PROGRAM
5th
WSEAS International Conference on
APPLIED
COMPUTER SCIENCE
(ACOS '06)
Hangzhou, China,
Sponsored by WSEAS and WSEAS Transactions
Co-Organized by WSEAS and Zhejiang University of Technology
April 16-18, 2006
Sunday, April 16, 2006
INTRODUCTION
Welcome Speech by the President of Zhejiang University of Technology
Plenary Lecture I
Plenary Lecture II
Yong Chen
Ecole Normale Supérieure, 24 rue Lhomond, 75005 Paris, France
Laboratoire de Photonique et de Nanostructures, CNRS, 91460 Marcoussis, France
(http://www.ens.fr, http://www.lpn.cnrs.fr)
Nanotechnology has been much promoted during the last few years. While the
universal goal of this development, like any others, is the capability
enrichment of human beings, nanotechnology is the pathway to understand and
explore material and living systems at molecular levels. This could be only
possible by matching both top down (miniaturisation) and bottom up (auto-organisation)
approaches which is highly interdisciplinary. One of the challenges is to
develop new methods and new instruments for chemical and biological processing
at micro and nano-scales. Microfluidic devices are such emerging systems which
can be manufactured at low cost and high throughput, with the manner of the
production of microelectronic circuits.
During the
past few years, many efforts have been devoted to the demonstration of
microfluidic device capabilities of doing the same works as can be done using
desktop equipments. It is known that new phenomena and un-known physicochemical
properties can be observed if the dimension of the integrated features is
reduced to a nano-meter scale. From this point of view, it is more interesting
to explore new potentialities offered by micro and nanostructures patterning
techniques. In all cases, microfluidic principles have to be applied as soon as
possible to the advanced research topics in biochemistry, in biology and in
biomedical research areas. By doing so, we enjoy a number of interdisciplinary
studies that also have great industrial interests.
In this talk, we will review our approaches based on low cost and high
throughput nanofabrication technologies. We will show how microfluidic chips can
be used to create new functionalities for single cell and single molecule
analyses and how fundamental physics knowledge can be applied to biochemical and
biological processing. Our long term research strategy will be also discussed
concerning bio-nano-info-cognitive (BNIC) convergence recently developed in both
ENS and LPN laboratories.
Plenary Lecture III
Laser based micro CAD/CAM system
Wenhao Huang
Department of Precision Machinery and Precision Instrumentation,
University of Science and Technology of China, Hefei, 230026, P. R. China
Email: whuang@ustc.edu.cn
CAD and CAM systems have been widely used in industry all over the world. The emerging micro and nano CAD/CAM systems are still in the incipient stages of scientific research and development. However, the developing speed of these systems are quite high, especially in micro and nano engineering field.
There are two basic important issues featuring the micro and nano CAD/CAM systems. The one is that new concepts and new principles are adopted in these systems. The other is the interdisciplinary fusion. So the clever and well trained scientists and researchers are facing great chances and challenges.
In this research, a femto second laser based micro and nano CAD/CAM system is introduced. The two photon exciting non-linear effect, Ti-sapphire fs laser, the confocal microscope, 3D scanner and the design/manufacturing software are presented. The main advantages of this system are discussed. Some functional micro devices such as micro gears, 3D photonic crystals, micro lens array are demonstrated by our micro CAD/CAM platform. Several important aspects such as the fabricating resolution, scanning parameters and the performance of the devices are evaluated theoretically and experimentally.
