24
Lecture Notes in Artificial Intelligence 6421 Edited by R. Goebel, J. Siekmann, and W. Wahlster Subseries of Lecture Notes in Computer Science

Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

  • Upload
    doanbao

  • View
    227

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Lecture Notes in Artificial Intelligence 6421Edited by R. Goebel, J. Siekmann, and W. Wahlster

Subseries of Lecture Notes in Computer Science

Page 2: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Jeng-Shyang Pan Shyi-Ming ChenNgoc Thanh Nguyen (Eds.)

ComputationalCollective Intelligence

Technologies and Applications

Second International Conference, ICCCI 2010Kaohsiung, Taiwan, November 10-12, 2010Proceedings, Part I

13

Page 3: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Series Editors

Randy Goebel, University of Alberta, Edmonton, CanadaJörg Siekmann, University of Saarland, Saarbrücken, GermanyWolfgang Wahlster, DFKI and University of Saarland, Saarbrücken, Germany

Volume Editors

Jeng-Shyang PanNational Kaohsiung University of Applied SciencesDepartment of Electronic Engineering415 Chien-Kung Road, Kaohsiung 807, TaiwanE-mail: [email protected]

Shyi-Ming ChenNational Taiwan University of Science and TechnologyDepartment of Computer Science and Information Engineering #43, Sec.4Keelung Rd., Taipei, 106,TaiwanE-mail: [email protected]

Ngoc Thanh NguyenWroclaw University of Technology, Institute of InformaticsStr. Wyb. Wyspianskiego 27, 50-370 Wroclaw, PolandE-mail: [email protected]

Library of Congress Control Number: 2010937276

CR Subject Classification (1998): I.2, I.2.11, H.3-4, C.2, D, H.5

LNCS Sublibrary: SL 7 – Artificial Intelligence

ISSN 0302-9743ISBN-10 3-642-16692-X Springer Berlin Heidelberg New YorkISBN-13 978-3-642-16692-1 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.

springer.com

© Springer-Verlag Berlin Heidelberg 2010Printed in Germany

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper 06/3180

Page 4: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Preface

This volume composes the proceedings of the Second International Conference on Computational Collective Intelligence––Technologies and Applications (ICCCI 2010), which was hosted by National Kaohsiung University of Applied Sciences and Wroclaw University of Technology, and was held in Kaohsiung City on November 10-12, 2010. ICCCI 2010 was technically co-sponsored by Shenzhen Graduate School of Harbin Institute of Technology, the Tainan Chapter of the IEEE Signal Processing Society, the Taiwan Association for Web Intelligence Consortium and the Taiwanese Association for Consumer Electronics. It aimed to bring together researchers, engineers and poli-cymakers to discuss the related techniques, to exchange research ideas, and to make friends. ICCCI 2010 focused on the following themes:

• Agent Theory and Application • Cognitive Modeling of Agent Systems • Computational Collective Intelligence • Computer Vision • Computational Intelligence • Hybrid Systems • Intelligent Image Processing • Information Hiding • Machine Learning • Social Networks • Web Intelligence and Interaction

Around 500 papers were submitted to ICCCI 2010 and each paper was reviewed by at least two referees. The referees were from universities and industrial organizations. 155 papers were accepted for the final technical program. Four plenary talks were kindly offered by: Gary G. Yen (Oklahoma State University, USA), on “Population Control in Evolutionary Multi-objective Optimization Algorithm,” Chin-Chen Chang (Feng Chia University, Taiwan), on “Applying De-clustering Concept to Information Hiding,” Qinyu Zhang (Harbin Institute of Technology, China), on “Cognitive Radio Networks and Its Applications,” and Lakhmi C. Jain (University of South Australia, Australia), on “Intelligent System Design in Security.”

We would like to thank the authors for their tremendous contributions. We would also express our sincere appreciation to the reviewers, Program Committee members and the Local Committee members for making this conference successful. Finally,

Page 5: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

VI Preface

we would like to express special thanks for the financial support from the National Kaohsiung University of Applied Sciences, Kaohsiung City Government, National Science Council and Education Ministry, Taiwan, in making ICCCI 2010 possible.

