View
228
Download
1
Category
Preview:
Citation preview
Lecture Notes in Artificial Intelligence 6421Edited by R. Goebel, J. Siekmann, and W. Wahlster
Subseries of Lecture Notes in Computer Science
Jeng-Shyang Pan Shyi-Ming ChenNgoc Thanh Nguyen (Eds.)
ComputationalCollective Intelligence
Technologies and Applications
Second International Conference, ICCCI 2010Kaohsiung, Taiwan, November 10-12, 2010Proceedings, Part I
13
Series Editors
Randy Goebel, University of Alberta, Edmonton, CanadaJörg Siekmann, University of Saarland, Saarbrücken, GermanyWolfgang Wahlster, DFKI and University of Saarland, Saarbrücken, Germany
Volume Editors
Jeng-Shyang PanNational Kaohsiung University of Applied SciencesDepartment of Electronic Engineering415 Chien-Kung Road, Kaohsiung 807, TaiwanE-mail: jspan@cc.kuas.edu.tw
Shyi-Ming ChenNational Taiwan University of Science and TechnologyDepartment of Computer Science and Information Engineering #43, Sec.4Keelung Rd., Taipei, 106,TaiwanE-mail: smchen@mail.ntust.edu.tw
Ngoc Thanh NguyenWroclaw University of Technology, Institute of InformaticsStr. Wyb. Wyspianskiego 27, 50-370 Wroclaw, PolandE-mail: ngoc-thanh.nguyen@pwr.wroc.pl
Library of Congress Control Number: 2010937276
CR Subject Classification (1998): I.2, I.2.11, H.3-4, C.2, D, H.5
LNCS Sublibrary: SL 7 – Artificial Intelligence
ISSN 0302-9743ISBN-10 3-642-16692-X Springer Berlin Heidelberg New YorkISBN-13 978-3-642-16692-1 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.
springer.com
© Springer-Verlag Berlin Heidelberg 2010Printed in Germany
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper 06/3180
Preface
This volume composes the proceedings of the Second International Conference on Computational Collective Intelligence––Technologies and Applications (ICCCI 2010), which was hosted by National Kaohsiung University of Applied Sciences and Wroclaw University of Technology, and was held in Kaohsiung City on November 10-12, 2010. ICCCI 2010 was technically co-sponsored by Shenzhen Graduate School of Harbin Institute of Technology, the Tainan Chapter of the IEEE Signal Processing Society, the Taiwan Association for Web Intelligence Consortium and the Taiwanese Association for Consumer Electronics. It aimed to bring together researchers, engineers and poli-cymakers to discuss the related techniques, to exchange research ideas, and to make friends. ICCCI 2010 focused on the following themes:
• Agent Theory and Application • Cognitive Modeling of Agent Systems • Computational Collective Intelligence • Computer Vision • Computational Intelligence • Hybrid Systems • Intelligent Image Processing • Information Hiding • Machine Learning • Social Networks • Web Intelligence and Interaction
Around 500 papers were submitted to ICCCI 2010 and each paper was reviewed by at least two referees. The referees were from universities and industrial organizations. 155 papers were accepted for the final technical program. Four plenary talks were kindly offered by: Gary G. Yen (Oklahoma State University, USA), on “Population Control in Evolutionary Multi-objective Optimization Algorithm,” Chin-Chen Chang (Feng Chia University, Taiwan), on “Applying De-clustering Concept to Information Hiding,” Qinyu Zhang (Harbin Institute of Technology, China), on “Cognitive Radio Networks and Its Applications,” and Lakhmi C. Jain (University of South Australia, Australia), on “Intelligent System Design in Security.”
We would like to thank the authors for their tremendous contributions. We would also express our sincere appreciation to the reviewers, Program Committee members and the Local Committee members for making this conference successful. Finally,
VI Preface
we would like to express special thanks for the financial support from the National Kaohsiung University of Applied Sciences, Kaohsiung City Government, National Science Council and Education Ministry, Taiwan, in making ICCCI 2010 possible.
