PROGRAM
6th
WSEAS International Conference on
APPLIED COMPUTER SCIENCE
(ACOS '07)
Hangzhou, China, April 15-17, 2007
Sunday, April 15, 2007
PLENARY LECTURE 1
Intelligent
Recurrent Cerebellar Model Articulation
Controller Design
Professor Chih-Min Lin
Department of Electrical
Engineering
Yuan Ze University, Taiwan
Abstract: Based on biological prototype of human brain and improved understanding of the functionality of the neurons and the pattern of their interconnections in the brain, many mathematical models of neural networks have been proposed to perform useful computational functions in different applications. Among these NN models, a theoretical model used to explain the information-processing characteristics of the cerebellum was developed independently by Marr (1969) and Albus (1971). CMAC, first proposed by Albus, signifies cerebellar model articulation controller. CMAC is a learning structure that imitates the organization and functionality of the cerebellum of the human brain. That model revealed the structure and functionality of the various cells and fibers in the cerebellum.
The core of CMAC is an associative memory which has the ability to realize complex nonlinear functions. CMAC takes advantage of the input-redundancy by using distributed storage and can learn nonlinear functions extremely quickly due to the local adjustment of its weights. CMAC has been applied in the closed-loop control of complex dynamical systems for the reason of good generalization capability and fast learning property.
PLENARY LECTURE 2
Boolean Functions and Contemporary Cryptography
Professor Oleksander Markovskyy
National Technical University of Ukraine
(Polytechnic Institute of Kiev)
Department of Computer Engineering
Abstract: The one way (non invertible) transformations
constitute the basis of the contemporary cryptography. A substantial part of the
contemporary cryptographic algorithms is based on the one way transformations,
which use the Boolean functions. In particular, the cryptographic properties of
two most important classes of the algorithms (block cipher and stream ciphers
for symmetrical coding) are based on the Boolean transformations.
In this Plenary Lecture, the contemporary state of the Boolean functions theory
will be presented in details including specific cryptographic tasks for
implementation. The basic properties of the Boolean functions, which are
important for the cryptographic applications, and also the contemporary state of
the problem for obtaining the Boolean functions, which possess such properties,
will be mentioned, analyzed and discussed. Considerable attention will be given
to the theoretical issues of the development of the Boolean functions for
developing and implementing effective cryptographic systems.
SESSION: Fuzzy Theory and Applications
Chair: Hsien-Da Lee, Tien-Chin Wang
A Fuzzy TOPSIS Approach with Subjective Weights and Objective Weights |
Tien-Chin Wang, Chuan-Cheng Wu, Hsien-Da Lee |
|
Applying Fuzzy Theory to the Management Competency Assessment for Middle Managers |
Yu-Chen Chiang, Tien-Chin Wang |
|
Fuzzy correlation rules mining |
Nancy P. Lin, Hao-En Chueh |
|
Multi-criteria decision making with incomplete linguistic preference relations |
Tien-Chin Wang, Shu-Chen Hsu |
|
Fuzzy Neural Networks for Channel Management in Heterogeneous Wireless Cellular Networks |
Yao-Tien Wang, Ay-Hwa Andy Liou, Yu-Cheng Lin, Yu-Luen Chen |
|
A fuzzy constraint-based agent negotiation with opponent learning |
Ting-Jung Yu, K. Robert Lai, Menq-Wen Lin, Bo-Rue Kao |
|
Scheduling via Agent Negotiation : A Fuzzy Constraint-based Approach |
K. Robert Lai, Menq-Wen Lin, Bo-Rue Kao |
|
Fuzzy Evaluation for the Rate of Aggregative Risk in Software Development |
Lily Lin, Huey-Ming Lee, Shu-Yen Lee, Tsung-Yen Lee |
|
Reducing Flare Emissions from Chemical Plants and Refineries Through the Application of Fuzzy Control System | A. Alizadeh-Attar, H. R. Ghoohestani, I. Nasr Isfahani |
SESSION: Web based Applications
Chair: Yu-Lung Wu, Da-Zhen Wang
Critical Success Factors for Online C2C Auction Websites–A Consumer' s Perspective |
Yu-Lung Wu, Yu-Hui Tao, Tien-Chin Wang |
|
Design and Implementation of a Web-Based Flood Simulation and Decision Support System |
