsieh, Hsuan-Po Wang
SOFT-COMPUTING TECHNOLOGIES AND APPLICATIONS ON IEM INTELLIGENT SYSTEMS 1 The Empirical Study of Fuzzy Performance Appraisal Applied on Securities Brokerage.......................370
Tien-Tsai Huang, Chien-Yi Chen
Composite Shewhart-Poisson GWMA Control Chart with Sensitizing Rules...........................................374Tse-Chieh Lin
Fuzzy Multiple Objective Programming Based on Interval-Valued Fuzzy Sets .......................................378Teng-San Shih, Huey-Ming Lee, Jin-Shieh Su
Genetic Optimization for Benefit-Oriented Data Broadcast in T-Learning Environments .....................384Chao-Chun Chen, Yong-Ming Huang, Lien-Fa Lin, Ding-Chau Wang
Term Weighting Approaches for Text Categorization Improving .............................................................390L. A. Matsunaga, N. F. F. Ebecken
Using Semi-discrete Decomposition for Topic Identification ......................................................................396Václav Snášel, Pavel Moravec, Jaroslav Pokorný
Implementation of an Intelligent HLA-Compliant Application Layer Gateway for Real-Time Flight Simulation ...................................................................................................................................402
Kuo-Wei Meng, Ming-Chuan Hung, Don-Lin Yang, Yeh-Ching Chung
Fuzzy Logic on Representation of Knowledge Structure and Measure of Similarity with Application on Mathematics Concepts for Pupils ........................................................................................408
Yuan-Horng Lin, He-Kai Chen, Wen-Liang Hung
The Influence of Order on a Large Bag of Words........................................................................................413Charles B. Prado, Felipe M. G. França, Ramon Diacovo, Priscila M. V. Lima
Improving VG-RAM WNN Multi-label Text Categorization via Label Correlation................................418Alberto F. De Souza, Claudine Badue, Bruno Zanetti Melotti, Felipe T. Pedroni, Fernando Líbio L. Almeida
INTELLIGENT DATA ANALYSIS AND APPLICATIONS 2 An Incremental FUSP-Tree Maintenance Algorithm ..................................................................................424
Chun-Wei Lin, Tzung-Pei Hong, Wen-Hsiang Lu, Wen-Yang Lin
An Evolution-Based Dynamic Scheduling Algorithm in Grid Computing Environment.........................429Kun-Ming Yu, Cheng-Kwan Chen
A Data Grid File Replication Maintenance Strategy Using Bayesian Networks .......................................435Chao-Tung Yang, Chien-Jung Huang, Ting-Chih Hsiao
A Fast Elastic Net Method for Traveling Salesman Problem......................................................................441Junyan Yi, Weixing Bi, Gang Yang, Zheng Tang
A Dynamic Weighting Scheme for Providing Fair Communication Service to Nomadic Agents...............................................................................................................................................................447
SangWon Rhee, Kyu-Yeong Jeon, Sung Keun Song, Hyung Su Lee, Hee Yong Youn
Bounded PSO Vmax Function in Neural Network Learning ......................................................................453Y. S. Lee, S. M. Shamsuddin, H. N. Hamed
Solution of Fuzzy Relational Equation by Real-Valued GA........................................................................459Leh Luoh
Applying Experimental Statistical Method for the Preparation of Nanometric-Sized LiNi0.8Co0.2O2 Powders as a Cathode Material for Lithium Batteries....................................................464
Ching-Shieh Hsieh, Hsin-Ya Huang, Hui-Ling Fang, Wein-Duo Yang
An Approach of Chunk Parsing and Entity Relation Extracting to Chinese Based on Conditional Random Fields Model ................................................................................................................468
Jun-hua Wu, Jing Zhou
Earthquake Shelter Location Evaluation Considering Road Structure.....................................................474Yung-Lung Lee, Hiroaki Ishii, Cheng-An Tai
INFORMATION MANAGEMENT AND PROCESSING 2 Finding the Complete Set of Minimal Solutions for Fuzzy Max-Archimedean t-Norm Relational Equations .......................................................................................................................................477
Jun-Lin Lin
An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems .............................................................................................................................................................483
Shiuh-Jeng Wang, Yuh-Ren Tsai, Pin-You Chen
Interactive Mining of Frequent Patterns in a Data Stream of Time-Fading Models ................................489Ming-Yen Lin, Sue-Chen Hsueh, Chung-Yi Wang
Hierarchical P2P Networking and Two-Level Compression Scheme for Multi-agent System Supporting Context-Aware Applications.........................................................................................495
Joon Hwang Kim, Jeong Hun Chu, Seungwok Han, Chang Won Park, Hee Yong Youn
Segmentation of Brain Internal Structures Automatically Using Non-rigid Registration with Simultaneous Intensity and Geometric Match .....................................................................................501
Xiangbo Lin, Tianshuang Qiu, Su Ruan, Frederic Morain-Nicolier
Detection of the Cardiovascular Diseases by Using a Linearly Modeling System with the PSO-Based Classification Scheme .................................................................................................................507
Meng-Cheng Shen, Heng-Chou Chen, Chih-Hui Chen
NOx Estimation Based on Flame Image of High Temperature Air Combustion ......................................513Zengshou Dong, Mingjun Liu, Fengchun Zhang
Location Tracking with Power-Level Switching for Wireless Sensor Networks .......................................518Hung-Chi Chu, Chung-Jie Li, Ching-Yun Chen, Hong-Wen Yu
Traffic Identification of Tor and Web-Mix...................................................................................................524Xuefeng Bai, Yong Zhang, Xiamu Niu
Experiments with Boosted Decision Tree Classifiers ...................................................................................528Michal Wozniak
EMERGING TECHNOLOGIES FOR INTELLIGENT VEHICULAR APPLICATIONS Cooperative Collision Warning Based Highway Vehicle Accident Reconstruction ..................................534
Chung-Ping Young, Bao Rong Chang, Jian-Jr Lin, Ren-Yang Fang
Design of an In-vehicle Anti-theft Component .............................................................................................539Jung-Hsuan Wu, Chien-Chuan Kung, Jhan-Hao Rao, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou
Point Clouds Construction Algorithm from a Home-Made Laser Scanner...............................................543Bagus Arthaya, Irwan Gunawan, Hendra Gunawan
The Novel Fuzzy Sliding Mode Control of Synchronous Reluctance Motor .............................................549Chien-An Chen, Huann-Keng Chiang, Chih-Huang Tseng