Novermber 2010 Ngoc Thanh NguyenJeng-Shyang PanShyi-Ming Chen

Ryszard Kowalczyk

Page 6: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

ICCCI 2010 Conference Organization

Honorary Chair

Chun-Hsiung Fang National Kaohsiung University of Applied Sciences, Taiwan

Jui-Chang Kung Cheng Shiu University, Taiwan

General Chair

Ngoc Thanh Nguyen Wroclaw University of Technology, Poland

Program Committee Chair

Jeng-Shyang Pan National Kaohsiung University of Applied Sciences, Taiwan

Shyi-Ming Chen National Taiwan University of Science and Technology, Taiwan

Ryszard Kowalczyk Swinburne University of Technology, Australia

Special Session Chairs

Bao-Rong Chang National University of Kaohsiung, Taiwan Chang-Shing Lee National University of Tainan, Taiwan Radoslaw Katarzyniak Wroclaw University of Technology, Poland

International Advisory Chair

Bin-Yih Liao National Kaohsiung University of Applied Sciences, Taiwan

International Publication Chair

Chin-Shin Shieh National Kaohsiung University of Applied Sciences, Taiwan

Bing-Hong Liu National Kaohsiung University of Applied Sciences, Taiwan

Page 7: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

VIII Conference Organization

Local Organizing Committee Chair

Mong-Fong Horng National Kaohsiung University of Applied Sciences, Taiwan

ICCCI 2010 Steering Committee

Chair

Ngoc Thanh Nguyen Wroclaw University of Technology, Poland

Co-chair

Ryszard Kowalczyk Swinburne University of Technology, Australia Shyi-Ming Chen National Taiwan University of Science and

Technology, Taiwan Adam Grzech Wroclaw University of Technology, Poland Lakhmi C. Jain University of South Australia, Australia Geun-Sik Jo Inha University, South Korea Janusz Kacprzyk Polish Academy of Sciences, Poland Ryszard Tadeusiewicz AGH-UST, Poland Toyoaki Nishida Kyoto University, Japan

ICCCI 2010 Technical Program Committee

Jeng Albert B. Gomez-Skarmeta Antonio F. Shih An-Zen Andres Cesar Hsieh Cheng-Hsiung Lee Chin-Feng Badica Costin Godoy Daniela Barbucha Dariusz Greenwood Dominic CAPKOVIC Frantisek Yang Fuw-Yi Huang Hsiang-Cheh Chang Hsuan-Ting Lee Huey-Ming Deng Hui-Fang Czarnowski Ireneusz Lu James J. Kacprzyk Janusz

Jinwen University of Science and Technology, Taiwan Murcia University, Spain Jinwen University of Science and Technology, Taiwan Universidad Complutense de Madrid, Spain Chaoyang University of Technology, Taiwan Chaoyang University of Technology, Taiwan University of Craiova, Romania Unicen University, Argentina Gdynia Maritime University, Poland Whitestein Technologies, Switzerland Slovak Academy of Sciences, Slovakia Chaoyang University of Technology, Taiwan National University of Kaohsiung, Taiwan National Yunlin University of Science and Technology,

Taiwan Chinese Culture University, Taiwan South China University of Technology, China Gdynia Maritime University, Poland Emory University, USA Polish Academy of Sciences, Poland

Page 8: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Conference Organization IX

Marecki Janusz Sobecki Janusz Jung Jason J. Nebel Jean-Christophe Dang Jiangbo Huang Jingshan Chang Jui-fang Nunez Manuel Gaspari Mauro Khurram Khan Muhammad Sheng Quan Z. Katarzyniak Radoslaw Unland Rainer Ching Chen Rung Shen Rung-Lin Yang Sheng-Yuan Yen Shu-Chin Chen Shyi-Ming Zadrozny Slawomir Hammoudi Slimane Hong Tzung-Pei Hsu Wen-Lian Pedrycz Witold Baghdadi Youcef Lo Yu-lung Cheng Yuh Ming Huang Yung-Fa Ye Yunming

IBM T.J. Watson Research, USA Wroclaw University of Technology, Poland Yeungnam University, South Korea Kingston University, USA Siemens Corporate Research, USA University of South Alabama, USA National Kaohsiung University of Applied Sciences,

Taiwan Universidad Complutense de Madrid, Spain University of Bologna, Italy King Saud University, Saudi Arabia University of Adelaide, Australia Wroclaw University of Technology, Poland University of Duisburg-Essen, Germany Chaoyang University of Technology, Taiwan National Taipei University, Taiwan St. John's University, Taiwan Wenzao Ursuline College of Languages, Taiwan National Taiwan University of Science and

Technology, Taiwan Polish Academy of Sciences, Poland ESEO, France National University of Kaohsiung, Taiwan Academia Sinica, Taiwan University of Alberta, Canada Sultan Qaboos University, Oman Chaoyang University of Technology, Taiwan Shu-Te University, Taiwan Chaoyang University of Technology, Taiwan Harbin Institute of Technology, China

Keynote Speakers

Gary G. Yen Oklahoma State University, USA Lakhmi C. Jain University of South Australia, Australia Chin-Chen Chang Feng Chia University, Taiwan Qinyu Zhang Harbin Institute of Technology Shenzhen Graduate

School, China

Program Committee of Special Sessions

Dariusz Barbucha Gdynia Maritime University, Poland Bao-Rong Chang National University of Kaohsiung, Taiwan Hsuan-Ting Chang National Yunlin University of Science and