Xiaofeng Zhao, Xin Zhang, Tianhe Chi, Huabin Chen, Yunhai Miao |
|
On line web course for Engineering |
Laura Grindei, Aurel Vlaicu, Bogdan Orza, Vasile Topa, Calin Munteanu |
|
An Automatic Answer Reply to Customers’ E-mail Queries Model with Chinese Text Mining Approach |
Ju-Yu Huang, Huey-Ming Lee, Shu-Yen Lee |
|
A Web Based Multimedia Collaboration System with a Session and Error Management Agent running on Home Network Environment |
EungNam Ko |
|
VHCS: A web-based e-health system for alopecia diagnosis |
Siti Soraya Abdul Rahman, Fazidah Othman, Teo Wai Sie |
|
Automatic Tag Recommendation for the Web 2.0 Blogosphere Using Collaborative Tagging and Hybrid ANN Semantic Structures |
Sigma On Kee Lee, Andy Hon Wai Chun |
SESSION: Quality of Service in Applied Computer Science
Chair: Sheng-Yuan Yang, Woojin Lee
Design and Development of an automated information gathering and issue system based on a small and medium-sized website |
Zhao Ming, Zhang XiaoShuan, Ma Yong-ling, Zhu Zi-li, Zhao Xiao-jun |
|
An Ontological Template-supported Interface Agent for FAQ Services |
Sheng-Yuan Yang |
|
Bandwidth Reservation Based Qos Model for Multi Hop Ad Hoc Networks |
Muhammed Sulleman Memon, Manzoor Hashmani, Niaz Ahmed Memon |
|
Traffic load aware data control and distributed QoS protection for ieee 802.11e wireless lans |
Jungho Yoo, Seungbeom Lee and Sin-chong Park |
|
Enhanced Compositional Safety Analysis for Distributed Embedded Systems using LTS Equivalence |
Hui Guo, Youngsul Shin, Woo Jin Lee |
|
Opportunistic Scheduling in IEEE 802.11n WLAN |
Youngju Do, Seungbeom Lee, Sin-Chong Park |
|
Demand Forecasting on The Mobile Communication Service Market Using Diffusion Models and Growth Curve Models: A Case Study |
Sangmun Shin, Yonghee Lee, Kyungjin Park,Yongsun Choi, Charles Kim |
|
Hardware Implementation of Configurable Bandwidth Estimation Module in High Speed Networks |
Yang-Keun Ahn, Young-Choong Park, Kwang-Soon Choi, Kwang-Mo Jung, Seong-Dong Kim |
SESSION: Clustering and Classification Algorithms I
Chair: Tung-Shou Chen, Wang Da-Zhen
Referential Hierarchical Clustering Algorithm Based upon Principal Component Analysis and Genetic Algorithm |
Jui-Shin Lin, Shiaw-Wen Tien, Tung-Shou Chen, Yung-Hung Kao, Chih-Chiang Lin, Yung-Hsing Chiu |
|
A URL Scheduling Algorithm in Parallel Crawler System |
Wang Dazhen, Wan Fang, Peng Yan |
|
A Form Coalition Algorithm in Multi-Agent System |
Liu Xing , Wang Da-Zhen |
|
A New Parameter-Free Classification Algorithm Based on Nearest Neighbor Rule and K-means for Mobile Devices |
Tung-Shou Chen, Chih-Chiang Lin, Yung-Hsing Chiu |
|
An adaptable deflect and conquer clustering algorithm |
Nancy P. Lin, Chung-I Chang, Chao-Lung Pan |
|
Adaptive Packet Selection Algorithm For Bluetooth Data Packets |
Radosveta Sokullu, Engin Karatepe |
Monday, April 16, 2007
PLENARY LECTURE 3
Intentional 3D Vision in Robotics
Professor S. Y. Chen
University of Hamburg
Zhejiang University of Technology
CHINA
Abstract: The 3D model of an object or environment is very important to many practical applications, e.g. hypermedia techniques, interactive handling/working, virtualized reality, interactive exploration, robot autonomous applications, etc. An efficient way to obtain such models is using 3D vision. However, since no prior information about the targets is available before the vision task is taking place, it is desired that the robot is capable to purposively decide how to finish the modeling task without human interference. The project investigates the issue of intentional perception planning in which there are three related problems to be tackled, i.e. perception planning, purposive sensor configuration, and 3D model construction. They are considered in an autonomous vision system which employs an observing strategy for target modeling. The research develops methods to actively decide the viewpoints and sensor configuration to observe specific aspects of the target and estimates the modeling state or completeness. The system analyzes the obtained information and performs the perception strategy that automatically generates a multi-view plan. The research would lead to fully automate the modeling process and have the mechanism to autonomously move and change sensing parameters for complete 3D data recovery.