Novermber 2010 Ngoc Thanh NguyenJeng-Shyang PanShyi-Ming Chen
Ryszard Kowalczyk
ICCCI 2010 Conference Organization
Honorary Chair
Chun-Hsiung Fang National Kaohsiung University of Applied Sciences, Taiwan
Jui-Chang Kung Cheng Shiu University, Taiwan
General Chair
Ngoc Thanh Nguyen Wroclaw University of Technology, Poland
Program Committee Chair
Jeng-Shyang Pan National Kaohsiung University of Applied Sciences, Taiwan
Shyi-Ming Chen National Taiwan University of Science and Technology, Taiwan
Ryszard Kowalczyk Swinburne University of Technology, Australia
Special Session Chairs
Bao-Rong Chang National University of Kaohsiung, Taiwan Chang-Shing Lee National University of Tainan, Taiwan Radoslaw Katarzyniak Wroclaw University of Technology, Poland
International Advisory Chair
Bin-Yih Liao National Kaohsiung University of Applied Sciences, Taiwan
International Publication Chair
Chin-Shin Shieh National Kaohsiung University of Applied Sciences, Taiwan
Bing-Hong Liu National Kaohsiung University of Applied Sciences, Taiwan
VIII Conference Organization
Local Organizing Committee Chair
Mong-Fong Horng National Kaohsiung University of Applied Sciences, Taiwan
ICCCI 2010 Steering Committee
Chair
Ngoc Thanh Nguyen Wroclaw University of Technology, Poland
Co-chair
Ryszard Kowalczyk Swinburne University of Technology, Australia Shyi-Ming Chen National Taiwan University of Science and
Technology, Taiwan Adam Grzech Wroclaw University of Technology, Poland Lakhmi C. Jain University of South Australia, Australia Geun-Sik Jo Inha University, South Korea Janusz Kacprzyk Polish Academy of Sciences, Poland Ryszard Tadeusiewicz AGH-UST, Poland Toyoaki Nishida Kyoto University, Japan
ICCCI 2010 Technical Program Committee
Jeng Albert B. Gomez-Skarmeta Antonio F. Shih An-Zen Andres Cesar Hsieh Cheng-Hsiung Lee Chin-Feng Badica Costin Godoy Daniela Barbucha Dariusz Greenwood Dominic CAPKOVIC Frantisek Yang Fuw-Yi Huang Hsiang-Cheh Chang Hsuan-Ting Lee Huey-Ming Deng Hui-Fang Czarnowski Ireneusz Lu James J. Kacprzyk Janusz
Jinwen University of Science and Technology, Taiwan Murcia University, Spain Jinwen University of Science and Technology, Taiwan Universidad Complutense de Madrid, Spain Chaoyang University of Technology, Taiwan Chaoyang University of Technology, Taiwan University of Craiova, Romania Unicen University, Argentina Gdynia Maritime University, Poland Whitestein Technologies, Switzerland Slovak Academy of Sciences, Slovakia Chaoyang University of Technology, Taiwan National University of Kaohsiung, Taiwan National Yunlin University of Science and Technology,
Taiwan Chinese Culture University, Taiwan South China University of Technology, China Gdynia Maritime University, Poland Emory University, USA Polish Academy of Sciences, Poland
Conference Organization IX
Marecki Janusz Sobecki Janusz Jung Jason J. Nebel Jean-Christophe Dang Jiangbo Huang Jingshan Chang Jui-fang Nunez Manuel Gaspari Mauro Khurram Khan Muhammad Sheng Quan Z. Katarzyniak Radoslaw Unland Rainer Ching Chen Rung Shen Rung-Lin Yang Sheng-Yuan Yen Shu-Chin Chen Shyi-Ming Zadrozny Slawomir Hammoudi Slimane Hong Tzung-Pei Hsu Wen-Lian Pedrycz Witold Baghdadi Youcef Lo Yu-lung Cheng Yuh Ming Huang Yung-Fa Ye Yunming
IBM T.J. Watson Research, USA Wroclaw University of Technology, Poland Yeungnam University, South Korea Kingston University, USA Siemens Corporate Research, USA University of South Alabama, USA National Kaohsiung University of Applied Sciences,
Taiwan Universidad Complutense de Madrid, Spain University of Bologna, Italy King Saud University, Saudi Arabia University of Adelaide, Australia Wroclaw University of Technology, Poland University of Duisburg-Essen, Germany Chaoyang University of Technology, Taiwan National Taipei University, Taiwan St. John's University, Taiwan Wenzao Ursuline College of Languages, Taiwan National Taiwan University of Science and
Technology, Taiwan Polish Academy of Sciences, Poland ESEO, France National University of Kaohsiung, Taiwan Academia Sinica, Taiwan University of Alberta, Canada Sultan Qaboos University, Oman Chaoyang University of Technology, Taiwan Shu-Te University, Taiwan Chaoyang University of Technology, Taiwan Harbin Institute of Technology, China
Keynote Speakers
Gary G. Yen Oklahoma State University, USA Lakhmi C. Jain University of South Australia, Australia Chin-Chen Chang Feng Chia University, Taiwan Qinyu Zhang Harbin Institute of Technology Shenzhen Graduate
School, China
Program Committee of Special Sessions
Dariusz Barbucha Gdynia Maritime University, Poland Bao-Rong Chang National University of Kaohsiung, Taiwan Hsuan-Ting Chang National Yunlin University of Science and