SPECIAL SESSION: Computer Application in Formal Education
Chair: Kuo-hung Tseng
Study on Signal Annotations of Internet Graphic Icons |
Rong-Lain Ho, Chin-Mou Cheng |
|
The Role of Information Technology in Knowledge Management (KM) Strategies of Teachers |
Kuo-Hung Tseng, Yao-Ming Chu, Chu-Chih Liao, Chun-Yu Chen, Chien-Hsun Tseng |
|
A PDA-based Mobile Profiling System for Customized Learning |
Seong Baeg Kim, Kyoung Mi Yang, BongKyu Lee, Doo-Yeong Yang, Sun Young Kim, Cheol Min Kim |
|
The effect of application computer in homeland education of students |
Kuo- hung Tseng, Yao-Ming Chu, Yao-Yuan Liu, Ya- Lin Li, Chu- Chih Liao |
SPECIAL SESSION: Computer Application in Formal Education I
Chair: Kuo-hung Tseng
Effects of Mindtools to Pupils’ Technology Perception and Cognitive Flexibility |
Kuo-Hung Tseng , Chun-Yu Chen , Chien-Hsun Tseng, Chu-Chih Liao |
|
The Effect of Mind tools in Mathematic Infusion Web-enhanced Project-Based Learning |
P. S., Hung, Kuo-hung Tseng , Yuan Chen, Chun-Yu Chen, I-Hua Lin |
|
The Impact of Internet Technology on Spiritual Health of College Students |
Chin-Mou Cheng, Yao-Yuan Liu, Rong-Lain Ho |
|
The effects of integrating concept mapping into computer assisted instruction in biology at a comprehensive high school |
Shi-Jer Lou, Ru-Chu Shih, Chao-Rong Yen, Kuo-Hung Tseng, Hsaio-Li Wu |
|
A Study of the Personal Digital Assistant Promoting the Teacher's Instructional Innovation |
Kuo-hung Tseng, Chi-Jen Lee, Hua-Lin Tsai, Tien-Sheng Tsai |
|
A study of Life Technological Course of using Information Science and Technology in Cross-area Learning |
Kuo-hung Tseng, Tien-Sheng Tsai, Chi-Jen Lee, Hua-Lin Tsai, Ching-Han Huang |
SPECIAL SESSION: Distributed Systems and Security
Chair: Al-Dahoud Ali
SKQML: a secure multi-agent communication language |
Zhu Liehuang, Cao YuanDa, Liao Lejian, Wang DaZhen |
|
Developing and Investigation of a New Technique Combining Message Authentication and Encryption |
Eyas El-Qawasmeh, Saleem Masadeh |
|
The minimum-energy broadcast problem in symmetric wireless ad hoc networks |
Fredrick Mtenzi, Yingyu Wan |
|
SEMF Testing Methodology for an Inter-eBusiness Software development |
Victor Fernandez P., Ricardo Chalmeta |
|
Computer aided composing learning matrial into primary learning tree |
Afif Mghawish, Marek Woda, Piotr Michalec |
|
Secure group key distribution protocol for distributed systems |
Zhu Liehuang, Cao YuanDa, Liao Lejian, Wang Dazhen |
SPECIAL SESSION: Distributed Systems and Security
Chair: Al-Dahoud Ali
Influence mass distribution function for dependability of processing transactions with temporal-probabilistic description |
Afef Mghawish, Zygmunt Mazur, Piotr Michalec, Marek Woda |
|
Improvement heuristics for the sparse travelling salesman problem |
Fredrick Mtenzi |
|
New spatial filters for image enhancement and noise removal |
Moh'd Belal Al-Zoubi, Ammar M. Kamel, Makki J. Radhy |
|
A robust font recognition using invariant moments |
Carlos Avilé-Cruz, Juan Villegas-Cortes, Juan Ocampo-Hidalgo |
|
New hardware architecture for bit-counting |
Ahmed Dalalah, Sami Baba, Abdallah Tubaishat |
|
Replicas redistribution in distributed database using creative evolutionary systems approach |
Al-Dahoud Ali, Mohamed A. Belal |
SESSION: Web Services and routing Protocols
Chair: Seong Baeg Kim
Constructing Web Service in Equivalent Transformation Programming Language |
Zheng Cheng, Katsunori Katou, Kiyoshi Akama |
|
Componentwise program construction: the equivalent transformation computation model versus the logic programming model |