SPECIAL SESSION: Mobile Learning
Chair: Rong-Jyue Fang
Learning Experience is Important for the Attitude of Using Statistical Software |
Hsieh-Hua Yang, Jui-Chen Yu, Hung-Jen Yang, Wen-Hui Han, Yu-Jun Li |
|
Social Interactions of the Collaborative Problem Solving in a Mobile Learning Environment |
Cheng-Chung Wang, Rong-Jyue Fang, Ken-I Su, Sing-Jan Lu |
|
A Study for the Factors Affecting E-learning Cognition and Intention: Using a Case Institute of Technology as an Example |
Kuo-Hung Tseng, Shue-Tien Juang, Kuo-Tung Hua, Sheng-Jen Yang, Yun-Chun Sun |
|
Mobile Telecommunications in Mozambique: The Interconnection Gaffe |
Kuo-Hung Tseng, Dino Foi, Mark Findler |
|
The knowledge-based mobile learning system applied in printing network instructive course for science museum |
Fang Rong-Jyue, Fan Cheng-Wei, Huang Jun-Fu, WangYu-Hung |
|
Overview of M-Learning and Applications of Devices in Taiwan |
Rong-Jyue Fang, Yueh- Kuei Huang, Hsin-Chang Lu |
|
An Adaptive E-Learning System Based on Intelligent Agents |
Yi-Hsing Chang, Tsung-Yi Lu, Rong-Jyue Fang |
|
Examining Digital Attitudes by Using M-Learning Tool |
Rong-Jyue Fang, Hung-Jen Yang, Hua-Lin Tsai, Pofen Wang, Chungping Lee |
SESSION: Clustering and Classification Algorithms II
Chair: Nelson Marcos, Huey-Ming Lee
Simulation for coral reef environment |
Nelson Marcos, Rex Raymond Flores, Michel Onasis Ogbinar, John Richard Sera Jose, Juan Jason Taborda |
|
Study on Supply Chain Optimization Scheduling of Networked Manufacturing |
Gu Hong, Li Chuan, Lu Zhang, Zhang Xianming |
|
Monte Carlo Simulation of Solar Radiation in Maize Canopies and its Visualization |
Zhang Yuan, Lao Cai-lian, Lee Bao-Guo, Chen Yan, Guo Yan, Wang Xi-ping, Ma Yun-tao, Zhao Ming |
|
Fast accumulation lattice algorithm for mining sequential patterns |
Nancy P. Lin, Wei-Hua Hao, Hung-Jen Chen |
|
Authentication Algorithm Based on Grid Environment |
Huey-Ming Lee, Tsang-Yean Lee, Cheng-Sheng Chen, Jin-Shieh Su |
|
Learning vector quantization algorithm as classifier for Arabic handwritten characters recognition |
Mohamed Ali, Kasmiran Bin Jumari, Salina A, Samad |
SPECIAL SESSION: Mobile Learning (continued)
Chair: Rong-Jyue Fang
A Study of Transnational Internet d-Learning for Primary and Middle School-Aviation Technology Education |
Rong-Jyue Fang, Hung -Jen Yang, Hua- Lin Tsai, ChiI -Jen Lee, Yong-He Luo, Chien-Chung Lin |
|
Develop a mobile learning model for museums |
Rong-Jyue Fang, Yu-Hung Wang, Mei-Chen Chang, Cheng-Wei Fan |
|
Research on the Relationship between Junior High School Students' Adaptation and Career Development |
Li-Jung Chen, Chi-Kao Chang, Chin-Mou Cheng |
|
Collaborative Online D-Learning Experience in Taiwan |
Rong-Jyue Fang, Hung-Jen Yang, Jia-Rong Wen, Hua-Lin Tsai, Chi-Jen Lee, Yong-He Luo |
|
Application of Global Positioning System (GPS) in Earth Sciences teaching |
Rong-Jyue Fang, Ken-I Su, Hsin-Chang Lu, Cheng-Chung Wang, Chin-Chih Lin |
|