Immune System Assisted Radial Basis Function Network for OFDM System Channel Tracking in Dynamic Environments .............................................................................................................555
Jingchen Liu, Xiaogang Zang, Xinbao Gong
Rough Set Granularity in Mobile Web Pre-caching ....................................................................................560Sarina Sulaiman, Siti Mariyam Shamsuddin, Ajith Abraham, Shahida Sulaiman
The Innovation of Manufacturing Premise Based on Knowledge Obtained by Quality Accident Report...............................................................................................................................................566
Shujiro Murayama, Junko Shibata, Koji Okuhara, Hiroaki Ishii
Categorizing Heartbeats by Independent Component Analysis and Support Vector Machines ..........................................................................................................................................................572
Kuan-To Chou, Sung-Nien Yu
Wavelet-Based Bispectra for Motor Rotor Fault Detection ........................................................................576D.-M. Yang
An Approach for Achieving Self-Optimization in Mechatronic Systems Supported by Active Patterns ................................................................................................................................................581
J. Gausemeier, O. Znamenshchykov, S. Oberthür, H. Podlogar
SOFT-COMPUTING TECHNOLOGIES AND APPLICATIONS ON IEM INTELLIGENT SYSTEMS 2 Intelligent Stock Selecting via Bayesian Naive Classifiers on the Hybrid Use of Scientific and Humane Attributes ..................................................................................................................................587
Tien-Tsai Huang, Chir-Ho Chang
The Neural Network Algorithm for Data-Mining in Dynamic Environments ..........................................592Ching Lien Huang, Tsung-Shin Hsu, Chih-Ming Liu
Fuzzy Assessment for Sampling Survey Defuzzification by Signed Distance Method ..............................596Lily Lin, Huey-Ming Lee
Neural Network for Routing in a Directed and Weighted Graph...............................................................601Mehran Ghaziasgar, Armin Tavakoli Naeini
Petri Net Based Synthesis Method to Construct Optimal Controllers and Its Application to a Jobshop Scheduling......................................................................................................................................607
Eun Joo Lee, In-Jae Jeong, Jeehyoung Lee
Reactive Planning with Weak Plan Instances...............................................................................................613Frantisek Zboril_Jr., Vladimir Janousek, Radek Koci, Zdenek Mazal
The Design of a Quality Control System of PCB with SMT Based on RFID and AOI .............................619Shih-Che Lo, Bei-Ming Li
Architecture Centric Approach to Enhance Software Testing Management ............................................624Fu-Shiau Li, Wei-Ming Ma, Architect Chao
Fault Diagnosis of Generator Based on D-S Evidence Theory....................................................................630Qingdong Du, Jin Li, Xiao Chen
SPECIAL SESSION ON NEW TECHNOLOGIES AND THEIR APPLICATIONS IN IMAGE ENGINEERING 1 A Novel Digital Watermarking Method for New Viewpoint Video Based on Depth Map .......................634
Ning Zhu, Guiguang Ding, Jianmin Wang
A Novel Algorithm for Object Tracking with Particle Filtering and GVF-Snake ....................................639Dong Chun-li, Dong Yu-ning
Anomaly Detection in Computer Networks Using Dissimilarity-Based One-Class Classifiers .........................................................................................................................................................645
Jun Ma, GuanZhong Dai
Robust Image Watermarking Using Mean Quantization in DTCWT Domain .........................................650Baolong Guo, Leida Li, Jeng-Shyang Pan, Liu Yang, Xiaoyue Wu
Design and Simulation of a Sliding Mode Controller for Reducing Radial Vibration of an Eccentric Rotor Equipped with an Automatic Dynamic Balancer .............................................................654
Chun-Lung Huang
An Embedded Fuzzy Type-2 Controller Based Sensor Behavior for Mobile Robot .................................660Siti Nurmaini, Siti Zaiton Mohd Hashim
Pattern Optimization and the Application in Question Answering ............................................................666Yongping Du, Ming He
Automatic Learning of Semantic Region Models for Event Recognition...................................................671Lei Gao, Chao Li, Yi Guo, Zhang Xiong
Predicting Protein-Protein Recognition Using Feature Vector...................................................................676Huang-Cheng Kuo, Ping-Lin Ong, Jia-Jie Li, Jen-Peng Huang
PCA-Based Face Verification and Passport Code Recognition Using Improved FKCN Algorithm .........................................................................................................................................................682
Kwang-Baek Kim, Am-suk Oh, Young-Woon Woo
SOFTWARE AGENT TECHNOLOGY AND APPLICATIONS An Efficient Forward and Backward Fault-Tolerant Mobile Agent System .............................................689
Jong-Shin Chen, Hong-Da Shi, Ching-Mu Chen, Zeng-Wen Hong, Pei-Lin Zhong
Design of an IDML-Based Interactive Agent Drama Authoring Tool .......................................................695Tai-Hong Chen, Jim-Min Lin, Kai-Yi Chin, Zeng-Wei Hong
The Study of Backup Mechanism for Web Services Based on MAS and Topic Maps..............................701Feng-Chao Yang, Jin-Ling Liao, Cheng-Li Chang
Applying Agent Composition for Development of Service-Oriented Program Language........................707Jong Yih Kuo, Frank Hsieh, Ho Chin Lin
Students’ Attention in Learning Process as a Research Domain: Software Agent Promotes Human-Robot-Computer Interaction ...........................................................................................................713
Sheng-Hui Hsu, Yueh-Min Huang
Application of Polynomial Neural Networks to Exchange Rate Forecasting.............................................718R. Ghazali, A. J. Hussain, M. N. Mohd. Salleh
A Cyclic Coding Based Perceptual Hashing Algorithm...............................................................................724Hui Zhang, Yanan Wang, Xiamu Niu
Multi-user Signals Combined with Quadratic Residue Code for Monitoring System ..............................728Chien-Jung Ho, Wen-Hao Hsieh, Gwo-Jia Jong
Data Mining of Geographical Accessibility for Tourism in Regional Area ...............................................732Koji Okuhara, Kuang-Yih Yeh, Hao-Ching Hsia, Hiroaki Ishii
Some Software Engineering and Knowledge Representation Principles for the Design and Construction of Ontology-Based Linguistic Resources................................................................................738
Francisco Alvarez, Antonio Vaquero, Fernando Sáenz