Kiyoshi Akama, Ekawit Nantajeewarawat, Hidekatsu Koike |
|
Adaptable Wrapper Generation for Web Page Format Change |
Yue-shan Chang |
|
Postgate: QoS-aware Bandwidth Management for Last-mile ADSL Broadband Services |
Ming-I Hsieh, Eric Hsiaokuang Wu |
|
Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic |
Alimujiang Yiming, Toshio Eisaka |
|
A new packet forwarding algorithm in geographical location based mobile Ad Hoc routing protocol |
Shen Changxing, Li Yuhong, Ma Jian |
|
Reliability and Congestion Control for VoIP Signalling Transport |
Meredith Lulling, John Vaughan |
SESSION: Diagnostic Methods, Scheduling Schemes and Algorithms
Chair: Hung-Jen Yang
A new method for fish-disease diagnostic problem solving based on parsimonious covering theory and fuzzy inference model |
Daoliang Li, Jiwen Wen, Zetian Fu |
|||
A channel selection method to increase wireless sensor battery life |
Alessandra Flammini, Daniele Marioli, Emiliano Sisinni, Andrea Taroni |
|||
A hybrid tele-diagnosis system on fish disease |
Daoliang Li, Wei Zhu, Zetian Fu |
|||
Performance Evaluations on Caching Systems using Closed Queuing Network Modeling |
K. Y. Wong, K. H. Yeung |
|||
A Reliable Task Scheduling Scheme For Sensor-based Real-time Operating System |
Yingwu Wang, Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan |
|||
Integrating Network QoS and Web QoS to Provide End-to-End QoS |
Wang Fei, Wang Wen-Dong, Li Yu-Hong, Chen Shan-Zhi |
|||
Disk Access Analysis for System Performance Optimization |
Daniel Martens, Michael Katchabaw |
|||
A Identification Algorithm of Freeway Steady-state Speed-Density Balance Relational Expression Based on the Power Series Expansion and the Least Squares Method |
Xuhua Yang, Shengyong Chen, Wanliang Wang, Youxian Sun |
|||
Monday, April 17, 2006
SPECIAL SESSION: Computer Application in Formal Education II
Chair: Kuo-hung Tseng
Social interactions of the computerized collaborative problem solving on micro chip |
Hung-Jen Yang, Hsieh-Hua Yang, Cheng Chung Wang, Kuo-Yan Huang |
|
Design a framework of on-line problem-based learning |
Hung-Jen Ynag, Jui-Chen Yu, Hsieh-Hua Yang |
|
Information reconstructing for editing statistical yearbook of teacher education |
Hung-Jen Yang, Chen-Chern Lin, Lung-Hsing Kuo, H.M. Wei |
|
Fuzzy data envelopment analysis for fuzzy overall effectiveness |
Pei-Huang Lin |
|
Reconstruction of turbulence phenomena applied 3d animation technology |
Rong-Jyue Fang, Shih-Fann Chao, Chi-Tsung Chen |
|
Building/visualizing an individualized English vocabulary ontology |
Kyeungshun Kim, Seong Baeg Kim, Cheol Min Kim |
|
Learning from the real-world web-appointment system of the hospitals in Taiwan |
Yuan-Jung Chen, Hsieh-Hua Yang |
|
A study on the application of computer assisted instruction in teaching English writing |
Shi-Jer Lou, Hsaio-Li Wu, Jui-Jung Chen, Kao-Hung Tseng, Pei-Huang Lin |
|
A study of the platform function for primary school science and life technology teachers who practice knowledge management |
Kuo-hung Tseng, Hua-Lin Tsai, Chi-Jen Lee, Tien-Sheng Tsai |
SPECIAL SESSION: Computer Application in Formal Education III
Chair: Kuo-hung Tseng
Traffic Characteristics By Video Learning Content in the Secondary School Network |
Min Sung Seo, Seong Baeg Kim, Cheol Min Kim |
|
Developing A Template-based Edutainment System |
Cheol Min Kim, Hye Sun Kim, Seong Baeg Kim |
|
Exploring the voice of university students for e-learning |
Hsieh-Hua Yang, Hung-Jen Yang |