Knowledge Sharing of Health Technology for Students in Universities of Technology |
Chin-Mou Cheng, Li-Jung Chen, Chi-Kao Chang |
|
The impact of PACS (Picture Archiving and Communication System) for M-learning on the medical affairs |
Tien-Sheng Tsai,Rong-Jyue Fang, Tzu-Hui Huang,Shang-Ming Su, King-Fair Hall |
|
A Study of the Construction of a Mobile Learning Oriented Mathematics Learning Activity |
Hsin-Chang Lu, Jen-Chin Lin, Chien-Chung Lin, Ken-I Su |
|
A Study of Web-Based Employee Assistance Programs in the Teaching Hospital |
Rong-Jyue Fang, Tien-Sheng Tsai, Tzu-Hui Huang,Shang-Ming Su, King-Fair Hall |
SESSION: Latest Advances on E-Learning
Chair: Yongsun Choi, Zhimei Wang
A Knowledge Acquisition and Management System for Fault Diagnosis and Maintenance of Equipments |
Yulong Jin, Yongsun Choi, Yan Xiong, Kwanhee Han, Sangmoon Shin, Younghee Lee |
|
An Exploration of the Relationship between Organizational Learning and Software Development Process Maturity |
Chun-Hui Wu |
|
Facilitate collaborative recommendation based on community knowledge awareness tool |
Peng Han, Fan Yang |
|
Enable Collaborative Learning: An Improved E-Learning Social Network Exploiting Approach |
Zhi-Mei Wang, Ling-Ning Li |
|
A Hierarchy of Imperative Languages for the Feasible Classes DTIMEF(nk) and for the Superexponential Classes DTIMEF(kn) |
Salvatore Caporaso, Emanuele Covino, Paolo Gissi, Giovanni Pani, Vittoria Cozza |
|
An Evaluation of the Implementation of Instructional Design Skill Standards for E-Learning in Taiwan |
Ming-Puu Chen |
|
CmL-plus: A new vision for an m-learning platform in the Romanian DE system |
Constantin Hutanu, Ciprian Turcu, Mircea Risteiu, Aurel Vlaicu |
|
Application of Agent Negotiation in Supporting Constructive Learning |
K. Robert Lai, Chung Hsien Lan, Bo-Rue Kao |
SPECIAL SESSION: Mobile Learning (continued)
Chair: Rong-Jyue Fang
Attitude, Subjective Norm and Intention toward Using the Statistical Software |
Hsieh-Hua Yang, Jui-Chen Yu, Hung-Jen Yang, Hsin-Yih Tsai |
|
International Cooperative Learning via the Internet - The Case Study Based on APEC ICT Model School |
Rong-Jyue Fang, Yao-Ming Chu, Howard Lo, Yu-Chen Weng, Hua Lin Tsai , Chi Jen Lee |
|
Mobile Learning System Using Multi-dimension Data Warehuse Concept-Based on Botanical Data |
Rong-Jyue Fang, Howard Lo, Yu-Chen Weng, Hua Lin Tsai |
|
Mobile Learning Practice - A Preliminary Study on a Mobile System of Customs Cargo Inspection |
Rong-Jyue Fang, Jung-Tsung Yang, Li-Ling Hsu, Chin-Chih Lin, Ming-Zong Huang |
|
The effects and limits of teacher-parents communication by Mobile Device-The View of Teachers |
Rong-Jyue Fang, Wen-Jiuh Chiung, Sheng-Jen Yang, Hua- Lin Tsai, Kuo-Cheng Wu, Shue-Tien Juang |
|
A Comparative Study of the Need Hierarchy Between Real and Virtual Environments |
Wen-Jiuh Chiang, Chih-Chia Chen, Chia-Chien Teng |
|
Establish “Action-Oriented” knowledge management system to improve the efficiency of higher education administration |