INTELLIGENT MULTIMEDIA RETRIEVAL AND WATERMARKING Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain..................744
Rui-Xin Zhan, K. Y. Chau, Zhe-Ming Lu, Bei-Bei Liu, W. H. Ip
Comments on "A Semi-blind Digital Watermarking Scheme Based on Singular Value Decomposition" ...............................................................................................................................................748
Ting-Xian Zhang, Wei-Min Zheng, Zhe-Ming Lu, Bei-Bei Liu
A Novel Image Authentication and Recovery Method for Applications of Image Sharing ......................752Chiang-Lung Liu
Population Control for Multi-agent Based Topical Crawlers .....................................................................758Alban Mouton, Pierre-Francois Marteau
H-Index Analysis of Enron Corpus ...............................................................................................................763Václav Snášel, Jirí Dvorský, Anton Timofieiev, Jaroslav Pokorný
Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification .....................................................................................................................................770
Zhi-Sam Lee, Mohd Aizaini Maarof, Ali Selamat, Siti Mariyam Shamsuddin
Multi-scale Entropy Based Traffic Analysis and Anomaly Detection ........................................................776Yan Ruo-Yu, Zheng Qing-Hua
Adaptive Knowledge Retrieving on Mobile Grid .........................................................................................783Yue-Shan Chang, Pei-Chun Shih, Yu-Cheng Luo
Fuzzy Crashing Problem on Project Management Based on Confidence-Interval Estimates .................789Feng-Tse Lin
On Genetic Algorithms for Boolean Matrix Factorization..........................................................................795Václav Snášel, Jan Platoš, Pavel Krömer
NOVEL COMPUTATION ON NETWORKING AND MULTIMEDIA COMMUNICATION A Scanning Method for Dotted Data Matrix ................................................................................................801
Yuan-Fei Cheng
The Development of Enhanced Hash Mechanism for Improving Performance of IEEE 802.15.4.............................................................................................................................................................806
Bih-Yaw Shih, Jyun-Ying Tseng
The Image Watermarking Technique Using Visual Secret Sharing Strategy ...........................................812Shu-Chien Huang, Chu-Fu Wang
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks.........................................................................................................818
Chu-Fu Wang, Shu-Chien Huang
Unknown Malicious Executable Defection....................................................................................................824Yingxu Lai
A Distributed Algorithm for 0-1 Knapsack Problem Based on Mobile Agent ..........................................830Shanping Qiao, Shixian Wang, Yongzheng Lin, Ling Zhao
A Novel Algorithm for Weighted-Fair Rate Control in Wireless Sensor Network ...................................835Lufeng Mo, Yueyun Shen
Verification of Mobile SMS Application with Model Checking Agent.......................................................839Siti Dianah Abdul Bujang, Ali Selamat
A Sort-Based DBA Algorithm for EPON System.........................................................................................845Wen-Ping Chen, Shih-Wei Kau, Bin-Yih Liao, Wen-Shyang Hwang, Wen-Tsung Hu
The Reform Schema and Usability of TD-SCDMA Smart Antenna ..........................................................851Fu Haiyang, Qu Xiaochun, Han Youcai
SPECIAL SESSION ON NEW TECHNOLOGIES AND THEIR APPLICATIONS IN IMAGE ENGINEERING 2 Image Registration Using Rotation Normalized Feature Points .................................................................857
Yang Zhan-long, Guo Bao-long
Efficient Intra Refresh Using Motion Affected Region Tracking for Surveillance Video over Error Prone Networks............................................................................................................................862
Jie Jiang, Baolong Guo, Wei Mo
Convergence Analysis of PSO Inspired by r- and K-Selection....................................................................867Yunyi Yan, Baolong Guo
Inertia-Adaptive Particle Swarm Optimizer for Improved Global Search ...............................................873Kaushik Suresh, Sayan Ghosh, Debarati Kundu, Abhirup Sen, Swagatam Das, Ajith Abraham
Fuzzy Logic Controllers for a Seismic Isolation System with Variable Friction Damper ........................879Ging Long Lin, Lyan Ywan Lu
Blind Image Deconvolution via Particle Swarm Optimization with Entropy Evaluation ........................885Tsung-Ying Sun, Chan-Cheng Liu, Yu-Peng Jheng, Jyun-Hong Jheng, Shang-Jeng Tsai, Sheng-Ta Hsieh
A Hybrid Feature Selection Mechanism .......................................................................................................891Hui-Huang Hsu, Cheng-Wei Hsieh, Ming-Da Lu
A Face Image Database for Evaluating Out-of-Focus Blur.........................................................................897Qi Han, Meihui Zhang, Chen Song, Zhifang Wang, Xiamu Niu
Wavelet-Based Image Fusion by Adaptive Decomposition .........................................................................903Yao-Hong Tsai, Yen-Han Lee
DNA Computing and Its Applications...........................................................................................................908Junzo Watada, Rohani binti abu Bakar
APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND SOFT-COMPUTING 1 Unsupervised Clustering by Means of Hierarchical Differential Evolution Algorithm............................915
Chih-Chin Lai, Pei-Fen Lee, Pei-Yun Hsieh
Support Vector Regression for GDOP ..........................................................................................................920Wei-Han Su, Chih-Hung Wu
2D/3D Face Recognition Using Neural Networks Based on Hybrid Taguchi-Particle Swarm Optimization ....................................................................................................................................................925
Cheng-Jian Lin, Chen-Hsiang Chu, Chi-Yung Lee, Ya-Tzu Huang
Design of Self-Learning Fuzzy System by GA Approach ............................................................................931Shian-Tang Tzeng
Ant System Algorithm with Negative Pheromone for Course Scheduling Problem .................................937Djasli Djamarus, Ku Ruhana Ku-Mahamud
Compute the Term Contributed Frequency .................................................................................................943Cheng-Lung Sung, Hsu-Chun Yen, Wen-Lian Hsu
Output-Feedback PID Controllers for Robot Manipulators with Jacobian Uncertainty.........................947Chunqing Huang, Xiafu Peng
Intelligent Control for Principal Axis of Variable Vector Propeller of Submersible Vehicle ..................953Liu Sheng, Xu Dong-hao