|
The construction of mystery-seeking motive theory in internet behavior |
Chin-Mou Cheng, Rong-Jyue Fang, Rong-Lain Ho |
|
Constructing a Fuzzy Decision Tree by Integrating Fuzzy Sets and Entropy | Tien-Chin Wang, Hsien-Da Lee | 531-185 |
Agent-Enabling Transformation of E-Commerce Portals with Web Services |
David B. Ulmer, Lixin Tao |
|
The courses design and training strategy of teachers training with the integration of information technology into instruction |
Wen-ling, Shih,Yio-Eih, Shih |
SESSION: Clustering Methods and Optimization
Chair: Seong Baeg Kim, Hsieh-Hua Yang
Improving organizational efficiency by combining Tier analysis and neural clustering method |
Sungho Ha |
|
A parallel network clustering of electric loads based PSO |
Hongwen Yan, Rui Ma |
|
Multiobjective electricity power dispatch using multiobjective particle swarm Optimization |
Hongwen Yan, Rui Ma |
|
Integration new apriori algorithm MDNC and six sigma to improve array yield in the TFT-LCD industry |
Chiung-Fen Huang, Ruey-Shun Chen |
|
Cointegration and Co-feature Analysis on Electricity Consumption and Economic Growth in China |
Yuan Jiahai, Wang Jing, Hu Zhaoguang |
SESSION: Sort algorithms and Modelling
Chair: Houjun Yang, Sungho Ha
A key-address mapping sort algorithm |
Chenn-Jung Huang, Chih-Tai Guan, Yi-Ta Chuang |
|
An approach to manage and search for software components |
Chen Hao, Ming Zhong, Ying Shi |
|
Optimal layout for branched networks using harmony search |
Zong Woo Geem, Yongjin Park |
|
A fault-tolerant parallel text searching on a cluster of workstations |
Odysseas Efremides George Ivanov |
|
A new external sorting algorithm with selecting the record list location |
Iraj Hassanzadeh, M. H. S. Afsari, S. Hassanzadeh |
|
Metamodeling UML in rewriting logic |
Jianfei Yin, Zhong Ming |
SESSION: Security Systems, Coding and Information Theory I
Chair: Moh'd Belal Al-Zoubi, Afef Mghawish
A smart card based authentication protocol for strong passwords |
Chin-Chen Chang, Hao-Chuan Tsai |
|
A file protection system based on a trapdoor one-way hash function |
Chin-Chen Chang, Chu-Hsing Lin, Jung-San Lee |
|
A scalable multicast security protocol in hierarchy structures |
Chin-chen Chang, Jung-san Lee, Ya-fen Chang, Yi-pei Hsieh |
|
Weakness of shim's New ID-based tripartite multiple-key agreement protocol |
Chu-Hsing Lin,Jue-sam Chou,Chia-hung Chiu |
|
A conceptual framework for Information Security and Privacy |
Geoff Skinner, Song Han, Elizabeth Chang |
|
Constructing Secure Mobile-Agent-Based Consumer Electronic Applications |
Woei-Jiunn Tsaur, Gin-We Liu |
|
Biometric authentication using digital retinal images |
Marcos Ortega, Castor Mariño, Manuel Gonzalez Penedo, Marianne Blanco, Francisco Gonzalez |
|
Evolutionary flexible neural networks for intrusion detection system |
Yuehui Chen, Lei Zhang, Ajith Abraham |
|
A logic program solution for conflict authorizations |
Yun Bai |
SESSION: Network and Clustering
Chair: Chin-Chen Chang, Chu-Hsing Lin
Distribution strategies for parallel VPN servers |
Myeonggil Choi, Hyoun Cheul Kim, Yongsun Choi, Sangmun Shin |
|
Enhanced point coordinator function in IEEE 802.11 MAC protocol for infrastructure basic service set |
Minghua Ye, Chiew Tong Lau, Benjamin Premkumar |
|
Clustering mechanism for content-based system in DHT-based overlay networks |
Emiliano Casalicchio, Federico Morabito, Fabrizio Davide, Giovanni Cortese |
|
Stochastic network simulation for reliable results |
Tapio Frantti |
|