Rong-Jyue Fang, Hsin-Chang Lu, Yueh- Kuei Huang |
|
An Evaluation of Learners' Satisfaction toward Mobile Learning |
Ming-Puu Chen, Jung-Chuan Yen |
|
The Status Quo and Perspectives of Mobile Learning in Taiwan |
Shi-Jer Lou, Yao-Sheng Shu, Mei-Huang Huang, Ru-Chu Shih, Yi-Hui Lui |
SESSION: Computer Architecture and Hardware Implementation
Chair: Nam-Kyu Park, Nakhoon Baek
TriBA – A Novel Scalable Architecture for High performance Parallel Computing Applications |
Haroon-Ur-Rashid, Shi Feng, Ji Weixing, Qiao Baojun |
|
A study on s-ins for small and medium-sized ships |
Namkyu Park, Juyoung Kim, Woochul Kim |
|
Mouse Manipulation Through Switch-Control Input Device for People with Disabilities |
Ching-Tien Shih, Ching-Hsiang Shih, Ching-Hsing Luo |
|
Logic Circuit Synthesis Preserving Correctness using ET Rules |
Hiroshi Yoshikawa, Kiyoshi Akama, Hiroshi Mabuchi |
|
The Stray Loss on Magnetic Shielding in Power Transformers |
Sumei Yang, Zhiguang Cheng, Qingxin Yang, Xiaoquan Zhu |
|
A Physically based Model for Chinese Tops |
Namkyung Lee, Byung Soo Song, Eun Ju Kim, Myoung Lan Jo, Nakhoon Baek, Kwan Woo Ryu |
|
Implementing Matrix Multiplications on the Multi-Core CPU Architectures |
Nakhoon Baek, Hwanyong Lee |
|
A Performance Analysis for Microprocessor Architectures |
Nakhoon Baek, Hwanyong Lee |
Tuesday, April 17, 2007
SESSION: Image Processing Software
Chair: Athanasios Hatzigaidas, Mahmoud Hassan
Fast Image Restoration using the Multi-Layer Best Neighborhood Matching Approach |
Ching-Tang Hsieh, Yen-Liang Chen, Chih-Hsu Hsu |
|
A Novel Bacteria Classification Scheme Based On Microscopic Image Analysis |
Li Xiaojuan, Chen Cunshe, Yv Ziyi |
|
Introducing Automated Melanoma Detection in a Topic Map Based Image Retrieval System |
Anastasia Papastergiou, Athanasios Hatzigaidas, Zaharias Zaharis, George Tryfon, Konstantinos Moustakas, Dimosthenis Ioannidis |
|
Attacks analysis for keyed blind multiresolution watermarking algorithm |
Mahmoud Hassan, Sarah Alkuhlani, Laith Alsmadi, Wasan Talhouni |
|
Enhancing the Human-Computer Interaction on Camera-Equipped Mobile Phones |
Jun Li, Zheng Tang |
|
Proposal of Search Method Compressed the One-Way Branch based on the Double-Array Structure |
Yasumasa Nakamura, Hisatoshi Mochizuki |
SESSION: Software Applications
Chair: Yongsun Choi, Che-Chern Lin
Development of a Groundwater Level Forecasting System for the Optimal Operation of a Groundwater Dam |
Yongsun Choi, Gwuibeom Bae, Sangmoon Shin |
|
Analysis of NBA Player Positions Using ISODATA: A Case Study |
Che-Chern Lin, Jhih-Yang Chen, Yi-Ting Chou, Yun-Hao Huang, Yun-Yi Tong, Howard Lo |
|
A Hybrid Collaborative Filtering Recommender System Using a New Similarity Measure |
Hyung Jun Ahn |
|
Priority strategy of software fault localization |
Sun Jirong, Li Zhishu, Ni Jiancheng, Yin Feng |
|
Security Measures for the Convergence of Voice and Data in the Broadband Convergence Network |
Donghoon Shin, Hoseong Kim, Gangshin Lee |
|