A Novel Template Protection Algorithm for Iris Recognition ....................................................................958Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch
Implementation of Wiki-Based Knowledge Management Systems for Small Research Groups..............................................................................................................................................................964
Chia-Han Yang, Ming-Ying Wu, Chien-Min Lin, Don-Lin Yang
COMPUTATIONAL INTELLIGENCE AND SECURITY 1 A Stressed Syllable Labeling Approach Using Fractal Dimensions ...........................................................968
Qingcai Chen, Dandan Wang, Xiaolong Wang
A High Efficiency Protocol for Reporting Integrity Measurements ...........................................................973Chang Chaowen, He Rongyu, Xie Hui, Xu Guoyu
Chinese Unknown Word Recognition Using Improved Conditional Random Fields ...............................978Yisu Xu, Xuan Wang, Buzhou Tang, Xiaolong Wang
A Modified Cluster-Based Routing Protocol with Cloud Model.................................................................983Yong Zhang, Yan-jun Yang, Jian-peng Xu, He Wang
Immune Network for Classifying Heterogeneous Data ...............................................................................988Mazidah Puteh, Khairuddin Omar, Abdul Razak Hamdan, Azuraliza Abu Bakar
Chattering-Free Fuzzy Sliding Mode Control Strategy for Uncertain Discrete Systems with Input Saturation ..............................................................................................................................................993
Linsheng Li, Jianning Li
Comparing Query Similarity Measures for Collaborative Web Search ....................................................998Pavel Krömer, Václav Snášel, Jan Platoš
Evaluation of Automatic Text Summarization Methods Based on Rhetorical Structure Theory ............................................................................................................................................................1004
Vinícius Rodrigues Uzêda, Thiago Alexandre Salgueiro Pardo, Maria das Graças Volpe Nunes
Two Evolutionary Multiobjective Approaches for the Component Selection Problem ..........................1010Andreea Vescan, Crina Grosan
Uniform Parallel Machines Scheduling Using a Genetic Algorithm ........................................................1016Alin Mihaila, Cristina Mihaila
INTELLIGENT DATABASE SYSTEMS Ontology-Supported Focused-Crawler for Specified Scholar’s Webpages..............................................1022
Sheng-Yuan Yang, Chun-Liang Hsu
A Modular Method for Estimating Null Values in Relational Database Systems ...................................1028Shin-Jye Lee, Xiaojun Zeng
PNagent: A Framework for Modelling BDI Agents Using Object Oriented Petri Nets..........................1033Zdenek Mazal, Radek Kocí, Vladimír Janoušek, František Zboril
Deductive E-Bargaining System...................................................................................................................1039H. F. Lai, S. G. Chen, W.-H. Jeng
Application of Grey Relational Analysis for Multivariate Time Series....................................................1045Roselina Sallehuddin, Siti Mariyam Hj. Shamsuddin, Siti Zaiton Mohd Hashim
Research on Properties of Max-Product Fuzzy Associative Memory Networks .....................................1051Shuiling Zeng, Weihong Xu, Jingyu Yang
Rescheduling for Manufacturing Based on Ontology and Problem Solving Method .............................1057Muhammad Firdaus B. Mustapha, Safaai B. Deris
Control Strategy of Dynamic Leontief Input-Output Model ....................................................................1063Xiumei Wu, Lei Jiang
GM (1, 1) and DEA Application Model for Strategic Alliance in Taiwan ...............................................1067Chia-Nan Wang, Ya-Ru Lee
Ontology Model for Multi-relational Data Mining Application................................................................1073Silvio Bortoleto, Nelson F. F. Ebecken
SPECIAL SESSION ON NEW TECHNOLOGIES AND THEIR APPLICATIONS IN IMAGE ENGINEERING 3 A Statistical Speckle Suppression Algorithm for Underwater Laser Image Based on Nonsubsampled Contourlet Transform ......................................................................................................1077
Liu Yang, Baolong Guo, Wei Ni
A Panoramic Image Stabilization System Based on Block Motion Iteration...........................................1083Zhu Juanjuan, Guo Baolong
FFT-Based Orientation Recognition Algorithm in Mirosot ......................................................................1088Xian-xiang Wu, Bao-long Guo
Robust Object Tracking via Hierarchical Particle Filter ..........................................................................1092Wei Sun, Bao-long Guo
Spider Search: An Efficient and Non-Frontier-Based Real-Time Search Algorithm .............................1097Chao Lin Chu, Russell J. Abbott, Debora K. Shuger
Estimation of Skin Color Range Using Achromatic Features ...................................................................1103Wen-Hung Liao, Yu-Hao Chi
Shape-Based Trademark Retrieval Using Cosine Distance Method.........................................................1108Bei-ji Zou, Marie Providence Umugwaneza
A High Performance Filter Based on Statistic Methods for Image Processing .......................................1115Pao-Ta Yu, Yui-Lang Chen, Bae-Muu Chang
Design and Application of a Reconfigurable Embedded System ..............................................................1121Ching-Biau Tzeng, Tzuu-Shaang Wey, Li-Dao Fang
Semi-supervised Laplacianfaces from Pairwise Constraints for Face Recognition ................................1127Na Wang, Xia Li
APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND SOFT-COMPUTING 2 Design of Fractional PID Control via Hybrid of Electromagnetism-Like and Genetic Algorithms .....................................................................................................................................................1133
Fu-Kai Chang, Ching-Hung Lee
The Application of Genetic Algorithm on Control of Discrete Multiple Time-Delay Singularly Perturbation Systems .................................................................................................................1139
Shin-Jang Pan, Jason S.-H. Tsai
Differential Evolution Algorithm on Robust IIR Filter Design and Implementation .............................1145Shing-Tai Pan, Bo-Yu Tsai, Chao-Shun Yang
A Study on the Applications of Learning Paths Concepts to the Teaching in Elementary School .............................................................................................................................................................1151
Huan-Ming Chuang, Chia-Cheng Shen
A Renewed Matrix Model for XML Data ...................................................................................................1157Jaroslav Pokorný, Jan Vávra, Vaclav Snášel