Technology, Taiwan
X Conference Organization
Chuan-Yu Chang National Yunlin University of Science and Technology, Taiwan
Rung-Ching Chen Chaoyang University of Technology, Taiwan Shyi-Ming Chen National Taiwan University of Science and
Technology, Taiwan Kazimierz Choroś Wrocław University of Technology, Poland Mohamed Hassoun ENSSIB Villeurbanne, France Mong-Fong Horng National Kaohsiung University of Applied Sciences,
Taiwan Chien-Chang Hsu Fu-Jen Catholic University, Taiwan Wu-Chih Hu National Penghu University of Science and
Technology, Taiwan Chien-Feng Huang National University of Kaohsiung, Taiwan Tien-Tsai Huang Lunghwa University of Science and Technology,
Taiwan Huey-Ming Lee Chinese Culture University, Taiwan Che-Hung Lin Cheng Shiu University, Taiwan Lily Lin China University of Technology, Taiwan Piotr Jędrzejowicz Gdynia Maritime University, Poland Jeng-Shyang Pan National Kaohsiung University of Applied Sciences,
Taiwan Chia-Nan Wang National Kaohsiung University of Applied Sciences,
Taiwan
Table of Contents – Part I
Collective Intelligence in Web Systems – WebSystems Analysis
Neuro-Fuzzy Models in Global HTTP Request Distribution . . . . . . . . . . . 1Krzysztof Zatwarnicki
Real Anomaly Detection in Telecommunication Multidimensional DataUsing Data Mining Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Kazimierz Choros
Time Series Forecasting of Web Performance Data Monitored byMWING Multiagent Distributed System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Leszek Borzemski and Maciej Drwal
Comparison and Analysis of the Eye Pointing Methods andApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Piotr Chyna�l and Janusz Sobecki
Abstraction Relations between Internal and Behavioural Agent Modelsfor Collective Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Alexei Sharpanskykh and Jan Treur
Quick Response System Using Collaborative Filtering on FashionE-Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Kyung-Yong Chung, Chang-Woo Song, Kee-Wook Rim, andJung-Hyun Lee
Intelligent Computing for Data Security
An Ownership Verification Scheme by Using Image Pinned Field andGenetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Mn-Ta Lee, Hsuan-Ting Chang, and Mu-Liang Wang
Multiple-Image Multiplexing Encryption Based on ModifiedGerchberg-Saxton Algorithm and Phase Modulation in FractionalFourier Transform Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Hsuan-Ting Chang and Hone-Ene Hwang
Optical Image Encryption Based on Joint Fresnel TransformCorrelator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Hsuan-Ting Chang and Zong-Yu Wu
Communication and Trust in the Bounded Confidence Model . . . . . . . . . . 90M.J. Krawczyk, K. Malarz, R. Korff, and K. Ku�lakowski
XII Table of Contents – Part I
Detection of Image Region-Duplication with Rotation and ScalingTolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Qiumin Wu, Shuozhong Wang, and Xinpeng Zhang
Smart Clustering Techniques
An Extensible Particles Swarm Optimization for Energy-EffectiveCluster Management of Underwater Sensor Networks . . . . . . . . . . . . . . . . . 109
Mong-Fong Horng, Yi-Ting Chen, Shu-Chuan Chu,Jeng-Shyang Pan, and Bin-Yih Liao
The 3D Display and Analysis of the Pattern of Photolithography . . . . . . . 117Lih-Shyang Chen, Young-Jinn Lay, Lian-Yong Lin, Jing-Jou Tang,Wen-Lin Cheng, and Yu-Jen Lin
Geometrically Invariant Image Watermarking Using Scale-InvariantFeature Transform and K-Means Clustering . . . . . . . . . . . . . . . . . . . . . . . . . 128
Huawei Tian, Yao Zhao, Rongrong Ni, and Jeng-Shyang Pan
DenVOICE: A New Density-Partitioning Clustering Technique Basedon Congregation of Dense Voronoi Cells for Non-spherical Patterns . . . . . 136
Jui-Fang Chang
Semantic Search Results Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145Krzysztof Strzalka and Aleksander Zgrzywa
Trend Detection on Thin-Film Solar Cell Technology Using ClusterAnalysis and Modified Data Crystallization . . . . . . . . . . . . . . . . . . . . . . . . . 152
Tzu-Fu Chiu, Chao-Fu Hong, and Yu-Ting Chiu
Quality of Semantic Compression in Classification . . . . . . . . . . . . . . . . . . . . 162Dariusz Ceglarek, Konstanty Haniewicz, and Wojciech Rutkowski
Web Service
Realizes Three-Tier Structure Mail System Based on the Web . . . . . . . . . 172Jun-Hua He and Jing-Yuan Lv
Secure Collaborative Cloud Design for Global USN Services . . . . . . . . . . . 178Tien-Dung Nguyen, Md. Motaharul Islam, Aymen Al-Saffar,Jun-Young Park, and Eui-Nam Huh