A practical and light-weight data capture tool for Xen virtual machine |
Nguyen anh Quynh, Yoshiyasu Takefuji |
SESSION: Data Bases, Data Mining and XML
Chair: Tapio Frantti , Myeonggil Choi
An XML index using prime number coordinate for efficient query processing |
Xiaofan Hong, Jeonghoon Han, Tackgon Kim, Wooseang Kim |
|
XML based Framework for ETL Processes For Relational Databases |
Tassawar Iqbal, Nadeem Daudpota |
|
A transaction mechanism for native XML database |
Tan Hui, Gu Jingguan, Chen Xinmeng |
|
Recovering data semantics from XML documents into DTD graph with SAX |
Herbert Shiu, Joseph Fong, Robert P. Biuk-Aghai |
|
Development of a data mining methodology using robust design |
Sangmun Shin, Myeonggil Choi, Youngsun Choi, Guo Yi |
|
Satellite-derived land-cover classification using immune based mining approach |
Ta-Cheng Chen, Chao-Yuan Chen |
SESSION: Decision Support System and Grid Network I
Chair: Sangmun Shin
A spacial decision support system for revegetation of dump of opencast coal mine |
Daoliang Li, Yingyi Chen, Xiangyun Guo |
|
The application of support vector machines in the potentiality evaluation for revegetation of dump of coal mine |
Daoliang Li, Chuanli Zhuang, Zetian Fu |
|
Decision support system based on grid workflow |
Mingsheng Hu, Zhijuan Jia, Xueguang Chen |
|
Grid workflow for decision resource scheduling |
Mingsheng Hu, Jianjun Zhang, Xueguang Chen |
|
Automatic system for medical implants based on the grid networks |
Sorin Borza, Carmen Simion, Dan Brindasu, Nicolae Cofaru |
|
A genetic algorithm-based decision support system for allocating international apparel demand |
Shiue-Shiun Li, Rong-Chang Chen, Chih-Chiang Lin |
SESSION: Software Tools and Modelling I
Chair: Alessandra Flammini
A static model for reverse engineering of software threads and their interactions |
G. Hemanthakumar, B. S. Anami, M. M. Kodabagi |
|
A univariately approximate data partitioning algorithm for a dominantly multiplicative multivariate function |
Metin Demiralp |
|
Kernel-based algorithm for clustering spatial data |
A. Majid Awan, Mohd. Noor Md. Sap, M. Omar Mansur |
|
An approach for Implementation of RBAC models with context constraint to business process systems |
Yi Guo, Myeonggil Choi, Sangmun Shin, Guibam Bae, Yongsun Choi |
|
Augmentation of a term/document matrix with part-of-speech tags to improve accuracy of latent semantic analysis |
Tom Rishel, A. Louise Perkins, Sumanth Yenduri, S.S. Iyengar, Farnaz Zand |
|
Pricing the resource in computational market based on Bayes-game model |
Junguo Yu, Huaping Chen, Bing Liu |
|
CFD simulations of swirling effects on the performance of the supersonic nozzle for micro-particle delivery |
Y. Liu, G. Costigan |
|
Machine vision tool for real-time defect detection and classification on circular knitting machines by using statistical parameters and radon transform |
Rocco Furferi, Lapo Governi |
|
State-efficient time-optimum synchronization protocols for two-dimensional arrays -a survey |
Hiroshi Umeo |
SESSION: Software Tools and Modelling II
Chair: Zeljko Panian
Mass customization in cutting stock process |
Peter Trkman, Miro Gradisar |
|
Using optimization costs modeling to maintain performance constraints for the failure mode identification |
Yi Sun, Jianshong Tan, Yalang Mao |
|
A study on the construction of knowledge sharing (KS) platform and its effectiveness for vocational senior high school electrical teachers |
Kou-Hung Tseng, See-Chien Hou, Feng-Kuang Chiang, Wen-Hua Hsu |
|