Combining Clustering and Bayesian Network for Gene Network Inference...........................................1165Suhaila Zainudin, Safaai Deris
A Fieldbus Comprehensive Evaluation and Selection Method Based on Entropy-Ideal Point ...............................................................................................................................................................1172
Wei-ming Tong, Hong-wei Gao
Facility Location Problem under Fuzzy Construction Cost and Preference of Candidate Sites.................................................................................................................................................................1177
Hiroaki Ishii, Yung Lung Lee
Boosted Voting Scheme on Classification....................................................................................................1181Chien-Hsing Chen, Chung-Chian Hsu
Context and Learning Based Approach to Programming of Intelligent Equipment ..............................1186Andrey V. Gavrilov
COMPUTATIONAL INTELLIGENCE AND SECURITY 2 Research on Access Control Based on Certainty Factor ...........................................................................1191
He Rongyu, Yin Jianchun, Chang Chaowen
P2P Recommendation Trust Model.............................................................................................................1197Xuan Wang, Lei Wang
Risk Dominance Strategy in Imperfect Information Multi-player Game ................................................1202Xuan Wang, Jiajia Zhang, Xinxin Xu, Zhaoyang Xu
Video Content Authentication Technique Based on Invariant Feature Detection and Cloud Watermark ....................................................................................................................................................1208
Chang-yin Liang, Hao Wu, Ang Li
One/T-Time Signatures Using Self-Certified Public Keys.........................................................................1214Dai-Rui Lin, Chih-I Wang, D. J. Guan
Untraceable Identity Management Framework for Mobile Access ..........................................................1220Min-Chih Kao, Yi-Shiung Yeh, Chuan-Chi Wang
An Efficient Heuristic for Minimizing Maximum Lateness on Parallel Batch Machines.......................1227Tsung-Che Chiang, Hsueh-Chien Cheng, Li-Chen Fu
A Comparison Between a KNN Based Approach and a PNN Algorithm for a Multi-label Classification Problem ..................................................................................................................................1234
Elias Oliveira, Patrick Marques Ciarelli, Claudine Badue, Alberto Ferreira De Souza
Human Action Retrieval via Spatio-temporal Cuboids .............................................................................1240Qingshan Luo, Guihua Zeng
An Improved PSO with Time-Varying Accelerator Coefficients..............................................................1244Zhihua Cui, Jianchao Zeng, Yufeng Yin
INTELLIGENT SYSTEM DESIGN AND APPLICATIONS FOR DIGITAL HOME USERS A Novel Fitness Function in Genetic Algorithms to Optimize Neural Networks for Imbalanced Data Sets ...................................................................................................................................1250
Kuan-Chieh Huang, Yau-Hwang Kuo, I-Cheng Yeh
An Efficient Data Retrieval Indexing Structure for Wireless Broadcasting System...............................1254Lien-Fa Lin, Chao-Chun Chen
An Intelligent Monitoring System for Local-Area Network Traffic.........................................................1260Ming-Han Wan, Mong-Fong Horng
Mobile Robot Path Planning Base on the Hybrid Genetic Algorithm in Unknown Environment ..................................................................................................................................................1264
Yong Zhang, Lin Zhang, Xiaohua Zhang
Constructing Intelligent Living Space Controlling System with Bluetooth and Speech-Recognition Microprocessor.........................................................................................................................1269
Chun-Liang Hsu, Sheng-Yuan Yang
Research on the Architecture of Policy-Based Satellite Network Management ......................................1275Wen-bo Zhang, Ye Xu, Yue-qiu Jiang
Knowledge Management on Concept Structure Analysis with Weighted Polytomous Ordering Theory and Cluster Analysis .......................................................................................................1280
Yuan-Horng Lin, Shin-Yu Chang, Sen-Chi Yu
State Estimation of ALV Integrated Navigation System Based on BP Neural Network ........................1285Meiling Wang, Yongwei Fu
Classifier Fusion Based on Weighted Voting - Analytical and Experimental Results ............................1290Michal Wozniak
A Fuzzy Neural Network Based on Particle Swarm Optimization Applied in the Speech Recognition System .......................................................................................................................................1296
Xueying Zhang, Ying Sun, Xiaomei Zhang, Peng Wang
E-COMMERCE SECURITY 1 Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem .........................1301
Jen-Ho Yang, Chin-Chen Chang
A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction ....................................................................................................................................................1304
Yu-Yi Chen, Jun-Chao Lui, Shin-I Chen
A Fair-Use DRM System Based on Web Service........................................................................................1309Yu-Yi Chen, Yao-Jen Wang, Cheng-Jie Chen
Design of Proxy Signature in ECDSA .........................................................................................................1315Ming-Hsin Chang, I-Te Chen, Ming-Te Chen
A Lock-Based Protocol for XML Metadata Knowledge Bases .................................................................1321Kuen-Fang Jea, Tsui-Ping Chang
Key-Dependent Compressed Domain Audio Hashing ...............................................................................1327Yuhua Jiao, Mingyu Li, Qiong Li, Xiamu Niu
LMSS: A Location-Based Multimedia Service System Using Wireless Networks ..................................1331Yiqiang Chen, Juan Qi, Zhuo Sun
Frequency Spectrum Prediction Method Based on EMD and SVR .........................................................1337Chang-Jun Yu, Yuan-Yuan He, Tai-Fan Quan
The Synchronous Drive System in Gantry-Moving Milling Machine Based on Dynamic Compensation and Fuzzy Control ...............................................................................................................1343
Gong Yishan, Qian Na
Enhanced Self-Adaptive Search Capability Particle Swarm Optimization .............................................1347Hu Juan, Yu Laihang, Zou Kaiqi
OPTIMIZATION METHODS, BINOMIAL SYSTEMS, AND APPLICATIONS TO THE MARKET EQUILIBRIUM Generation of Permutations Based Upon Factorial Numbers...................................................................1352