Technology, Taiwan

Page 9: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

X Conference Organization

Chuan-Yu Chang National Yunlin University of Science and Technology, Taiwan

Rung-Ching Chen Chaoyang University of Technology, Taiwan Shyi-Ming Chen National Taiwan University of Science and

Technology, Taiwan Kazimierz Choroś Wrocław University of Technology, Poland Mohamed Hassoun ENSSIB Villeurbanne, France Mong-Fong Horng National Kaohsiung University of Applied Sciences,

Taiwan Chien-Chang Hsu Fu-Jen Catholic University, Taiwan Wu-Chih Hu National Penghu University of Science and

Technology, Taiwan Chien-Feng Huang National University of Kaohsiung, Taiwan Tien-Tsai Huang Lunghwa University of Science and Technology,

Taiwan Huey-Ming Lee Chinese Culture University, Taiwan Che-Hung Lin Cheng Shiu University, Taiwan Lily Lin China University of Technology, Taiwan Piotr Jędrzejowicz Gdynia Maritime University, Poland Jeng-Shyang Pan National Kaohsiung University of Applied Sciences,

Taiwan Chia-Nan Wang National Kaohsiung University of Applied Sciences,

Taiwan

Page 10: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part I

Collective Intelligence in Web Systems – WebSystems Analysis

Neuro-Fuzzy Models in Global HTTP Request Distribution . . . . . . . . . . . 1Krzysztof Zatwarnicki

Real Anomaly Detection in Telecommunication Multidimensional DataUsing Data Mining Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Kazimierz Choros

Time Series Forecasting of Web Performance Data Monitored byMWING Multiagent Distributed System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Leszek Borzemski and Maciej Drwal

Comparison and Analysis of the Eye Pointing Methods andApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Piotr Chyna�l and Janusz Sobecki

Abstraction Relations between Internal and Behavioural Agent Modelsfor Collective Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Alexei Sharpanskykh and Jan Treur

Quick Response System Using Collaborative Filtering on FashionE-Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Kyung-Yong Chung, Chang-Woo Song, Kee-Wook Rim, andJung-Hyun Lee

Intelligent Computing for Data Security

An Ownership Verification Scheme by Using Image Pinned Field andGenetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Mn-Ta Lee, Hsuan-Ting Chang, and Mu-Liang Wang

Multiple-Image Multiplexing Encryption Based on ModifiedGerchberg-Saxton Algorithm and Phase Modulation in FractionalFourier Transform Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Hsuan-Ting Chang and Hone-Ene Hwang

Optical Image Encryption Based on Joint Fresnel TransformCorrelator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Hsuan-Ting Chang and Zong-Yu Wu

Communication and Trust in the Bounded Confidence Model . . . . . . . . . . 90M.J. Krawczyk, K. Malarz, R. Korff, and K. Ku�lakowski

Page 11: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

XII Table of Contents – Part I

Detection of Image Region-Duplication with Rotation and ScalingTolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Qiumin Wu, Shuozhong Wang, and Xinpeng Zhang

Smart Clustering Techniques

An Extensible Particles Swarm Optimization for Energy-EffectiveCluster Management of Underwater Sensor Networks . . . . . . . . . . . . . . . . . 109

Mong-Fong Horng, Yi-Ting Chen, Shu-Chuan Chu,Jeng-Shyang Pan, and Bin-Yih Liao

The 3D Display and Analysis of the Pattern of Photolithography . . . . . . . 117Lih-Shyang Chen, Young-Jinn Lay, Lian-Yong Lin, Jing-Jou Tang,Wen-Lin Cheng, and Yu-Jen Lin

Geometrically Invariant Image Watermarking Using Scale-InvariantFeature Transform and K-Means Clustering . . . . . . . . . . . . . . . . . . . . . . . . . 128

Huawei Tian, Yao Zhao, Rongrong Ni, and Jeng-Shyang Pan

DenVOICE: A New Density-Partitioning Clustering Technique Basedon Congregation of Dense Voronoi Cells for Non-spherical Patterns . . . . . 136

Jui-Fang Chang

Semantic Search Results Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145Krzysztof Strzalka and Aleksander Zgrzywa

Trend Detection on Thin-Film Solar Cell Technology Using ClusterAnalysis and Modified Data Crystallization . . . . . . . . . . . . . . . . . . . . . . . . . 152

Tzu-Fu Chiu, Chao-Fu Hong, and Yu-Ting Chiu

Quality of Semantic Compression in Classification . . . . . . . . . . . . . . . . . . . . 162Dariusz Ceglarek, Konstanty Haniewicz, and Wojciech Rutkowski

Web Service

Realizes Three-Tier Structure Mail System Based on the Web . . . . . . . . . 172Jun-Hua He and Jing-Yuan Lv

Secure Collaborative Cloud Design for Global USN Services . . . . . . . . . . . 178Tien-Dung Nguyen, Md. Motaharul Islam, Aymen Al-Saffar,Jun-Young Park, and Eui-Nam Huh