Mining on Terms Extraction from Web News . . . . . . . . . . . . . . . . . . . . . . . . 188Li-Fu Hsu
Inter-cloud Data Integration System Considering Privacy and Cost . . . . . 195Yuan Tian, Biao Song, Junyoung Park, and Eui-Nam Huh
Table of Contents – Part I XIII
A Semantic Web Approach to Heterogeneous Metadata Integration . . . . . 205Shu-Hsien Liao, Hong-Chu Huang, and Ya-Ning Chen
Quantitative Management of Technology (I)
Fuzzy Multi-objective Programming Application for Time-CostTrade-off of CPM in Project Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Gino K. Yang
A Study on Two-Stage Budget Planning by Fuzzy QuantifyingAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Gino K. Yang and Wayne Chouhuang
Hybrid Support Vector Regression and GA/TS for Radio-WavePath-Loss Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Kuo-Chen Hung, Kuo-Ping Lin, Gino K. Yang, and Y.-C. Tsai
Inventory Model with Fractional Brownian Motion Demand . . . . . . . . . . . 252Jennifer Shu-Jen Lin
Note on Inventory Model with a Stochastic Demand . . . . . . . . . . . . . . . . . . 260Yu-Wen Wou
A GA-Based Support Vector Machine Diagnosis Model for BusinessCrisis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Ming-Fen Yang and Huey-Der Hsiao
Agent System
A Book-Agent System for Library Marketing . . . . . . . . . . . . . . . . . . . . . . . . 274Toshiro Minami
Adaptive Modelling of Social Decision Making by Agents IntegratingSimulated Behaviour and Perception Chains . . . . . . . . . . . . . . . . . . . . . . . . . 284
Alexei Sharpanskykh and Jan Treur
Modeling Agent-Based Collaborative Process . . . . . . . . . . . . . . . . . . . . . . . . 296Moamin Ahmed, Mohd Sharifuddin Ahmad, andMohd Zaliman M. Yusoff
A Three-Dimensional Abstraction Framework to Compare Multi-agentSystem Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Tibor Bosse, Mark Hoogendoorn, Michel C.A. Klein, and Jan Treur
Improving Performance of Protein Structure Similarity Searching byDistributing Computations in Hierarchical Multi-Agent System . . . . . . . . 320
Alina Momot, Bozena Ma�lysiak-Mrozek, Stanis�law Kozielski,Dariusz Mrozek, �Lukasz Hera, Sylwia Gorczynska-Kosiorz, andMicha�l Momot
XIV Table of Contents – Part I
Modeling Super Mirroring Functionality in Action Execution,Imagination, Mirroring, and Imitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Monique Hendriks and Jan Treur
CCI-Based Optimization Models
Cellular GEP-Induced Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343Joanna Jedrzejowicz and Piotr Jedrzejowicz
Cluster Integration for the Cluster-Based Instance Selection . . . . . . . . . . . 353Ireneusz Czarnowski and Piotr Jedrzejowicz
Comparative Study of the Differential Evolution and ApproximationAlgorithms for Computing Optimal Mixed Strategies in Zero-SumGames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Urszula Boryczka and Przemyslaw Juszczuk
Ant Colony Decision Trees – A New Method for Constructing DecisionTrees Based on Ant Colony Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Urszula Boryczka and Jan Kozak
A Cross-Entropy Based Population Learning Algorithm for Multi-modeResource-Constrained Project Scheduling Problem with Minimum andMaximum Time Lags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Piotr J ↪edrzejowicz and Aleksander Skakovski
Evaluation of Agents Performance within the A-Team SolvingRCPSP/Max Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Piotr Jedrzejowicz and Ewa Ratajczak-Ropel
Synchronous vs. Asynchronous Cooperative Approach to Solving theVehicle Routing Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Dariusz Barbucha
Quantitative Management of Technology (II)
Development of an Engineering Knowledge Extraction Framework . . . . . . 413Chengter Ho
Exploring EFL Taiwanese University Students’ Perceptions of aCollaborative CALL Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
Yen-Hui Wang and Chia-Nan Wang
Performance Evaluation of Telecommunication Industry between Chinaand Taiwan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Yao-Lang Chang, Tsung-Ting Shih, and Chih-Hong Wang
Table of Contents – Part I XV
Discuss and Analyze by AHP Techniques the KSF of Managing theNMMBA under the BOT Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Wen-Ching Lin, Ying-Fung Huang, and Chia-Nan Wang
A DEA Application Model of Production Process for the Chip ResistorIndustry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Hsi-Che Teng, Shin-Jung Wang, and Ming-Haur Shih
Enhancing Repair Service Quality of Mobile Phones by the TRIZMethod . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Yao-Lang Chang, Shu-Chin Lai, and Chia-Nan Wang