Alexei A. Borisenko, Vyacheslav V. Kalashnikov, Igor A. Kulik, O. E. Goryachev
Solving Bilevel Toll Assignment Problem by Penalty Function Algorithm .............................................1357Vyacheslav V. Kalashnikov, Nataliya I. Kalashnykova, José Fernando Camacho Vallejo
Inexact Newton Algorithm to Solve Nonlinear Complementarity Problems ...........................................1362Nataliya I. Kalashnykova, Vyacheslav V. Kalashnikov, Aarón Arévalo Franco
Liberalization of Mexican Electricity Market: Various Modeling Approaches with Numerical Simulation Results ......................................................................................................................1367
Vitaly V. Kalashnikov, Nataliya I. Kalashnykova, Felipe de Jesús Castillo Pérez, Armando César Uranga Sifuentes, Claudia Mayela Avila Garza
A Fuzzy Temporal Model and Query Language for FTER Databases ....................................................1372Liguo Deng, Zhiheng Liang, Yong Zhang
A New Support Vector Machine with Fuzzy Hyper-Plane and Its Application to Evaluate Credit Risk.....................................................................................................................................................1378
Pei-Yi Hao, Min-Shiu Lin, Lung-Biao Tsai
FPGA-Realization of Adaptive Fuzzy Controller for the Linear X-Y Table ...........................................1384Ying-Shieh Kung, Le Thi Van Anh, Shin-Hung Jou
The Self-Organizing Map Applying the "Survival of the Fittest Type" Learning Algorithm ...............1390Junko Shibata, Koji Okuhara, Shogo Shiode, Hiroaki Ishii
A New Iterative Learning Controller for Electro-Pneumatic Servo System............................................1396Shaojuan Yu, Jincai Bai, Shibo Xiong, Rucheng Han
Adaptive H8 Tracking Control Design in Robotic Systems with Parameter Perturbation and External Disturbance.............................................................................................................................1401
Huang Chun-Qing
MACHINE LEARNING, EVOLUTIONARY COMPUTATION AND THEIR APPLICATIONS Genetics-Based Machine Learning Approach for Rule Acquisition in an AGV Transportation System .................................................................................................................................1407
Kazutoshi Sakakibara, Yoshiro Fukui, Ikuko Nishikawa
Effective Integration of Imitation Learning and Reinforcement Learning by Generating Internal Reward ............................................................................................................................................1413
Keita Hamahata, Tadahiro Taniguchi, Kazutoshi Sakakibara, Ikuko Nishikawa, Kazuma Tabuchi, Tetsuo Sawaragi
Multimodal Medical Image Registration Using Particle Swarm Optimization.......................................1419Yen-Wei Chen, Chen-Lun Lin, Aya Mimori
A Heuristic Decoding Method for Coded Images of Uniformly Redundant Array.................................1424Shinya Nozaki, Shinsuke Fujioka, Yen-wei Chen
3D Function Approximation with rGCS Classifier System .......................................................................1428Lukasz Cielecki, Olgierd Unold
Attentiveness Assessment in Learning Based on Fuzzy Logic Analysis ...................................................1434Kuo-An Hwang, Chia-Hao Yang
A Novel Prediction Algorithm of Thermostable Proteins by Using Hurst Exponent and Choquet Integral Regression Model ............................................................................................................1439
Hsiang-Chuan Liu, Yu-Chieh Tu, Bai-Cheng Jeng, Tung-Sheng Liu
Feature Selection for Cancer Classification on Microarray Expression Data .........................................1445Hui-Huang Hsu, Ming-Da Lu
FPGA Realization of Activation Function for Artificial Neural Networks ..............................................1451Venakata Saichand, Nirmala Devi M., Arumugam S., N. Mohankumar
Use of NER Information for Improved Topic Tracking............................................................................1457Wang Xiaowei, Jiang Longbin, Ma Jialin, Jiangyan
INTELLIGENT WATERMARKING TECHNIQUES, IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY 1 Color Visual Cryptography Scheme Using Meaningful Shares ................................................................1463
Hsien-Chu Wu, Hao-Cheng Wang, Rui-Wen Yu
Robustness of Structure-Based Watermark by Using Balanced Incomplete Block Designs ..................1469Zhi-Fang Yang, Mong-Shu Wu
A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding.............................................................................................................................................................1473
Wien Hong, Chih-Wei Shiu, Tung-Shou Chen
Mining Region-Based Movement Patterns for Energy-Efficient Object Tracking in Sensor Networks ........................................................................................................................................................1478
Vincent S. Tseng, Ming Hua Hsieh, Kawuu W. Lin
Reversible Watermarking for Compressed Speech ...................................................................................1487Mingyu Li, Yuhua Jiao, Xiamu Niu
A Novel Algorithm for Completely Hiding Sensitive Association Rules ..................................................1492Chih-Chia Weng, Shan-Tai Chen, Hung-Che Lo
Lossless and Lossy Image Secret Sharing for Data Transmission ............................................................1499Faxin Yu, Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu
Microcomputer Based Smart Engine Ignition Control System for Motorcycles.....................................1505Ching-Biau Tzeng, Tzuu-Shaang Wey, Tsung-Yu Su
Backward-Forward Combined Convolutive Blind Source Separation ....................................................1512Xiaoyue Jiang, Hichem Sahli, Werner Verhelst, Yanning Zhang
Solving TSP with Shuffled Frog-Leaping Algorithm .................................................................................1518Xue-hui Luo, Ye Yang, Xia Li
E-COMMERCE SECURITY 2 Efficient Authentication Schemes for Handover in Mobile WiMAX .......................................................1523
Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, Shin-Yan Chiou
The Essential Design Principles of Verifiable Non-interactive OT Protocols ..........................................1529Ya-Fen Chang, Wei-Cheng Shiao
An Exchangeable E-Cash Scheme by E-Mint.............................................................................................1534Jung-Wen Lo, Min-Shiang Hwang, Yen-Ping Chu
Multiple-Image Encryption by Rotating Random Grids...........................................................................1540Tzung-Her Chen, Kai-Hsiang Tsao, Kuo-Chen Wei
Hospital Management Based on Data Mining ............................................................................................1545Shusaku Tsumoto, Shoji Hirano
E-Business Social Network Optimization and Visualization .....................................................................1551Siti Nurkhadijah Aishah Ibrahim, Ali Selamat, Mohd Hafiz Selamat