Mining on Terms Extraction from Web News . . . . . . . . . . . . . . . . . . . . . . . . 188Li-Fu Hsu

Inter-cloud Data Integration System Considering Privacy and Cost . . . . . 195Yuan Tian, Biao Song, Junyoung Park, and Eui-Nam Huh

Page 12: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part I XIII

A Semantic Web Approach to Heterogeneous Metadata Integration . . . . . 205Shu-Hsien Liao, Hong-Chu Huang, and Ya-Ning Chen

Quantitative Management of Technology (I)

Fuzzy Multi-objective Programming Application for Time-CostTrade-off of CPM in Project Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

Gino K. Yang

A Study on Two-Stage Budget Planning by Fuzzy QuantifyingAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230

Gino K. Yang and Wayne Chouhuang

Hybrid Support Vector Regression and GA/TS for Radio-WavePath-Loss Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

Kuo-Chen Hung, Kuo-Ping Lin, Gino K. Yang, and Y.-C. Tsai

Inventory Model with Fractional Brownian Motion Demand . . . . . . . . . . . 252Jennifer Shu-Jen Lin

Note on Inventory Model with a Stochastic Demand . . . . . . . . . . . . . . . . . . 260Yu-Wen Wou

A GA-Based Support Vector Machine Diagnosis Model for BusinessCrisis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

Ming-Fen Yang and Huey-Der Hsiao

Agent System

A Book-Agent System for Library Marketing . . . . . . . . . . . . . . . . . . . . . . . . 274Toshiro Minami

Adaptive Modelling of Social Decision Making by Agents IntegratingSimulated Behaviour and Perception Chains . . . . . . . . . . . . . . . . . . . . . . . . . 284

Alexei Sharpanskykh and Jan Treur

Modeling Agent-Based Collaborative Process . . . . . . . . . . . . . . . . . . . . . . . . 296Moamin Ahmed, Mohd Sharifuddin Ahmad, andMohd Zaliman M. Yusoff

A Three-Dimensional Abstraction Framework to Compare Multi-agentSystem Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

Tibor Bosse, Mark Hoogendoorn, Michel C.A. Klein, and Jan Treur

Improving Performance of Protein Structure Similarity Searching byDistributing Computations in Hierarchical Multi-Agent System . . . . . . . . 320

Alina Momot, Bozena Ma�lysiak-Mrozek, Stanis�law Kozielski,Dariusz Mrozek, �Lukasz Hera, Sylwia Gorczynska-Kosiorz, andMicha�l Momot

Page 13: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

XIV Table of Contents – Part I

Modeling Super Mirroring Functionality in Action Execution,Imagination, Mirroring, and Imitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

Monique Hendriks and Jan Treur

CCI-Based Optimization Models

Cellular GEP-Induced Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343Joanna Jedrzejowicz and Piotr Jedrzejowicz

Cluster Integration for the Cluster-Based Instance Selection . . . . . . . . . . . 353Ireneusz Czarnowski and Piotr Jedrzejowicz

Comparative Study of the Differential Evolution and ApproximationAlgorithms for Computing Optimal Mixed Strategies in Zero-SumGames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363

Urszula Boryczka and Przemyslaw Juszczuk

Ant Colony Decision Trees – A New Method for Constructing DecisionTrees Based on Ant Colony Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

Urszula Boryczka and Jan Kozak

A Cross-Entropy Based Population Learning Algorithm for Multi-modeResource-Constrained Project Scheduling Problem with Minimum andMaximum Time Lags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

Piotr J ↪edrzejowicz and Aleksander Skakovski

Evaluation of Agents Performance within the A-Team SolvingRCPSP/Max Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393

Piotr Jedrzejowicz and Ewa Ratajczak-Ropel

Synchronous vs. Asynchronous Cooperative Approach to Solving theVehicle Routing Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

Dariusz Barbucha

Quantitative Management of Technology (II)

Development of an Engineering Knowledge Extraction Framework . . . . . . 413Chengter Ho

Exploring EFL Taiwanese University Students’ Perceptions of aCollaborative CALL Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

Yen-Hui Wang and Chia-Nan Wang

Performance Evaluation of Telecommunication Industry between Chinaand Taiwan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433

Yao-Lang Chang, Tsung-Ting Shih, and Chih-Hong Wang

Page 14: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part I XV

Discuss and Analyze by AHP Techniques the KSF of Managing theNMMBA under the BOT Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444

Wen-Ching Lin, Ying-Fung Huang, and Chia-Nan Wang

A DEA Application Model of Production Process for the Chip ResistorIndustry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457

Hsi-Che Teng, Shin-Jung Wang, and Ming-Haur Shih

Enhancing Repair Service Quality of Mobile Phones by the TRIZMethod . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