An Application of Algebraic Curves for Key Exchange on Mobile Grid Computing | I. Jiron, I. Derpich, I. Soto, R. Carrasco |
SESSION: Advances on Applied Computer Science
Chair: Chien-Min Ou, Toufik Taibi
A group key distribution protocol for secure group communications |
Wan Fang, Wang Dazhen |
|
Using RBF reduced by QLP decomposition for Probability Density Estimation |
Edwirde Luiz Silva |
|
Novel FPGA-based signature match circuit for efficient network intrusion detection |
Chien-Min Ou |
|
Automatic Proof of Refinement among Design Patterns using the TLC Model Checker |
Toufik Taibi and Angel Herranz |
|
Design and evaluation of a new multicast protocol in micro-mobility environments |
Ho-Seok Kang, Young-Chul Shim |
|
A Strategy for Checking Timing Constraint Violation in Wireless Sensor Networks |
Jaecheol Kim, Juil Kim, Woojin Lee, Kiwon Chong |
|
Predictive factors of Glycemic Control: A Comparison of Decision Tree and Neural Networks |
Chun-Liang Lai, Pi-Shan Hsu, Show-Wei Chien, Chung-Liang Lai, Kwoting Fang |
|
Dynamic resources assignment based on real-time positioning in container terminal |
N. K.Park, J. Y.Kim, W. Y.Choi, Tian Ziman, Lubo, B. Dagovic |
|
Compositional Verification of Timing Constraints for Embedded Real-Time Systems |
Guo Hui, Woojin Lee |
|
Transactional Model of a Company based on the Hub-Spoke and LDPC/MIMO Models | J. P. Torres, I. Soto, R. Carrasco | |
Time objective functions for systolic arrays | Dragan M. Randjelovic, Ratomirka M. Randjelovic | 567-109 |
Classes of block designs and theirs application in the analysis of agricultural experiment organization | Dragan Randjelovic, Cemal Dolicanin, Milan Randjelovic | 567-111 |
SESSION: Case Studies on Information Systems
Chair: Jun Wang, Ting-Sheng Weng
Data analysis of Shenzhen and Shanghai land indices |
Meifeng Ji and Jun Wang |
|
Study on the waiting times in Chinese stock markets |
Qide Li and Jun Wang |
|
A Study on Information Wrapper Protection Profile |
Kwo-Jean Farn, Shu-Kuo Lin, Jiann-Ming Hwang |
|
The study of e-Learning for geographic information curriculum in higher education |
Ting-Sheng Weng, Hung Chieh Lin |
|
An Energy-Efficiency MAC-Layer Relay Method for IEEE 802.11 Infrastructure Wireless LANs |
Jain-Shing Liu |
|
Study on Applying ISO/DIS 27799 to Medical Industry's ISMS |
Kwo-Jean Farn, Jiann-Ming Hwang, Shu-Kuo Lin |
|
Automatic Rule-based Assessment of eGovernment Application Forms |
Andy Hon Wai Chun |
|
A Study on Priority Selection for Information System Project Management Model |
Taewon Kyung, Sangkuk Kim |
SESSION: Data Mining
Chair: Sangmun Shin, Ting-Sheng Weng
A Surrogate Variable-Based Data Mining Method Using CFS and RSM |
Le Yang, Sangmun Shin, Yongsun Choi, Myeonggil Choi, Younghee Lee |
|
Mining Negative Sequential Patterns |
Nancy P. Lin, Hung-Jen Chen, Wei-Hua Hao |
|
Spatio Temporal Hazard Mitigation Modeling using GIS and Geospatial Data mining Techniques |
Abdul Fattah Chandio, Liu Yu Shu, Cheng Cheng, Attaullah Khawaja |