Fuzzy Logic and Its Applications
Adaptive Learning Approach of Fuzzy Logic Controller with Evolutionfor Pursuit–Evasion Games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Hung-Chien Chung and Jing-Sin Liu
Comparison of Multispectral Image Processing Techniques to BrainMR Image Classification between Fuzzy C-Mean Method and GeodesicActive Contours of Caselles Level Set Method. . . . . . . . . . . . . . . . . . . . . . . . 491
Yen-Sheng Chen, Shao-Hsien Chen, and Chun-Chih Chang
Modeling PVT Properties of Crude Oil Systems Using Type-2 FuzzyLogic Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Sunday Olusanya Olatunji, Ali Selamat, andAbdul Azeez Abdul Raheem
An Extensional Signed Fuzzy Measure of Signed Rho-Fuzzy Measure . . . 509Hsiang-Chuan Liu
Adaptive Fuzzy Neural Network Control for Automatic LandingSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
Jih-Gau Juang and Li-Hsiang Chien
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Table of Contents – Part II
Social Networks
Influence Clubs in Social Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Chin-Ping Yang, Chen-Yi Liu, and Bang Ye Wu
A Method of Label-Dependent Feature Extraction in SocialNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Tomasz Kajdanowicz, Przemys�law Kazienko, and Piotr Doskocz
Identifying Representative Reviewers in Internet Social Media . . . . . . . . . 22Sang-Min Choi, Jeong-Won Cha, and Yo-Sub Han
Fitcolab Experimental Online Social Networking System . . . . . . . . . . . . . . 31Haris Memic
General Network Properties of Friendship Online Social Network . . . . . . . 41Haris Memic
Innovations in Computation and Application
Fuzzy Decision Making for IJV Performance Based on StatisticalConfidence-Interval Estimates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Huey-Ming Lee, Teng-San Shih, Jin-Shieh Su, and Lily Lin
Designing a Learning System Based on Voice Mail – A Case Study ofEnglish Oral Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Huey-Ming Lee and Chien-Hsien Huang
A Gene Selection Method for Microarray Data Based on Sampling . . . . . 68Yungho Leu, Chien-Pang Lee, and Hui-Yi Tsai
The Similarity of Video Based on the Association Graph Constructionof Video Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Ping Yu
Using SOA Concept to Construct an e-Learning System for CollegeInformation Management Courses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Chung C. Chang and Kou-Chan Hsiao
Cryptanalysis on Sun-Yeh’s Password-Based Authentication and KeyDistribution Protocols with Perfect Forward Secrecy . . . . . . . . . . . . . . . . . . 95
Wen-Gong Shieh and Wen-Bing Horng
XVIII Table of Contents – Part II
Using Genetic Algorithms for Personalized Recommendation . . . . . . . . . . 104Chein-Shung Hwang, Yi-Ching Su, and Kuo-Cheng Tseng
Intellignet Signal Processing for Human-MachineInteraction (I)
Pretreatment for Speech Machine Translation . . . . . . . . . . . . . . . . . . . . . . . 113Xiaofei Zhang, Chong Feng, and Heyan Huang
Emotion Aware Mobile Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Radoslaw Nielek and Adam Wierzbicki
Boosting-Based Ensemble Learning with Penalty Setting Profiles forAutomatic Thai Unknown Word Recognition . . . . . . . . . . . . . . . . . . . . . . . . 132
Jakkrit TeCho, Cholwich Nattee, and Thanaruk Theeramunkong
AONT Encryption Based Application Data Management in MobileRFID Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Namje Park and Youjin Song
A Query Answering Greedy Algorithm for Selecting MaterializedViews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
T.V. Vijay Kumar and Mohammad Haider
Capturing Users’ Buying Activity at Akihabara Electric Town fromTwitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
The-Minh Nguyen, Takahiro Kawamura, Yasuyuki Tahara, andAkihiko Ohsuga
Novel Approaches to Intelligent Applications
Private Small-Cloud Computing in Connection with WinCE ThinClient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Bao Rong Chang, Hsiu Fen Tsai, Chien-Feng Huang, andHis-Chung Huang
Honey Bee Mating Optimization Algorithm for Approximation ofDigital Curves with Line Segments and Circular Arcs . . . . . . . . . . . . . . . . . 183
Shu-Chien Huang
Harmful Adult Multimedia Contents Filtering Method in Mobile RFIDService Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Namje Park and Youngsoo Kim
Efficient GHA-Based Hardware Architecture for TextureClassification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Shiow-Jyu Lin, Yi-Tsan Hung, and Wen-Jyi Hwang
Table of Contents – Part II XIX