Yao-Lang Chang, Shu-Chin Lai, and Chia-Nan Wang

Fuzzy Logic and Its Applications

Adaptive Learning Approach of Fuzzy Logic Controller with Evolutionfor Pursuit–Evasion Games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482

Hung-Chien Chung and Jing-Sin Liu

Comparison of Multispectral Image Processing Techniques to BrainMR Image Classification between Fuzzy C-Mean Method and GeodesicActive Contours of Caselles Level Set Method. . . . . . . . . . . . . . . . . . . . . . . . 491

Yen-Sheng Chen, Shao-Hsien Chen, and Chun-Chih Chang

Modeling PVT Properties of Crude Oil Systems Using Type-2 FuzzyLogic Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499

Sunday Olusanya Olatunji, Ali Selamat, andAbdul Azeez Abdul Raheem

An Extensional Signed Fuzzy Measure of Signed Rho-Fuzzy Measure . . . 509Hsiang-Chuan Liu

Adaptive Fuzzy Neural Network Control for Automatic LandingSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520

Jih-Gau Juang and Li-Hsiang Chien

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531

Page 15: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part II

Social Networks

Influence Clubs in Social Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Chin-Ping Yang, Chen-Yi Liu, and Bang Ye Wu

A Method of Label-Dependent Feature Extraction in SocialNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Tomasz Kajdanowicz, Przemys�law Kazienko, and Piotr Doskocz

Identifying Representative Reviewers in Internet Social Media . . . . . . . . . 22Sang-Min Choi, Jeong-Won Cha, and Yo-Sub Han

Fitcolab Experimental Online Social Networking System . . . . . . . . . . . . . . 31Haris Memic

General Network Properties of Friendship Online Social Network . . . . . . . 41Haris Memic

Innovations in Computation and Application

Fuzzy Decision Making for IJV Performance Based on StatisticalConfidence-Interval Estimates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Huey-Ming Lee, Teng-San Shih, Jin-Shieh Su, and Lily Lin

Designing a Learning System Based on Voice Mail – A Case Study ofEnglish Oral Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Huey-Ming Lee and Chien-Hsien Huang

A Gene Selection Method for Microarray Data Based on Sampling . . . . . 68Yungho Leu, Chien-Pang Lee, and Hui-Yi Tsai

The Similarity of Video Based on the Association Graph Constructionof Video Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Ping Yu

Using SOA Concept to Construct an e-Learning System for CollegeInformation Management Courses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Chung C. Chang and Kou-Chan Hsiao

Cryptanalysis on Sun-Yeh’s Password-Based Authentication and KeyDistribution Protocols with Perfect Forward Secrecy . . . . . . . . . . . . . . . . . . 95

Wen-Gong Shieh and Wen-Bing Horng

Page 16: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

XVIII Table of Contents – Part II

Using Genetic Algorithms for Personalized Recommendation . . . . . . . . . . 104Chein-Shung Hwang, Yi-Ching Su, and Kuo-Cheng Tseng

Intellignet Signal Processing for Human-MachineInteraction (I)

Pretreatment for Speech Machine Translation . . . . . . . . . . . . . . . . . . . . . . . 113Xiaofei Zhang, Chong Feng, and Heyan Huang

Emotion Aware Mobile Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Radoslaw Nielek and Adam Wierzbicki

Boosting-Based Ensemble Learning with Penalty Setting Profiles forAutomatic Thai Unknown Word Recognition . . . . . . . . . . . . . . . . . . . . . . . . 132

Jakkrit TeCho, Cholwich Nattee, and Thanaruk Theeramunkong

AONT Encryption Based Application Data Management in MobileRFID Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

Namje Park and Youjin Song

A Query Answering Greedy Algorithm for Selecting MaterializedViews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

T.V. Vijay Kumar and Mohammad Haider

Capturing Users’ Buying Activity at Akihabara Electric Town fromTwitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

The-Minh Nguyen, Takahiro Kawamura, Yasuyuki Tahara, andAkihiko Ohsuga

Novel Approaches to Intelligent Applications

Private Small-Cloud Computing in Connection with WinCE ThinClient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

Bao Rong Chang, Hsiu Fen Tsai, Chien-Feng Huang, andHis-Chung Huang

Honey Bee Mating Optimization Algorithm for Approximation ofDigital Curves with Line Segments and Circular Arcs . . . . . . . . . . . . . . . . . 183

Shu-Chien Huang

Harmful Adult Multimedia Contents Filtering Method in Mobile RFIDService Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Namje Park and Youngsoo Kim

Efficient GHA-Based Hardware Architecture for TextureClassification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

Shiow-Jyu Lin, Yi-Tsan Hung, and Wen-Jyi Hwang

Page 17: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part II XIX

Stability by Feedback of the Second Order Singular DistributedParameter Systems Containing Infinite Many Poles . . . . . . . . . . . . . . . . . . . 213