Representing and using character feature rules in automatic story generation |
Haitao Wang, Cungen Cao, Yu Pan |
|
Control and governance of multi-dimensional IT projects |
Zeljko Panian |
|
Uncertainty-driven synchronization of a hyper-chaotic system |
Vminghai Yao, Qinlong Gu, Hua Zhu |
SESSION: Applied Computer Science and Applications I
Chair: Poorna Balakrishnan
A method of drawing cloth patterns with fabric behavior |
Shih-Wen Hsiao, Rong-Qi Chen |
|
An ESB implementation for airport environment |
Pierfrancesco Foglia, Cosimo Antonio Prete, Rita Sodini, Marco Solinas |
|
The characteristics of medical centers’ websites in Taiwan |
Wen-Hua Tu, Hsieh-Hua Yang |
|
The web sites of medical centers in Taiwan |
Ying-Ju Chen, Wender Lin |
|
The cubic spline interpolation in bone biopsy |
Nualsawat Hiransakolwong, Pakkinee Chitsakul |
|
Large Customer Price Response Simulation Under Time-of-Use Electricity Pricing Policy Based on Multi-Agent System |
Yu Shunkun, Yuan Jiahai, Zhao Changhong |
|
A new mechanism for improving robustness of TCP against pulsing denial-of-service attacks |
Hiroshi Tsunoda, Kenjirou Arai, Nei Kato, Yoshiaki Nemoto |
SESSION: Applied Computer Science and Applications II
Chair: Yukio Ohsawa
Rocking of rigid bodies with unilateral constraints |
A. Baratta, I. Corbi, O. Corbi, C. Cennamo, C. Di Lorenzo, R. Orefice, G. Voiello |
|
Experimental investigation on sloshing water dampers attached to rigid blocks |
O. Corbi |
|
Enhancing professional skills, meta-social competencies and social capital through online collaborative learning |
Donata Francescato, Minou Mebane, Andrea Solimeno, Roberta Sorace, Manuela Tomai |
|
The E-Learning for Education & Training and Research & Development based on Art, Science, Engineering & Technology in Indonesia |
Rohani Jahja Widodo |
Tuesday, April 18, 2006
SESSION: Web Application and mobile Computing
Chair: Young-doo Kwon, B. Poorna
Developing web applications in a mobile computing environment |
Jason Rapp, Jiang B. Liu |
|
A scalability model for managing distributed-organized internet services |
Tsun-Yu Hsiao, Ko-Hsu Su, Shyan-Ming Yuan |
|
A web service based statistical service |
Yue-Shan Chang, Tong-Ying Juang |
|
Characterizing the downlink transmission power for WCDMA networks in multiservice environments |
Chie Dou, Liang-Luen Huang |
|
Request scheduling on WDM networks with tunable ADMs |
Yinlong Xu, Wei Zhou |
|
Mobile agent based event discovery in wireless sensor networks |
G. D. Soragavi, S. S. Manvi, M. S. Kakkasageri |
|
Modeling a fault tolerant multiagent system for the control of a mobile robot using MaSE methodology |
Maria Guadalupe Alexandres Garcia, Rafael Ors Carot, Lucero Janneth Castro Valencia |
|
Analysis of delay distribution of data call in CDMA systems supporting voice and delay-tolerant data calls |
Insoo Koo, Jeongrok Yang, Kiseon Kim |
|
Bypassing proxy: a solution to overloaded web caching systems |
K. Y. Wong, K. H. Yeung |
|
NTP VoIP platform: A SIP VoIP platform and its services |
Whai-En Chen, Chai-Hien Gan, Yi-Bing Lin |
SESSION: Artificial Intelligent and Applications I
Chair: Jiang B. Liu, K. Y. Wong
Optimization of parameters in the successive zooming genetic algorithm using regressed improvement factors. |
Young-Doo Kwon, Hyun-Wook Kwon, Seung-wan Cho, Sung-Hwang Kang |
|
Taboo niche optimization based on intelligent engineering and its Application in Water Ecology |
Wang Jing, Yuan Jiahai, Hu Zhaoguang |
|
Intelligent healthcare data analysis using statistic data miner |
Jiangbo Liu, Yufen Huang |