Stability by Feedback of the Second Order Singular DistributedParameter Systems Containing Infinite Many Poles . . . . . . . . . . . . . . . . . . . 213
Feng Liu, Guodong Shi, and Jianchun Wu
Mining Generalized Association Rules with Quantitative Data underMultiple Support Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Yeong-Chyi Lee, Tzung-Pei Hong, and Chun-Hao Chen
Intelligent Technologies for Medical RelatedApplications
Comparison of Edge Segmentation Methods to Tongue Diagnosis inTraditional Chinese Medicine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Chieh-Hsuan Wang, Ching-Chuan Wei, and Che-Hao Li
The Grading of Prostatic Cancer in Biopsy Image Based on Two StagesApproach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Shao-Kuo Tai, Cheng-Yi Li, Yee-Jee Jan, and Shu-Chuan Lin
Automatic Drug Image Identification System Based on Multiple ImageFeatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Rung-Ching Chen, Cho-Tsan Pao, Ying-Hao Chen, andJeng-Chih Jian
On the Development of a Brain Simulator . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Wen-Hsien Tseng, Song-Yun Lu, and Hsing Mei
Obstructive Sleep Apnea Diagnosis from ElectroencephalographyFrequency Variation by Radial Basis Function Neural Network . . . . . . . . . 268
Chien-Chang Hsu and Jie Yu
Authentication and Protection for Medical Image . . . . . . . . . . . . . . . . . . . . 278Chih-Hung Lin, Ching-Yu Yang, and Chia-Wei Chang
Intellignet Signal Processing for Human-MachineInteraction (II)
FLC-Regulated Speaker Adaptation Mechanisms for SpeechRecognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Ing-Jr Ding
Monitoring of the Multichannel Audio Signal . . . . . . . . . . . . . . . . . . . . . . . . 298Eugeniusz Kornatowski
Watermark Synchronization Based on Locally Most Stable FeaturePoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Jiansheng Qian, Leida Li, and Zhaolin Lu
XX Table of Contents – Part II
Audio Watermarking with HOS-Based Cepstrum Feature . . . . . . . . . . . . . 316Bo-Lin Kuo, Chih-Cheng Lo, Chi-Hua Liu, Bin-Yih Liao, andJeng-Shyang Pan
Processing Certificate of Authorization with Watermark Based on GridEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Heng-Sheng Chen, Tsang-Yean Lee, and Huey-Ming Lee
Novel Approaches to Collective Computations andSystems
Probability Collectives Multi-Agent Systems: A Study of Robustness inSearch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Chien-Feng Huang and Bao Rong Chang
An Improved Ant Algorithm for Fuzzy Data Mining . . . . . . . . . . . . . . . . . . 344Min-Thai Wu, Tzung-Pei Hong, and Chung-Nan Lee
Information-Driven Collective Intelligences . . . . . . . . . . . . . . . . . . . . . . . . . . 352Francesca Arcelli Fontana, Ferrante Formato, and Remo Pareschi
Instructional Design for Remedial English e-Learning . . . . . . . . . . . . . . . . . 363Chia-ling Hsu, Ai-ling Wang, and Yuh-chang Lin
A Web-Based E-Teaching System under Low Bit-Rate Constraint . . . . . . 373Wei-Chih Hsu, Cheng-Hsiu Li, and Tzu-Hung Chuang
Using Freeware to Construct a Game-Based Learning System . . . . . . . . . . 381Yuh-Ming Cheng and Li-Hsiang Lu
Intelligent Systems
Three Kinds of Negations in Fuzzy Knowledge and Their Applicationsto Decision Making in Financial Investment . . . . . . . . . . . . . . . . . . . . . . . . . 391
Zhenghua Pan, Cen Wang, and Lijuan Zhang
Using Fuzzy Neural Network to Explore the Effect of Internet onQuality of Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Jui-Chen Huang
The Power Load Forecasting by Kernel PCA . . . . . . . . . . . . . . . . . . . . . . . . 411Fang-Tsung Liu, Chiung-Hsing Chen, Shang-Jen Chuang, andTing-Chia Ou
A Study of USB 3 in Perspective Aspect . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425Yeh Wei-Ming
Table of Contents – Part II XXI
A Study of CAPTCHA and Its Application to User Authentication . . . . 433Albert B. Jeng, Chien-Chen Tseng, Der-Feng Tseng, andJiunn-Chin Wang
TAIEX Forecasting Based on Fuzzy Time Series and the AutomaticallyGenerated Weights of Defuzzified Forecasted Fuzzy Variations ofMultiple-Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Shyi-Ming Chen and Huai-Ping Chu
Advanced Knowledgement Management (I)
Concept Document Repository to Support Research of the CoalIndustry Development Forecasting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Liudmila Takayshvili
Forecasting Coal and Rock Dynamic Disaster Based on AdaptiveNeuro-Fuzzy Inference System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Jianying Zhang, Jian Cheng, and Leida Li