Feng Liu, Guodong Shi, and Jianchun Wu

Mining Generalized Association Rules with Quantitative Data underMultiple Support Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

Yeong-Chyi Lee, Tzung-Pei Hong, and Chun-Hao Chen

Intelligent Technologies for Medical RelatedApplications

Comparison of Edge Segmentation Methods to Tongue Diagnosis inTraditional Chinese Medicine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

Chieh-Hsuan Wang, Ching-Chuan Wei, and Che-Hao Li

The Grading of Prostatic Cancer in Biopsy Image Based on Two StagesApproach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

Shao-Kuo Tai, Cheng-Yi Li, Yee-Jee Jan, and Shu-Chuan Lin

Automatic Drug Image Identification System Based on Multiple ImageFeatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

Rung-Ching Chen, Cho-Tsan Pao, Ying-Hao Chen, andJeng-Chih Jian

On the Development of a Brain Simulator . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Wen-Hsien Tseng, Song-Yun Lu, and Hsing Mei

Obstructive Sleep Apnea Diagnosis from ElectroencephalographyFrequency Variation by Radial Basis Function Neural Network . . . . . . . . . 268

Chien-Chang Hsu and Jie Yu

Authentication and Protection for Medical Image . . . . . . . . . . . . . . . . . . . . 278Chih-Hung Lin, Ching-Yu Yang, and Chia-Wei Chang

Intellignet Signal Processing for Human-MachineInteraction (II)

FLC-Regulated Speaker Adaptation Mechanisms for SpeechRecognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

Ing-Jr Ding

Monitoring of the Multichannel Audio Signal . . . . . . . . . . . . . . . . . . . . . . . . 298Eugeniusz Kornatowski

Watermark Synchronization Based on Locally Most Stable FeaturePoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

Jiansheng Qian, Leida Li, and Zhaolin Lu

Page 18: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

XX Table of Contents – Part II

Audio Watermarking with HOS-Based Cepstrum Feature . . . . . . . . . . . . . 316Bo-Lin Kuo, Chih-Cheng Lo, Chi-Hua Liu, Bin-Yih Liao, andJeng-Shyang Pan

Processing Certificate of Authorization with Watermark Based on GridEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

Heng-Sheng Chen, Tsang-Yean Lee, and Huey-Ming Lee

Novel Approaches to Collective Computations andSystems

Probability Collectives Multi-Agent Systems: A Study of Robustness inSearch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334

Chien-Feng Huang and Bao Rong Chang

An Improved Ant Algorithm for Fuzzy Data Mining . . . . . . . . . . . . . . . . . . 344Min-Thai Wu, Tzung-Pei Hong, and Chung-Nan Lee

Information-Driven Collective Intelligences . . . . . . . . . . . . . . . . . . . . . . . . . . 352Francesca Arcelli Fontana, Ferrante Formato, and Remo Pareschi

Instructional Design for Remedial English e-Learning . . . . . . . . . . . . . . . . . 363Chia-ling Hsu, Ai-ling Wang, and Yuh-chang Lin

A Web-Based E-Teaching System under Low Bit-Rate Constraint . . . . . . 373Wei-Chih Hsu, Cheng-Hsiu Li, and Tzu-Hung Chuang

Using Freeware to Construct a Game-Based Learning System . . . . . . . . . . 381Yuh-Ming Cheng and Li-Hsiang Lu

Intelligent Systems

Three Kinds of Negations in Fuzzy Knowledge and Their Applicationsto Decision Making in Financial Investment . . . . . . . . . . . . . . . . . . . . . . . . . 391

Zhenghua Pan, Cen Wang, and Lijuan Zhang

Using Fuzzy Neural Network to Explore the Effect of Internet onQuality of Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402

Jui-Chen Huang

The Power Load Forecasting by Kernel PCA . . . . . . . . . . . . . . . . . . . . . . . . 411Fang-Tsung Liu, Chiung-Hsing Chen, Shang-Jen Chuang, andTing-Chia Ou

A Study of USB 3 in Perspective Aspect . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425Yeh Wei-Ming

Page 19: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part II XXI

A Study of CAPTCHA and Its Application to User Authentication . . . . 433Albert B. Jeng, Chien-Chen Tseng, Der-Feng Tseng, andJiunn-Chin Wang

TAIEX Forecasting Based on Fuzzy Time Series and the AutomaticallyGenerated Weights of Defuzzified Forecasted Fuzzy Variations ofMultiple-Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441

Shyi-Ming Chen and Huai-Ping Chu

Advanced Knowledgement Management (I)

Concept Document Repository to Support Research of the CoalIndustry Development Forecasting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451

Liudmila Takayshvili

Forecasting Coal and Rock Dynamic Disaster Based on AdaptiveNeuro-Fuzzy Inference System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

Jianying Zhang, Jian Cheng, and Leida Li

Context-Aware Workflow Management Based on Formal KnowledgeRepresentation Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470