|
Multiobjective fuzzy optimal power dispatch incorporated TCSC and load model |
Rui Ma, Hongwen Yan |
|
Genetic algorithm for fingerprint matching |
B. Poorna |
SESSION: Image Processing and Recognition Techniques
Chair: Vincent C S Lee, Nam H. Tran
Online vehicles license plate detection and recognition system using image processing techniques |
Asad Safi, Muhammad Azam, Shahbaz Kiani, Nadeem Daudpota |
|
Products designed on scenario maps using pictorial keygraph |
Kenich Horie, Yukio Ohsawa, Naoaki Okazaki |
|
A software-based real-time video broadcasting system |
Ming-Chun Cheng, Shyan-Ming Yuan |
|
An adaptive hybrid video-on-demand system |
Chenn-Jung Huang, Yi-Ta Chuang, Wei Kuang Lai, Hsin Hung Sung |
SESSION: Artificial Intelligent and Applications II
Chair: Young-doo Kwon, Jiang Liu
An Artificial Immune System Based Learning Algorithm for Abnormal or Fraudulence Detection in Data Stream |
Vincent C S Lee , Xingjian Yang |
|
Hybrid modelling using neuro fractal for fractured reservoirs |
Nam H. Tran, Karen Valencia, Kien Tran, Sheik S. Rahman |
|
Developing intelligent software for diagnosing computer-related health issues |
Hsin-Chieh Wu, Toly Chen |
|
Business value of business intelligence systems lies in improved business processes |
Ales Popovic, Tomaz Turk, Jurij Jaklic |
|
Study on intelligent contract information configuration and analysis by case-based reasoning |
Yi Sun, Jianrong Tan, Yalang Mao, Ming Lou |
|
Element level parametric identification using axial macro-strain time series |
Bin Xu |
SESSION: Image Processing – Correcting and Detecting Images and Texts
Chair: Bin Xu
Image compression preprocessor Design with task partitioning using coarse grained approach |
Muhammad Kamran, Shi Feng |
|
Texture analysis for textile fault detection |
Amelia Sparavigna, Bartolomeo Montrucchio |
|
An Effective Iris Localization Method Through Enhancement of Boundary Detail |
Jiang Sai, Xiao Gang, Gao Fei, LV Hui-Qiang, Zhang Yuan-Ming |
|
A unified framework for correcting panoramic image distortions |
Frank Ekpar, Hiroyuki Hase, Masaaki Yoneda |
SESSION: Applied Computer Science and Applications
Chair: Yi Sun, Bartolomeo Montrucchio
Progressive surface modeling based on 3d motion sketch |
Shengfeng Qin, David K Wright |
|
A proposed framework for agile reverse engineering |
S. A. Niknam, Q.P. Yang, S. F. Qin |
|
Amplification chain used on UHF transmitter |
L. H. Abderrahmane, M. Benyettou, M. Sweeting, J. R. Cooksley, P. Garner |
|
Application of an automatic fuzzy logic based pattern recognition method for DNA Microarray Reader |
Wei Wei, Xiaodong Wang, Werner Neddermeyer, Wolfgang Winkler, Michael Schnell |
SESSION: Sort Algorithms, Metrics and Modelling
Chair: Hsiaokuang Wu, Chu-Hsing Lin
A New Method of Building Ontology Using Inheritance |
Zhong Ming, Shubin Cai, Shixian Li. Xinhong Zeng |
|
Multi-objective Optimal Block Transaction model based Transient Stability Evaluation |
Rui Ma, Hongwen Yan |
|
Visualization of Binary Component-based Software Structure with Component Functional Size |
Hironori Washizaki, Satoru Takano, Yoshiaki Fukazawa |
|
Supporting Software Design based on Comments in Codes |
Tetsuya Yoshida |
|
A Novel Probabilistic Trust Evaluation Algorithm |
Muhammad Hanif Durad, Yuanda Cao |
|
A Novel Metric of Software Quality Structural Availability |
Shubin Cai, Shixian Li, Zhong Ming, Sishan Gu, Xinhong Zeng |
SESSION: 3D Space, Matrix Transformation Method and Sequences
Chair: Jianwei Zhang