Efficient Mining of Frequent Closed Itemsets without Closure Checking ...............................................1557Chih-Hsien Lee, Don-Lin Yang, Jungpin Wu, Kuo-Cheng Yin
An Efficient Approximate Approach to Mining Frequent Itemsets over High Speed Transactional Data Streams .........................................................................................................................1563
Kuen-Fang Jea, Chao-Wei Li, Tsui-Ping Chang
Detection Method Based on Reverse Proxy against Web Flooding Attacks ............................................1569Chu-Hsing Lin, Jung-Chun Liu, Chih-Chieh Lien
Study on X-VRML-Based Modelling of Virtual Museum .........................................................................1573Shengnan Zhang, Limin Song, Lianqiang Niu
DIGITAL CRIME AND FORENSICS 1 A Model for a Distance Learning System over the Internet ......................................................................1577
Alessandro Brawerman, Cícero F. Marques, Francisco J. K. G. Navarro, Rafael Ribeiro Macedo
E-Business Model Approach to Determine Models to Datawarehouse ....................................................1579Diego Alex Harmatiuk, Silvio Bortoleto, Wesley Pereira de Oliveira, Durval Neto, Everson Volaco
A Reversible Steganographic Algorithm for Point-Sampled Geometry...................................................1582Peng-Cheng Wang, Kuo-Chen Wu, Chung-Ming Wang
Secret Sharing Scheme with Non-expansible Shadow Size for Color Images..........................................1588Chia-Chen Lin, Wen Xiu Zhang
An Ordered Multi-proxy Multi-signature Scheme.....................................................................................1594Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou
Adaptive Image Hiding Algorithm Based on Classification ......................................................................1600Shengbing Che, Qiangbo Huang, Bin Ma
Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process............................................................................................................................................................1606
Lin-Yu Tseng, Yung-Kuan Chan, Yu-An Ho, Yen-Ping Chu
The Improvement of Public Key Cryptography Based on Chaotic Neural Networks ............................1612Yunpeng Zhang, Tongtong Xue, Zhengjun Zhai, Chunyan Ma, Xiaobin Cai
Reversible Watermarking Based on the Invariant Sum Value .................................................................1617Shaowei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni
A GA-Based Image Halftoning Technique..................................................................................................1621Chih-Cheng Lo, Yi-Ting Chen, Shu-Chuan Chu, Jeng-Shyang Pan
INTELLIGENT VIDEO PROCESSING 1 Face Recognition Based on Digital Curvelet Transform ...........................................................................1625
Yi-Chun Lee, Chin-Hsing Chen
Subpixel Edge Location Using Orthogonal Fourier-Mellin Moments Based Edge Location Error Compensation Model .........................................................................................................................1630
Wen-Chia Lee, Chin-Hsing Chen
A Watermarking Method for Still Images Using Modified Code Division Multiple Access ..................1636Ji-Hong Chen, Chin-Hsing Chen, Wen-Yuan Chen
A Fast and Stable Superresolution Reconstruction Method for Compressed Video Sequences .......................................................................................................................................................1642
Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang
A New Multi Criteria Aid Model for Process Piloting Using Case-Based Reasoning .............................1647Dhouib Diala, Chabchoub Habib, Addouche Sid-Ali, Abderrahman ElMhamedi
A Fast Mode Decision Scheme with Variable Block Sizes in H.264/AVC ................................................1652Pengyu Liu, Kebin Jia
An Edge-Recovery-Based Error Concealment Method for Video ............................................................1656Jifeng Sun, Wenkai Huang, Zhiyong Zhang
Mesh-Based In-band Motion Estimation Method ......................................................................................1660Deng Chen-wei, Zhao Bao-jun
Development of a Portable Automatic Inspection System for Printed Labels Using a Web Camera ...........................................................................................................................................................1665
Yuhki Shiraishi, Fumiaki Takeda
A Kind of Parallel Reference Frame Display Control Algorithm.............................................................1670Bowen Fu, Wenhe Zhang, Lianqiang Niu
INTELLIGENT WATERMARKING TECHNIQUES, IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY 2 Suffix Tree Based Approach for Chinese Information Retrieval .............................................................1675
Jin Hu Huang, David Powers
Efficient Image Recovery Based on Self-Embedding .................................................................................1680Yuan-Liang Tang, Chin-Feng Lee, Huai-En Lee
Tamper Detection of Relational Database Based on SVR Predictive Difference ....................................1685Hsien-Chu Wu, Fang-Yu Hsu, Hwang-Yu Chen
A Blind Associative Watermarking Technique Using Self-Embedding ...................................................1691Chin-Feng Lee,Tsung-Chia Yang
A Novel Algorithm for Ultrasonic Stereovision Data Enhancement ........................................................1696Liu Lu, Liu Wanyu
Optimal Tuning of PI Speed Controller Using Nature Inspired Heuristics.............................................1702Millie Pant, Radha Thangaraj, Ajith Abraham
A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC)...........................1708Tung-Shou Chen, Jeanne Chen, Yuan-Hung Kao, Tsang-Chou Hsieh
Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding .................1713Hao Luo, Faxin Yu, Jeng-Shyang Pan, Zhe-Ming Lu
Tardiness in Fuzzy Flow Shop Scheduling Problems Based on Possibility and Necessity Measures ........................................................................................................................................................1719
Peng-Jen Lai, Ming-Hung Shu
Fast Parallel Molecular Solution to the Hitting-Set Problem...................................................................1724Nung-Yue Shi, Chih-Ping Chu
E-COMMERCE SECURITY 3 A Mobile Trading Scheme for Digital Content Based on Digital Rights ..................................................1730
Chia-Chen Lin, Po-Hsuan Chiang
Fast Modular Multiplication for E-Commerce Cryptosystem ..................................................................1736Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang
Multi-recastable E-Bidding Scheme ............................................................................................................1741Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol ........................................1746Chin-Chen Chang, Jung-San Lee