Fu-Shiung Hsieh

A Consensus-Based Method for Fuzzy Ontology Integration . . . . . . . . . . . 480Ngoc Thanh Nguyen and Hai Bang Truong

Contextual Information Search Based on Ontological User Profile . . . . . . 490Nazim uddin Mohammed, Trong Hai Duong, and Geun Sik Jo

Rough Sets Based Association Rules Application for Knowledge-BasedSystem Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

Shu-Hsien Liao and Yin-Ju Chen

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511

Page 20: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part III

Intelligent Computing for Image Analysis (I)

Feature Analysis and Classification of Lymph Nodes . . . . . . . . . . . . . . . . . . 1Chuan-Yu Chang, Shu-Han Chang, and Shao-Jer Chen

Automatic and Accurate Image Matting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Wu-Chih Hu, Deng-Yuan Huang, Ching-Yu Yang, Jia-Jie Jhu, andCheng-Pin Lin

Improved DCT-Based Watermarking through Particle SwarmOptimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Chih-Chin Lai, Wei-Shun Wang, and Ci-Fong Jhan

A New Adaptive B-spline VFC Snake for Object Contour Extraction . . . 29Hoang-Nam Nguyen and An-Chen Lee

Algorithm for Computational Measure of Color Constancy . . . . . . . . . . . . 37S.J. Jerome Teng

Intelligent Digital Watermarking and PatternRecognition

GOP-Flexible Distributed Multiview Video Coding with Adaptive SideInformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Lili Meng, Yao Zhao, Jeng-Shyang Pan, Huihui Bai, andAnhong Wang

A Novel Embedded Coding Algorithm Based on the ReconstructedDCT Coefficients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Lin-Lin Tang, Jeng-Shyang Pan, and Zhe-Ming Lu

A Vehicle License Plate Recognition System Based on Spatial/FrequencyDomain Filtering and Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Mu-Liang Wang, Yi-Hua Liu, Bin-Yih Liao, Yi-Sin Lin, andMong-Fong Horng

Reversible Watermarking Based on Invariant Relation of ThreePixels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Shaowei Weng, Shu-Chuan Chu, Jeng-Shyang Pan, andLakhmi C. Jain

Alphanumeric Shape Recognition of Fingertip Writing Trajectory . . . . . . 81Ming-Fang Wu, Jen-Hsing Li, Ping-Tsung Wang, and Ruei-Tang Lin

Page 21: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

XXIV Table of Contents – Part III

Recognition of Tire Tread Patterns Based on Gabor Wavelets andSupport Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Deng-Yuan Huang, Wu-Chih Hu, Ying-Wei Wang,Ching-I Chen, and Chih-Hsiang Cheng

Advanced Knowledgement Management (II)

Terminological and Assertional Queries in KQL Knowledge AccessLanguage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Krzysztof Goczy�la, Piotr Piotrowski, Aleksander Waloszek,Wojciech Waloszek, and Teresa Zawadzka

Conditional Statements Grounded in Past, Present and Future . . . . . . . . . 112Grzegorz Skorupa and Rados�law Katarzyniak

Automatic Ontology Evolution in Open and Dynamic ComputingEnvironments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

Edgar Jembere, Sibusiso S. Xulu, and Matthew O. Adigun

Diagnostic Tests Based on Knowledge States . . . . . . . . . . . . . . . . . . . . . . . . 133Sylvia Encheva and Sharil Tumin

An Ontology-Supported Ubiquitous Interface Agent for CloudComputing - Example on Zigbee Technique . . . . . . . . . . . . . . . . . . . . . . . . . 142

Sheng-Yuan Yang, Dong-Liang Lee, and Chun-Liang Hsu

Semantic Optimization of Query Transformation in SemanticPeer-to-Peer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

Jason J. Jung

Intelligent Computing for Image Analysis (II)

Comparative Studies of Parallel and Vertical Stereo Vision-Based 3DPneumatic Arms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

Ray-Hwa Wong, Y. Wang, and Chao-Yi Liu

An Effective Image Enhancement Method for Electronic PortalImages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

Mao-Hsiung Hung, Shu-Chuan Chu, John F. Roddick,Jeng-Shyang Pan, and Chin-Shiuh Shieh

License Plate Tilt Correction Based on the Straight Line FittingMethod and Projection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

Kaushik Deb, Andrey Vavilin, Jung-Won Kim, and Kang-Hyun Jo

Differential Approximation of the 2-D Laplace Operator for EdgeDetection in Digital Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

Jakub P ↪eksinski and Grzegorz Miko�lajczak

Page 22: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part III XXV

ARToolkit-Based Augmented Reality System with Integrated 1-DBarcode: Combining Colorful Markers with Remote Servers of 3D Datafor Product Promotion Purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