Context-Aware Workflow Management Based on Formal KnowledgeRepresentation Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Fu-Shiung Hsieh
A Consensus-Based Method for Fuzzy Ontology Integration . . . . . . . . . . . 480Ngoc Thanh Nguyen and Hai Bang Truong
Contextual Information Search Based on Ontological User Profile . . . . . . 490Nazim uddin Mohammed, Trong Hai Duong, and Geun Sik Jo
Rough Sets Based Association Rules Application for Knowledge-BasedSystem Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Shu-Hsien Liao and Yin-Ju Chen
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Table of Contents – Part III
Intelligent Computing for Image Analysis (I)
Feature Analysis and Classification of Lymph Nodes . . . . . . . . . . . . . . . . . . 1Chuan-Yu Chang, Shu-Han Chang, and Shao-Jer Chen
Automatic and Accurate Image Matting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Wu-Chih Hu, Deng-Yuan Huang, Ching-Yu Yang, Jia-Jie Jhu, andCheng-Pin Lin
Improved DCT-Based Watermarking through Particle SwarmOptimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chih-Chin Lai, Wei-Shun Wang, and Ci-Fong Jhan
A New Adaptive B-spline VFC Snake for Object Contour Extraction . . . 29Hoang-Nam Nguyen and An-Chen Lee
Algorithm for Computational Measure of Color Constancy . . . . . . . . . . . . 37S.J. Jerome Teng
Intelligent Digital Watermarking and PatternRecognition
GOP-Flexible Distributed Multiview Video Coding with Adaptive SideInformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Lili Meng, Yao Zhao, Jeng-Shyang Pan, Huihui Bai, andAnhong Wang
A Novel Embedded Coding Algorithm Based on the ReconstructedDCT Coefficients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Lin-Lin Tang, Jeng-Shyang Pan, and Zhe-Ming Lu
A Vehicle License Plate Recognition System Based on Spatial/FrequencyDomain Filtering and Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Mu-Liang Wang, Yi-Hua Liu, Bin-Yih Liao, Yi-Sin Lin, andMong-Fong Horng
Reversible Watermarking Based on Invariant Relation of ThreePixels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Shaowei Weng, Shu-Chuan Chu, Jeng-Shyang Pan, andLakhmi C. Jain
Alphanumeric Shape Recognition of Fingertip Writing Trajectory . . . . . . 81Ming-Fang Wu, Jen-Hsing Li, Ping-Tsung Wang, and Ruei-Tang Lin
XXIV Table of Contents – Part III
Recognition of Tire Tread Patterns Based on Gabor Wavelets andSupport Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Deng-Yuan Huang, Wu-Chih Hu, Ying-Wei Wang,Ching-I Chen, and Chih-Hsiang Cheng
Advanced Knowledgement Management (II)
Terminological and Assertional Queries in KQL Knowledge AccessLanguage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Krzysztof Goczy�la, Piotr Piotrowski, Aleksander Waloszek,Wojciech Waloszek, and Teresa Zawadzka
Conditional Statements Grounded in Past, Present and Future . . . . . . . . . 112Grzegorz Skorupa and Rados�law Katarzyniak
Automatic Ontology Evolution in Open and Dynamic ComputingEnvironments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Edgar Jembere, Sibusiso S. Xulu, and Matthew O. Adigun
Diagnostic Tests Based on Knowledge States . . . . . . . . . . . . . . . . . . . . . . . . 133Sylvia Encheva and Sharil Tumin
An Ontology-Supported Ubiquitous Interface Agent for CloudComputing - Example on Zigbee Technique . . . . . . . . . . . . . . . . . . . . . . . . . 142
Sheng-Yuan Yang, Dong-Liang Lee, and Chun-Liang Hsu
Semantic Optimization of Query Transformation in SemanticPeer-to-Peer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Jason J. Jung
Intelligent Computing for Image Analysis (II)
Comparative Studies of Parallel and Vertical Stereo Vision-Based 3DPneumatic Arms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Ray-Hwa Wong, Y. Wang, and Chao-Yi Liu
An Effective Image Enhancement Method for Electronic PortalImages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Mao-Hsiung Hung, Shu-Chuan Chu, John F. Roddick,Jeng-Shyang Pan, and Chin-Shiuh Shieh
License Plate Tilt Correction Based on the Straight Line FittingMethod and Projection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Kaushik Deb, Andrey Vavilin, Jung-Won Kim, and Kang-Hyun Jo
Differential Approximation of the 2-D Laplace Operator for EdgeDetection in Digital Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Jakub P ↪eksinski and Grzegorz Miko�lajczak
Table of Contents – Part III XXV
ARToolkit-Based Augmented Reality System with Integrated 1-DBarcode: Combining Colorful Markers with Remote Servers of 3D Datafor Product Promotion Purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Jong-Chih Chien, Hoang-Yang Lu, Yi-Sheng Wu, and Li-Chang Liu