A simple differential theory for digital curves |
Sheng-Gwo Chen, Mei-Hsiu Chi, Jyh-Yang Wu |
|
Derivatives estimation for 2D digital data points |
Sheng-Gwo Chen, Mei-Hsiu Chi, Jyh-Yang Wu |
|
Multi-spectral image analysis and NURBS-based 3D visualization of land maps |
Dilshan Jayathilaka, Ravinda G. N. Meegama |
|
Revision of Moran scatterplot approach for more effective forest fire detections |
Younggi Byun,Yong Huh, Kiyun Yu,Yongil Kim |
|
Convolutional date transmission system using real-valued self-orthogonal finite-length sequences |
Jiong Le, Yoshihiro Tanada |
|
Extracting hyponymic relations from Chinese free corpus |
Lei Liu, Cungen Cao, Haitao Wang |
SESSION: Security Systems, Coding and Information Theory II
Chair: Kiyun Yu
Multi-Seed Key Distribution Scheme With Test System |
Xie Yumin, Shi Feng, Muhammda Kamran |
|
A Study on the Network Isolation Security Requirements for e-Taiwan |
Kwo-Jean Farn, Shu-Kuo Lin, Chi-Chun Lo |
|
An Introduction to Taxonomy of Information Privacy in Collaborative Environments |
Geoff Skinner, Song Han, Elizabeth Chang |
|
A Fusion of ICA and SVM for Detection Computer Attacks |
Surat Srinoy, Witcha Chimphlee, Siriporn Chimphlee, Yoothapoom Poopaibool |
|
Simulator for Testing Cellular Automata Cryptographic Algorithms |
Eduard Franti, Monica Dascalu |
|
An Identity-Based Scheme for Ad Hoc Network Secure Routing Protocol from Pairing |
Chu-Hsing Lin, Jue-Sam Chou, Chia-Hung Chiu |
|
Quantum authentication protocol using entangled states |
Xiaoyu Li, Dexi Zhang |
|
Automatic Identification of Chinese Stop Word List |
Feng Zou, Fu Lee Wang, Xiaotie Deng, Song Han, Lusheng Wang |
SESSION: Hardware Applications
Chair: Kwo-Jean Farn
Design of high-speed data buffer based on FPGA for gigabit-rate exchange devices |
Wang Jie,Ji Zhen-zhou,Hu Ming-zeng |
|
A novel method to determine scanner parameters (PSF) |
Longjiang Yu, Shenghe Sun |
|
Magnetorquer Control for Orbital Manoeuvre of Low Earth Orbit Microsatellite | Abdelmadjid Boudjemai, Samira Chouraqui, Mohamed Benyettou | 514-115 |
Performance evaluation of redundant array of inexpensive disks |
Houjun Yang, Mansoor Alam, Bin Liu, Min Song |
|
Execution characteristics of C++ and C programs on embedded processor ARM7TDMI |
Weixing Ji, Feng Shi, Baojun Qiao |
SESSION: Security Systems, Coding and Information Theory III
Chair: Donata Francescato, Alberto Escobar
Efficient pairwise key establishment scheme for distributed sensor networks |
Wang Lei |
|
A pluggable security framework on message oriented middleware |
Ruey-shyang Wu, Shyan-ming Yuan |
|
A service-centric approach to a parameterized RBAC service |
Jonathan Keirre Adams |
531-554 |
Enhancing trust in mobile enterprise networking |
Zheng Yan, Peng Zhang |
|
Efficient and scalable hierarchical key assignment scheme |
Chin-Chen Chang, Chia-Lin Kao, Chia-Chen Lin |
SESSION: Mobile Computing and Ad Hoc Networks
Chair: Yinlong Xu, Kuo-Hung Tseng
Deployment method for wireless sensor networks on weighted fields |
Wei-chei Ko, Ying-chin Chao, Ming-jer Tsai |
|
Efficient OVSF code assignment strategy in UMTS with multiple codes |
Min-Xiou Chen |
|
A new mobile Peer-to-Peer architecture |
Jiujun Cheng, Yuhong Li, Jiao Li, Jian Ma |
|
Scheduling forwarding nodes for two-hop neighborhoods broadcast in wireless ad hoc networks |
Chenguang Xu, Minhong Lin, Yinlong Xu |
|
A Stable QoS-Aware MAC and routing protocol for differentiated service in mobile ad hoc networks |
Chenn-Jung Huang, Yi-Ta Chuang, Pei-Chi Yang, Wei Kuang Lai, Sheng-Yu Hsiao |