Jong-Chih Chien, Hoang-Yang Lu, Yi-Sheng Wu, and Li-Chang Liu

Innovative Information System and Application

Design and Implementation of e-Journal Review System UsingText-Mining Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Chun-Wei Tseng, Feng-Jung Liu, Wan-Chin Lu, andShih-Hao Huang

Study on Architecture-Oriented Information Security Risk AssessmentModel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

Wei-Ming Ma

Constructing Problem-Based Learning Activities Using Self-assessmentSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

Feng-Jung Liu, Chun-Wei Tseng, and Wen-Chang Tseng

Conducted EMI Analysis of a Three-Phase PWM Rectifier . . . . . . . . . . . . 236Kexin Wei, Bin Liang, and Youjun Yue

Synchronization of Duffing-Holmes Oscillators Using Stable NeuralNetwork Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

Suwat Kuntanapreeda

Codes Base on Unambiguous Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252Ho Ngoc Vinh, Vu Thanh Nam, and Phan Trung Huy

Intelligent Computing for Networks

A Study on the Topology Control Method for Bluetooth ScatternetFormation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

Chih-Min Yu

A Study on the Global Configured Method of Blueweb RoutingProtocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

Chih-Min Yu

Energy Efficient Framework for Mobility Supported Smart IP-WSN . . . . 282Md. Motaharul Islam, Nguyen Tien Dung,Aymen Abdullah Al Saffar, Sang-Ho Na, andEui-Nam Huh

An Efficient Migration Framework for Mobile IPTV . . . . . . . . . . . . . . . . . . 292Aymen Abdullah Alsaffar, Tien-Dung Nguyen,Md. Motaharul Islam, Young-Rok Shin, andEui-Nam Huh

Page 23: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

XXVI Table of Contents – Part III

Auto-configuration Support for IPv4/IPv6 Translation in Smart SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302

Huan-wei Lin and Quincy Wu

Soft Computing to Industrial Management andApplications

Empirical Bayes Estimation of Customers’ Guarantee Time Length ofLoyalty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311

Hui-Hsin Huang

An Integrated EPQ Model for Manufacturer’s Replenishment Policieswith Two Levels of Trade Credit Policy under Supplier Credits Linkedto Ordering Quantity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

Liang-Ho Chen, Jyh-Woei Chou, and Tien-Tsai Huang

Modeling a Dynamic Design System Using the Mahalanobis TaguchiSystem—Two-Step Optimal Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

Tsung-Shin Hsu and Ching-Lien Huang

A Fuzzy Model Applied on Assessing Operating Performance ofIndustrial PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

Tien-Tsai Huang, Su-Yi Huang, and Yi-Huei Chen

Inventory Models for Deteriorating Items with Variable Selling Priceunder Stock-Dependent Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

Yen-Wen Wang, Chih-Te Yang, August Tsai, and Chiou-Ping Hsu

Innovations in Pervasive Computing

Hierarchical IP Distribution Mechanism for VANET . . . . . . . . . . . . . . . . . . 354Chiu-Ching Tuan, Jia-Ming Zhang, and Shu-Jun Chao

VisMusic: Music Visualization with Interactive Browsing . . . . . . . . . . . . . . 367Jia-Lien Hsu and Wei-Hsien Chien

The Study of Plagiarism Detection for Object-Oriented ProgrammingLanguage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376

Jong-Yih Kuo and Wei-Ting Wang

A Distributed Sleep Scheduling Algorithm with Range Adjustment forWireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Kei-Chen Tung, Jonathan Chun-Hsien Lu, and Hsin-Hung Lin

An Innovative Routing Algorithm with Reinforcement Learning andPattern Tree Adjustment for Wireless Sensor Networks . . . . . . . . . . . . . . . 398

Chia-Yu Fan, Chien-Chang Hsu, and Wei-Yi Wang

Page 24: Lecture Notes inArtificial Intelligence 6421978-3-642-16693-8/1.pdf · Lecture Notes inArtificial Intelligence 6421 Edited by R. Goebel, ... • Agent Theory and Application

Table of Contents – Part III XXVII

Biological Computing

Swarm Intelligence for Cardinality-Constrained Portfolio Problems . . . . . 406Guang-Feng Deng and Woo-Tsong Lin

Immune Memory Mechanism Based on Cyclic Idiotypic Network . . . . . . . 416Chung-Ming Ou and C.R. Ou

Sensor Placement in Water Networks Using a Population-Based AntColony Optimization Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426

Konrad Diwold, Thomas Ruhnke, and Martin Middendorf

The Codebook Design of Image Vector Quantization Based on theFirefly Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438

Ming-Huwi Horng and Ting-Wei Jiang

Confronting Two-Pair Primer Design Using Particle SwarmOptimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448

Cheng-Hong Yang, Yu-Huei Cheng, and Li-Yeh Chuang

Strategic Health Information Management and Forecast:The Birdwatching Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457

Arash Shaban-Nejad and Volker Haarslev

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469