An Efficiently Online/Offline Signcryption for Firewall ...........................................................................1751Dai-Rui Lin, Chih-I Wang, D. J. Guan
Self-Certified Proxy Convertible Authenticated Encryption Scheme ......................................................1758Han-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh
The 2D Bar-Code Technology Applications in Medical Information Management................................1763Yao-Lung Yeh, Jing-Cyun You, Gwo-Jia Jong
Cultural-Based Genetic Algorithm: Design and Real World Applications..............................................1767Mostafa A. El-Hosseini, Aboul Ella Hassanien, Ajith Abraham, Hameed Al-Qaheri
Improvement of SCTP Performance in Vertical Handover ......................................................................1773Chin-Shiuh Shieh, I-Cheng Lin, Wei Kuang Lai
A Prediction Mechanism of Mail Retrieval Based on the User Behavior Analysis for Electronic Mail Database System ................................................................................................................1778
Wei-Ru Lai, Che-Hui Liao, Chang-Ching Lu, Ming-Kuan Liao
DIGITAL CRIME AND FORENSICS 2 Model of Approach and Determination of the Failure Pertaining to School ...........................................1784
Katia Bortoleto, Silvio Bortoleto
KDD on IVR Navigation Trees: Case Study ...............................................................................................1787Thiago T. Angélico, Thais Santos Bueno, Silvio Bortoleto, Anderson Ravanello
A Block-Based Authentication Watermarking Technique for Binary Images ........................................1790Hsien-Chu Wu, Yu-Chi Liu, Kuo-Ching Liu, Chwei-Shyong Tsai
An Image Steganographic Scheme Based on Support Vector Regression ...............................................1796Hsien-Chu Wu, Kuo-Ching Liu, Jun-Dong Chang, Ching-Hui Huang
Complete Double Layered Embedding Scheme for Information Hiding .................................................1802Chin-Feng Lee, Jau-Ji Shen, Hung-Lin Chao
NGN Service Pricing Support Decision System Based on Fuzzy Neural Network: NPDSS ...................1806Zhang Jin-Yu, Liang Man-Gui
A Collision Avoidance Protocol for Supporting All-Optical Ring Network ............................................1812Wen-Ping Chen, Shih-Wei Kau, Wen-Shyang Hwang, Bin-Yih Liao, Wen-Tsung Hu
A Robust Audio Watermarking Algorithm Based on DCT and Vector Quantization ...........................1818Ji-Xin Liu, Zhe-Ming Lu, Jeng-Shyang Pan
A Weight Method of Decoding the Binary BCH Code...............................................................................1822H. P. Lee, H. C. Chang, T. C. Lin, T. K. Truong
Digital Watermark for 3D Face Model Authentication and EER Performance Analysis ......................1827Wenjun Huang, Xiamu Niu, Wei Song, Meiyu Lu
INTELLIGENT VIDEO PROCESSING 2 Video Stabilization by Feature-Block Motion Estimation .........................................................................1832
Chao-Ho (Thou-Ho) Chen, Che-Wei Hsu, Chin-Hsing Chen
The Study on Video Enhancement in the Low-Light Environment by Spatio-temporal Filtering..........................................................................................................................................................1836
Tsong-Yi Chen, Thou-Ho (Chao-Ho) Chen, Che-Ping Su, Yi-Jun Chen
People Counting System for Getting In/Out of a Bus Based on Video Processing ..................................1840Chao-Ho (Thou-Ho) Chen, Yin-Chan Chang, Tsong-Yi Chen, Da-Jinn Wang
A Video Similarity Matching Algorithm Supporting for Different Time Scales .....................................1845Zhi-pin Deng, Ke-bin Jia
An Actor-Based Video Segmentation System Using Visual and Audio Information in E-Learning .........................................................................................................................................................1850
Yi-Chun Liao, Ming-Hong Syu
Prediction Filling Differences for Compress a Set of HDR Images ..........................................................1856Jeanne Chen, Tung-Shou Chen, Ping-Feng Chen
Building a Flexible Energy Management System with LonWorks Control Network .............................1862Ching-Biau Tzeng, Tzuu-Shaang Wey, Sheng-Hsiung Ma
Efficient Scalable Distributed Video Coding Based on Residual SW-SPIHT..........................................1869Anhong Wang, Yao Zhao, Jeng-Shyang Pan
Applying the Extended Classifier System to Trade Interest Rate Futures Based on Technical Analysis.........................................................................................................................................1873
An-Pin Chen, Yu-Chia Hsu, Chien-Hua Huang, Ya-Chun Yang
A Moving Objects Detection Algorithm Based on Improved Background Subtraction .........................1879Lianqiang Niu, Nan Jiang
INTELLIGENT WATERMARKING TECHNIQUES, IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY 3 Bioinformatics Approach to Discover the Relationship Between Single Nucleotide Polymorphisms and Tumors ........................................................................................................................1883
Fang Rong Hsu, Wen Chun Lo
A Lossless Secret Image Sharing Method ...................................................................................................1888Hao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, Chiang-Lung Liu
Non-embedded Image Protection Approaches Based on Vector Quantization .......................................1892Cheng-Hsing Yang, Shu-Chien Huang, Cheng-Ta Huang, Shiuh-Jeng Wang
The Technique of Information Hiding Based on Modification Function and LSB Matching................1898Tzu-Chuen Lu, Li-Ling Hsu
Lossless Data Hiding for Color Images .......................................................................................................1904Ching-Hui Huang, Chih-Chiang Lee, Hsien-Chu Wu, Chung-Ming Wang
A Novel Shape-Texture Approach to Palmprint Detection and Identification........................................1910Michal Choras, Rafal Kozik, Aleksandra Zelek
A Novel Image Annotation Scheme Based on Neural Network ................................................................1916Yufeng Zhao, Yao Zhao, Zhenfeng Zhu, Jeng-Shyang Pan
Database-Driven Disease Prevention by Daily Menu Management and Physical Condition .................1920Eri Domoto, Koji Okuhara, Hiroaki Ishii
Towards a Suitable Reconciliation of the Findings in Collaborative Fuzzy Clustering..........................1924Rafael Falcón, Benoît Depaire, Koen Vanhoof, Ajith Abraham
A Real Time Spatial/Temporal/Motion Integrated Surveillance System in Compressed Domain ...........................................................................................................................................................1930
Chen-Chiung Hsieh, Wei-Ru Lai, Albert Chiang
Author Index