Innovative Information System and Application
Design and Implementation of e-Journal Review System UsingText-Mining Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Chun-Wei Tseng, Feng-Jung Liu, Wan-Chin Lu, andShih-Hao Huang
Study on Architecture-Oriented Information Security Risk AssessmentModel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Wei-Ming Ma
Constructing Problem-Based Learning Activities Using Self-assessmentSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Feng-Jung Liu, Chun-Wei Tseng, and Wen-Chang Tseng
Conducted EMI Analysis of a Three-Phase PWM Rectifier . . . . . . . . . . . . 236Kexin Wei, Bin Liang, and Youjun Yue
Synchronization of Duffing-Holmes Oscillators Using Stable NeuralNetwork Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Suwat Kuntanapreeda
Codes Base on Unambiguous Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252Ho Ngoc Vinh, Vu Thanh Nam, and Phan Trung Huy
Intelligent Computing for Networks
A Study on the Topology Control Method for Bluetooth ScatternetFormation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Chih-Min Yu
A Study on the Global Configured Method of Blueweb RoutingProtocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Chih-Min Yu
Energy Efficient Framework for Mobility Supported Smart IP-WSN . . . . 282Md. Motaharul Islam, Nguyen Tien Dung,Aymen Abdullah Al Saffar, Sang-Ho Na, andEui-Nam Huh
An Efficient Migration Framework for Mobile IPTV . . . . . . . . . . . . . . . . . . 292Aymen Abdullah Alsaffar, Tien-Dung Nguyen,Md. Motaharul Islam, Young-Rok Shin, andEui-Nam Huh
XXVI Table of Contents – Part III
Auto-configuration Support for IPv4/IPv6 Translation in Smart SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Huan-wei Lin and Quincy Wu
Soft Computing to Industrial Management andApplications
Empirical Bayes Estimation of Customers’ Guarantee Time Length ofLoyalty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Hui-Hsin Huang
An Integrated EPQ Model for Manufacturer’s Replenishment Policieswith Two Levels of Trade Credit Policy under Supplier Credits Linkedto Ordering Quantity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Liang-Ho Chen, Jyh-Woei Chou, and Tien-Tsai Huang
Modeling a Dynamic Design System Using the Mahalanobis TaguchiSystem—Two-Step Optimal Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Tsung-Shin Hsu and Ching-Lien Huang
A Fuzzy Model Applied on Assessing Operating Performance ofIndustrial PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Tien-Tsai Huang, Su-Yi Huang, and Yi-Huei Chen
Inventory Models for Deteriorating Items with Variable Selling Priceunder Stock-Dependent Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Yen-Wen Wang, Chih-Te Yang, August Tsai, and Chiou-Ping Hsu
Innovations in Pervasive Computing
Hierarchical IP Distribution Mechanism for VANET . . . . . . . . . . . . . . . . . . 354Chiu-Ching Tuan, Jia-Ming Zhang, and Shu-Jun Chao
VisMusic: Music Visualization with Interactive Browsing . . . . . . . . . . . . . . 367Jia-Lien Hsu and Wei-Hsien Chien
The Study of Plagiarism Detection for Object-Oriented ProgrammingLanguage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Jong-Yih Kuo and Wei-Ting Wang
A Distributed Sleep Scheduling Algorithm with Range Adjustment forWireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Kei-Chen Tung, Jonathan Chun-Hsien Lu, and Hsin-Hung Lin
An Innovative Routing Algorithm with Reinforcement Learning andPattern Tree Adjustment for Wireless Sensor Networks . . . . . . . . . . . . . . . 398
Chia-Yu Fan, Chien-Chang Hsu, and Wei-Yi Wang
Table of Contents – Part III XXVII
Biological Computing
Swarm Intelligence for Cardinality-Constrained Portfolio Problems . . . . . 406Guang-Feng Deng and Woo-Tsong Lin
Immune Memory Mechanism Based on Cyclic Idiotypic Network . . . . . . . 416Chung-Ming Ou and C.R. Ou
Sensor Placement in Water Networks Using a Population-Based AntColony Optimization Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Konrad Diwold, Thomas Ruhnke, and Martin Middendorf
The Codebook Design of Image Vector Quantization Based on theFirefly Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Ming-Huwi Horng and Ting-Wei Jiang
Confronting Two-Pair Primer Design Using Particle SwarmOptimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Cheng-Hong Yang, Yu-Huei Cheng, and Li-Yeh Chuang
Strategic Health Information Management and Forecast:The Birdwatching Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Arash Shaban-Nejad and Volker Haarslev
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Recommended