default search action
ISDA 2008: Kaohsiung, Taiwan - Volume 2
- Jeng-Shyang Pan, Ajith Abraham, Chin-Chen Chang:
Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes. IEEE Computer Society 2008, ISBN 978-0-7695-3382-7
Special Session on New Technologies and Their Applications in Image Engineering 1
- Ning Zhu, Guiguang Ding, Jianmin Wang:
A Novel Digital Watermarking Method for New Viewpoint Video Based on Depth Map. 3-7 - Chun-li Dong, Yuning Dong:
A Novel Algorithm for Object Tracking with Particle Filtering and GVF-Snake. 8-13 - Jun Ma, Guanzhong Dai:
Anomaly Detection in Computer Networks Using Dissimilarity-Based One-Class Classifiers. 14-18 - Baolong Guo, Lei-Da Li, Jeng-Shyang Pan, Liu Yang, Xiaoyue Wu:
Robust Image Watermarking Using Mean Quantization in DTCWT Domain. 19-22 - Chun-Lung Huang:
Design and Simulation of a Sliding Mode Controller for Reducing Radial Vibration of an Eccentric Rotor Equipped with an Automatic Dynamic Balancer. 23-28 - Siti Nurmaini, Siti Zaiton Mohd Hashim:
An Embedded Fuzzy Type-2 Controller Based Sensor Behavior for Mobile Robot. 29-34 - Yongping Du, Ming He:
Pattern Optimization and the Application in Question Answering. 35-39 - Lei Gao, Chao Li, Yi Guo, Zhang Xiong:
Automatic Learning of Semantic Region Models for Event Recognition. 40-44 - Huang-Cheng Kuo, Ping-Lin Ong, Jia-Jie Li, Jen-Peng Huang:
Predicting Protein-Protein Recognition Using Feature Vector. 45-50 - Kwang-Baek Kim, Am-suk Oh, Young Woon Woo:
PCA-Based Face Verification and Passport Code Recognition Using Improved FKCN Algorithm. 51-57
Software Agent Technology and Applications
- Jong-Shin Chen, Hong-Da Shi, Ching-Mu Chen, Zeng-Wen Hong, Pei-Lin Zhong:
An Efficient Forward and Backward Fault-Tolerant Mobile Agent System. 61-66 - Tai-Hong Chen, Jim-Min Lin, Kai-Yi Chin, Zeng-Wei Hong:
Design of an IDML-Based Interactive Agent Drama Authoring Tool. 67-72 - Feng-Chao Yang, Jin-Ling Liao, Cheng-Li Chang:
The Study of Backup Mechanism for Web Services Based on MAS and Topic Maps. 73-78 - Jong Yih Kuo, Frank Hsieh, Ho Chin Lin:
Applying Agent Composition for Development of Service-Oriented Program Language. 79-84 - Sheng-Hui Hsu, Yueh-Min Huang:
Students. 85-89 - Rozaida Ghazali, Abir Jaafar Hussain, M. N. Mohd. Salleh:
Application of Polynomial Neural Networks to Exchange Rate Forecasting. 90-95 - Hui Zhang, Yanan Wang, Xiamu Niu:
A Cyclic Coding Based Perceptual Hashing Algorithm. 96-99 - Chien-Jung Ho, Wen-Hao Hsieh, Gwo-Jia Jong:
Multi-user Signals Combined with Quadratic Residue Code for Monitoring System. 100-103 - Koji Okuhara, Kuang Yih Yeh, Hao-Ching Hsia, Hiroaki Ishii:
Data Mining of Geographical Accessibility for Tourism in Regional Area. 104-109 - Francisco Álvarez, Antonio Vaquero, Fernando Sáenz-Pérez:
Some Software Engineering and Knowledge Representation Principles for the Design and Construction of Ontology-Based Linguistic Resources. 110-115
Intelligent Multimedia Retrieval and Watermarking
- Rui-Xin Zhan, Ka Yin Chau, Zhe-Ming Lu, Bei-Bei Liu, Andrew W. H. Ip:
Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain. 119-122 - Ting-Xian Zhang, Wei-Min Zheng, Zhe-Ming Lu, Bei-Bei Liu:
Comments on "A Semi-blind Digital Watermarking Scheme Based on Singular Value Decomposition". 123-126 - Chiang-Lung Liu:
A Novel Image Authentication and Recovery Method for Applications of Image Sharing. 127-132 - Alban Mouton, Pierre-Francois Marteau:
Population Control for Multi-agent Based Topical Crawlers. 133-137 - Václav Snásel, Jiri Dvorský, Anton Timofieiev, Jaroslav Pokorný:
H-Index Analysis of Enron Corpus. 138-144 - Zhi-Sam Lee, Mohd Aizaini Maarof, Ali Selamat, Siti Mariyam Hj. Shamsuddin:
Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification. 145-150 - Ruo-Yu Yan, Qing-Hua Zheng:
Multi-scale Entropy Based Traffic Analysis and Anomaly Detection. 151-157 - Yue-Shan Chang, Pei-Chun Shih, Yu-Cheng Luo:
Adaptive Knowledge Retrieving on Mobile Grid. 158-163 - Feng-Tse Lin:
Fuzzy Crashing Problem on Project Management Based on Confidence-Interval Estimates. 164-169 - Václav Snásel, Jan Platos, Pavel Krömer:
On Genetic Algorithms for Boolean Matrix Factorization. 170-175
Novel Computation on Networking and Multimedia Communication
- Yuan-Fei Cheng:
A Scanning Method for Dotted Data Matrix. 179-183 - Bih-Yaw Shih, Jyun-Ying Tseng:
The Development of Enhanced Hash Mechanism for Improving Performance of IEEE 802.15.4. 184-189 - Shu-Chien Huang, Chu-Fu Wang:
The Image Watermarking Technique Using Visual Secret Sharing Strategy. 190-195 - Chu-Fu Wang, Shu-Chien Huang:
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks. 196-201 - Yingxu Lai:
Unknown Malicious Executable Defection. 202-207 - Shanping Qiao, Shixian Wang, Yongzheng Lin, Ling Zhao:
A Distributed Algorithm for 0-1 Knapsack Problem Based on Mobile Agent. 208-212 - Lufeng Mo, Yueyun Shen:
A Novel Algorithm for Weighted-Fair Rate Control in Wireless Sensor Network. 213-216 - Siti Dianah Abdul Bujang, Ali Selamat:
Verification of Mobile SMS Application with Model Checking Agent. 217-222 - Wen-Ping Chen, Shih-Wei Kau, Bin-Yih Liao, Wen-Shyang Hwang, Wen-Tsung Hu:
A Sort-Based DBA Algorithm for EPON System. 223-228 - Haiyang Fu, Xiaochun Qu, Youcai Han:
The Reform Schema and Usability of TD-SCDMA Smart Antenna. 229-234
Special Session on New Technologies and Their Applications in Image Engineering 2
- Zhan-Long Yang, Baolong Guo:
Image Registration Using Rotation Normalized Feature Points. 237-241 - Jie Jiang, Baolong Guo, Wei Mo:
Efficient Intra Refresh Using Motion Affected Region Tracking for Surveillance Video over Error Prone Networks. 242-246 - Yunyi Yan, Baolong Guo:
Convergence Analysis of PSO Inspired by r- and K-Selection. 247-252 - Kaushik Suresh, Sayan Ghosh, Debarati Kundu, Abhirup Sen, Swagatam Das, Ajith Abraham:
Inertia-Adaptive Particle Swarm Optimizer for Improved Global Search. 253-258 - Ging-Long Lin, Lyan-Ywan Lu:
Fuzzy Logic Controllers for a Seismic Isolation System with Variable Friction Damper. 259-264 - Tsung-Ying Sun, Chan-Cheng Liu, Yu-Peng Jheng, Jyun-Hong Jheng, Shang-Jeng Tsai, Sheng-Ta Hsieh:
Blind Image Deconvolution via Particle Swarm Optimization with Entropy Evaluation. 265-270 - Hui-Huang Hsu, Cheng-Wei Hsieh, Ming-Da Lu:
A Hybrid Feature Selection Mechanism. 271-276 - Qi Han, Meihui Zhang, Chen Song, Zhifang Wang, Xiamu Niu:
A Face Image Database for Evaluating Out-of-Focus Blur. 277-282 - Yao-Hong Tsai, Yen-Han Lee:
Wavelet-Based Image Fusion by Adaptive Decomposition. 283-287 - Junzo Watada, Rohani Binti Abu Bakar:
DNA Computing and Its Applications. 288-294
Applications of Artificial Intelligence and Soft-Computing 1
- Chih-Chin Lai, Pei-Fen Lee, Pei-Yun Hsieh:
Unsupervised Clustering by Means of Hierarchical Differential Evolution Algorithm. 297-301 - Wei-Han Su, Chih-Hung Wu:
Support Vector Regression for GDOP. 302-306 - Cheng-Jian Lin, Chen-Hsiang Chu, Chi-Yung Lee, Ya-Tzu Huang:
2D/3D Face Recognition Using Neural Networks Based on Hybrid Taguchi-Particle Swarm Optimization. 307-312 - Shian-Tang Tzeng:
Design of Self-Learning Fuzzy System by GA Approach. 313-318 - Djasli Djamarus, Ku Ruhana Ku-Mahamud:
Ant System Algorithm with Negative Pheromone for Course Scheduling Problem. 319-324 - Cheng-Lung Sung, Hsu-Chun Yen, Wen-Lian Hsu:
Compute the Term Contributed Frequency. 325-328 - Chunqing Huang, Xiafu Peng:
Output-Feedback PID Controllers for Robot Manipulators with Jacobian Uncertainty. 329-334 - Sheng Liu, Donghao Xu:
Intelligent Control for Principal Axis of Variable Vector Propeller of Submersible Vehicle. 335-339 - Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
A Novel Template Protection Algorithm for Iris Recognition. 340-345 - Chia-Han Yang, Ming-Ying Wu, Chien-Min Lin, Don-Lin Yang:
Implementation of Wiki-Based Knowledge Management Systems for Small Research Groups. 346-349
Computational Intelligence and Security 1
- Qingcai Chen, Dandan Wang, Xiaolong Wang:
A Stressed Syllable Labeling Approach Using Fractal Dimensions. 353-357 - Chaowen Chang, Rongyu He, Hui Xie, Guoyu Xu:
A High Efficiency Protocol for Reporting Integrity Measurements. 358-362 - Yisu Xu, Xuan Wang, Buzhou Tang, Xiaolong Wang:
Chinese Unknown Word Recognition Using Improved Conditional Random Fields. 363-367 - Yong Zhang, Yan-jun Yang, Jian-peng Xu, He Wang:
A Modified Cluster-Based Routing Protocol with Cloud Model. 368-372 - Mazidah Puteh, Khairuddin Omar, Abdul Razak Hamdan, Azuraliza Abu Bakar:
Immune Network for Classifying Heterogeneous Data. 373-377 - Linsheng Li, Jianning Li:
Chattering-Free Fuzzy Sliding Mode Control Strategy for Uncertain Discrete Systems with Input Saturation. 378-382 - Pavel Krömer, Václav Snásel, Jan Platos:
Comparing Query Similarity Measures for Collaborative Web Search. 383-388 - Vinícius Rodrigues de Uzêda, Thiago Alexandre Salgueiro Pardo, Maria das Graças Volpe Nunes:
Evaluation of Automatic Text Summarization Methods Based on Rhetorical Structure Theory. 389-394 - Andreea Vescan, Crina Grosan:
Two Evolutionary Multiobjective Approaches for the Component Selection Problem. 395-400 - Alin Mihaila, Cristina Mihaila:
Uniform Parallel Machines Scheduling Using a Genetic Algorithm. 401-406
Intelligent Database Systems
- Sheng-Yuan Yang, Chun-Liang Hsu:
Ontology-Supported Focused-Crawler for Specified Scholar. 409-414 - Shin-Jye Lee, Xiao-Jun Zeng:
A Modular Method for Estimating Null Values in Relational Database Systems. 415-419 - Zdenek Mazal, Radek Kocí, Vladimír Janousek, Frantisek Zboril:
PNagent: A Framework for Modelling BDI Agents Using Object Oriented Petri Nets. 420-425 - H. F. Lai, S. G. Chen, W.-H. Jeng:
Deductive E-Bargaining System. 426-431 - Roselina Sallehuddin, Siti Mariyam Hj. Shamsuddin, Siti Zaiton Mohd Hashim:
Application of Grey Relational Analysis for Multivariate Time Series. 432-437 - Shuiling Zeng, Weihong Xu, Jingyu Yang:
Research on Properties of Max-Product Fuzzy Associative Memory Networks. 438-443 - Muhammad Firdaus Mustapha, Safaai Bin Deris:
Rescheduling for Manufacturing Based on Ontology and Problem Solving Method. 444-449 - Xiumei Wu, Lei Jiang:
Control Strategy of Dynamic Leontief Input-Output Model. 450-453 - Chia-Nan Wang, Ya-Ru Lee:
GM (1, 1) and DEA Application Model for Strategic Alliance in Taiwan. 454-459 - Silvio Bortoleto, Nelson F. F. Ebecken:
Ontology Model for Multi-relational Data Mining Application. 460-463
Special Session on New Technologies and Their Applications in Image Engineering 3
- Liu Yang, Baolong Guo, Wei Ni:
A Statistical Speckle Suppression Algorithm for Underwater Laser Image Based on Nonsubsampled Contourlet Transform. 467-472 - Juanjuan Zhu, Baolong Guo:
A Panoramic Image Stabilization System Based on Block Motion Iteration. 473-477 - Xianxiang Wu, Bao-Long Guo:
FFT-Based Orientation Recognition Algorithm in Mirosot. 478-481 - Wei Sun, Baolong Guo:
Robust Object Tracking via Hierarchical Particle Filter. 482-486 - Chao Lin Chu, Russell J. Abbott, Debora K. Shuger:
Spider Search: An Efficient and Non-Frontier-Based Real-Time Search Algorithm. 487-492 - Wen-Hung Liao, Yu-Hao Chi:
Estimation of Skin Color Range Using Achromatic Features. 493-497 - Beiji Zou, Umugwaneza Marie Providence:
Shape-Based Trademark Retrieval Using Cosine Distance Method. 498-504 - Pao-Ta Yu, Yui-Lang Chen, Bae-Muu Chang:
A High Performance Filter Based on Statistic Methods for Image Processing. 505-510 - Ching-Biau Tzeng, Tzuu-Shaang Wey, Li-Dao Fang:
Design and Application of a Reconfigurable Embedded System. 511-516 - Na Wang, Xia Li:
Semi-supervised Laplacianfaces from Pairwise Constraints for Face Recognition. 517-522
Applications of Artificial Intelligence and Soft-Computing 2
- Fu-Kai Chang, Ching-Hung Lee:
Design of Fractional PID Control via Hybrid of Electromagnetism-Like and Genetic Algorithms. 525-530 - Shin-Jang Pan, Jason Sheng-Hong Tsai:
The Application of Genetic Algorithm on Control of Discrete Multiple Time-Delay Singularly Perturbation Systems. 531-536 - Shing-Tai Pan, Bo-Yu Tsai, Chao-Shun Yang:
Differential Evolution Algorithm on Robust IIR Filter Design and Implementation. 537-542 - Huan-Ming Chuang, Chia-Cheng Shen:
A Study on the Applications of Learning Paths Concepts to the Teaching in Elementary School. 543-548 - Jaroslav Pokorný, Jan Vávra, Václav Snásel:
A Renewed Matrix Model for XML Data. 549-556 - Suhaila Zainudin, Safaai Deris:
Combining Clustering and Bayesian Network for Gene Network Inference. 557-563 - Wei-Ming Tong, Hong-Wei Gao:
A Fieldbus Comprehensive Evaluation and Selection Method Based on Entropy-Ideal Point. 564-568 - Hiroaki Ishii, Yung Lung Lee:
Facility Location Problem under Fuzzy Construction Cost and Preference of Candidate Sites. 569-572 - Chien-Hsing Chen, Chung-Chian Hsu:
Boosted Voting Scheme on Classification. 573-577 - Andrey V. Gavrilov:
Context and Learning Based Approach to Programming of Intelligent Equipment. 578-582
Computational Intelligence and Security 2
- Rongyu He, Jianchun Yin, Chaowen Chang:
Research on Access Control Based on Certainty Factor. 585-590 - Xuan Wang, Lei Wang:
P2P Recommendation Trust Model. 591-595 - Xuan Wang, Jiajia Zhang, Xinxin Xu, Zhaoyang Xu:
Risk Dominance Strategy in Imperfect Information Multi-player Game. 596-601 - Chang-yin Liang, Hao Wu, Ang Li:
Video Content Authentication Technique Based on Invariant Feature Detection and Cloud Watermark. 602-607 - Dai-Rui Lin, Chih-I Wang, D. J. Guan:
One/T-Time Signatures Using Self-Certified Public Keys. 608-613 - Min-Chih Kao, Yi-Shiung Yeh, Chuan Chi Wang:
Untraceable Identity Management Framework for Mobile Access. 614-620 - Tsung-Che Chiang, Hsueh-Chien Cheng, Li-Chen Fu:
An Efficient Heuristic for Minimizing Maximum Lateness on Parallel Batch Machines. 621-627 - Elias Oliveira, Patrick Marques Ciarelli, Claudine Badue, Alberto Ferreira de Souza:
A Comparison between a KNN Based Approach and a PNN Algorithm for a Multi-label Classification Problem. 628-633 - Qingshan Luo, Guihua Zeng:
Human Action Retrieval via Spatio-temporal Cuboids. 634-637 - Zhihua Cui, Jianchao Zeng, Yufeng Yin:
An Improved PSO with Time-Varying Accelerator Coefficients. 638-643
Intelligent System Design and Applications for Digital Home Users
- Kuan-Chieh Huang, Yau-Hwang Kuo, I-Cheng Yeh:
A Novel Fitness Function in Genetic Algorithms to Optimize Neural Networks for Imbalanced Data Sets. 647-650 - Lien-Fa Lin, Chao-Chun Chen:
An Efficient Data Retrieval Indexing Structure for Wireless Broadcasting System. 651-656 - Ming-Han Wan, Mong-Fong Horng:
An Intelligent Monitoring System for Local-Area Network Traffic. 657-660 - Yong Zhang, Lin Zhang, Xiaohua Zhang:
Mobile Robot Path Planning Base on the Hybrid Genetic Algorithm in Unknown Environment. 661-665 - Chun-Liang Hsu, Sheng-Yuan Yang:
Constructing Intelligent Living Space Controlling System with Bluetooth and Speech-Recognition Microprocessor. 666-671 - Wenbo Zhang, Ye Xu, Yueqiu Jiang:
Research on the Architecture of Policy-Based Satellite Network Management. 672-676 - Yuan-Horng Lin, Shin-Yu Chang, Sen-Chi Yu:
Knowledge Management on Concept Structure Analysis with Weighted Polytomous Ordering Theory and Cluster Analysis. 677-681 - Meiling Wang, Yongwei Fu:
State Estimation of ALV Integrated Navigation System Based on BP Neural Network. 682-686 - Michal Wozniak:
Classifier Fusion Based on Weighted Voting - Analytical and Experimental Results. 687-692 - Xueying Zhang, Ying Sun, Xiaomei Zhang, Peng Wang:
A Fuzzy Neural Network Based on Particle Swarm Optimization Applied in the Speech Recognition System. 693-697
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.