default search action
ISDA 2008: Kaohsiung, Taiwan - Volume 3
- Jeng-Shyang Pan, Ajith Abraham, Chin-Chen Chang:
Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes. IEEE Computer Society 2008, ISBN 978-0-7695-3382-7
E-Commerce Security 1
- Jen-Ho Yang, Chin-Chen Chang:
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. 3-5 - Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen:
A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction. 6-10 - Yu-Yi Chen, Yao-Jen Wang, Cheng-Jie Chen:
A Fair-Use DRM System Based on Web Service. 11-16 - Ming-Hsin Chang, I-Te Chen, Ming-Te Chen:
Design of Proxy Signature in ECDSA. 17-22 - Kuen-Fang Jea, Tsui-Ping Chang:
A Lock-Based Protocol for XML Metadata Knowledge Bases. 23-28 - Yuhua Jiao, Mingyu Li, Qiong Li, Xiamu Niu:
Key-Dependent Compressed Domain Audio Hashing. 29-32 - Yiqiang Chen, Juan Qi, Zhuo Sun:
LMSS: A Location-Based Multimedia Service System Using Wireless Networks. 33-38 - Chang-Jun Yu, Yuan-Yuan He, Tai-Fan Quan:
Frequency Spectrum Prediction Method Based on EMD and SVR. 39-44 - Yishan Gong, Na Qian:
The Synchronous Drive System in Gantry-Moving Milling Machine Based on Dynamic Compensation and Fuzzy Control. 45-48 - Juan Hu, Laihang Yu, Kaiqi Zou:
Enhanced Self-Adaptive Search Capability Particle Swarm Optimization. 49-53
Optimization Methods, Binomial Systems, and Applications to the Market Equilibrium
- Alexei A. Borisenko, Vyacheslav Kalashnikov, Igor A. Kulik, O. E. Goryachev:
Generation of Permutations Based Upon Factorial Numbers. 57-61 - Vyacheslav Kalashnikov, Nataliya I. Kalashnykova, José-Fernando Camacho-Vallejo:
Solving Bilevel Toll Assignment Problem by Penalty Function Algorithm. 62-66 - Nataliya I. Kalashnykova, Vyacheslav Kalashnikov, Aaron Arevalo Franco:
Inexact Newton Algorithm to Solve Nonlinear Complementarity Problems. 67-71 - Vitaly Kalashnikov, Nataliya I. Kalashnykova, Felipe de Jesus Castillo Perez, Armando César Uranga Sifuentes, Claudia Mayela Avila Garza:
Liberalization of Mexican Electricity Market: Various Modeling Approaches with Numerical Simulation Results. 72-76 - Liguo Deng, Zhiheng Liang, Yong Zhang:
A Fuzzy Temporal Model and Query Language for FTER Databases. 77-82 - Pei-Yi Hao, Min-Shiu Lin, Lung-Biao Tsai:
A New Support Vector Machine with Fuzzy Hyper-Plane and Its Application to Evaluate Credit Risk. 83-88 - Ying-Shieh Kung, Le Thi Van Anh, Shin-Hung Jou:
FPGA-Realization of Adaptive Fuzzy Controller for the Linear X-Y Table. 89-94 - Junko Shibata, Koji Okuhara, Shogo Shiode, Hiroaki Ishii:
The Self-Organizing Map Applying the "Survival of the Fittest Type" Learning Algorithm. 95-100 - Shaojuan Yu, Jincai Bai, Shibo Xiong, Rucheng Han:
A New Iterative Learning Controller for Electro-Pneumatic Servo System. 101-105 - Huang Chun-Qing:
Adaptive H8 Tracking Control Design in Robotic Systems with Parameter Perturbation and External Disturbance. 106-111
Machine Learning, Evolutionary Computation and Their Applications
- Kazutoshi Sakakibara, Yoshiro Fukui, Ikuko Nishikawa:
Genetics-Based Machine Learning Approach for Rule Acquisition in an AGV Transportation System. 115-120 - Keita Hamahata, Tadahiro Taniguchi, Kazutoshi Sakakibara, Ikuko Nishikawa, Kazuma Tabuchi, Tetsuo Sawaragi:
Effective Integration of Imitation Learning and Reinforcement Learning by Generating Internal Reward. 121-126 - Yen-Wei Chen, Chen-Lun Lin, Aya Mimori:
Multimodal Medical Image Registration Using Particle Swarm Optimization. 127-131 - Shinya Nozaki, Shinsuke Fujioka, Yen-Wei Chen:
A Heuristic Decoding Method for Coded Images of Uniformly Redundant Array. 132-135 - Lukasz Cielecki, Olgierd Unold:
3D Function Approximation with rGCS Classifier System. 136-141 - Kuo-An Hwang, Chia-Hao Yang:
Attentiveness Assessment in Learning Based on Fuzzy Logic Analysis. 142-146 - Hsiang-Chuan Liu, Yu-Chieh Tu, Bai-Cheng Jeng, Tung-Sheng Liu:
A Novel Prediction Algorithm of Thermostable Proteins by Using Hurst Exponent and Choquet Integral Regression Model. 147-152 - Hui-Huang Hsu, Ming-Da Lu:
Feature Selection for Cancer Classification on Microarray Expression Data. 153-158 - Venakata Saichand, M. Nirmala Devi, S. Arumugam, N. Mohankumar:
FPGA Realization of Activation Function for Artificial Neural Networks. 159-164 - Xiaowei Wang, Longbin Jiang, Jialin Ma, Jiangyan:
Use of NER Information for Improved Topic Tracking. 165-170
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography 1
- Hsien-Chu Wu, Hao-Cheng Wang, Rui-Wen Yu:
Color Visual Cryptography Scheme Using Meaningful Shares. 173-178 - Zhi-Fang Yang, Mong-Shu Wu:
Robustness of Structure-Based Watermark by Using Balanced Incomplete Block Designs. 179-182 - Wien Hong, Chih-Wei Shiu, Tung-Shou Chen:
A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding. 183-187 - Vincent S. Tseng, Ming-Hua Hsieh, Kawuu Weicheng Lin:
Mining Region-Based Movement Patterns for Energy-Efficient Object Tracking in Sensor Networks. 188-196 - Mingyu Li, Yuhua Jiao, Xiamu Niu:
Reversible Watermarking for Compressed Speech. 197-201 - Chih-Chia Weng, Shan-Tai Chen, Hung-Che Lo:
A Novel Algorithm for Completely Hiding Sensitive Association Rules. 202-208 - Fa-Xin Yu, Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu:
Lossless and Lossy Image Secret Sharing for Data Transmission. 209-214 - Ching-Biau Tzeng, Tzuu-Shaang Wey, Tsung-Yu Su:
Microcomputer Based Smart Engine Ignition Control System for Motorcycles. 215-221 - Xiaoyue Jiang, Hichem Sahli, Werner Verhelst, Yanning Zhang:
Backward-Forward Combined Convolutive Blind Source Separation. 222-227 - Xuehui Luo, Ye Yang, Xia Li:
Solving TSP with Shuffled Frog-Leaping Algorithm. 228-232
E-Commerce Security 2
- Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, Shin-Yan Chiou:
Efficient Authentication Schemes for Handover in Mobile WiMAX. 235-240 - Ya-Fen Chang, Wei-Cheng Shiao:
The Essential Design Principles of Verifiable Non-interactive OT Protocols. 241-245 - Jung-Wen Lo, Min-Shiang Hwang, Yen-Ping Chu:
An Exchangeable E-Cash Scheme by E-Mint. 246-251 - Tzung-Her Chen, Kai-Hsiang Tsao, Kuo-Chen Wei:
Multiple-Image Encryption by Rotating Random Grids. 252-256 - Shusaku Tsumoto, Shoji Hirano:
Hospital Management Based on Data Mining. 257-262 - Siti Nurkhadijah Aishah Ibrahim, Ali Selamat, Md. Hafiz Selamat:
E-Business Social Network Optimization and Visualization. 263-268 - Chih-Hsien Lee, Don-Lin Yang, Jungpin Wu, Kuo-Cheng Yin:
Efficient Mining of Frequent Closed Itemsets without Closure Checking. 269-274 - Kuen-Fang Jea, Chao-Wei Li, Tsui-Ping Chang:
An Efficient Approximate Approach to Mining Frequent Itemsets over High Speed Transactional Data Streams. 275-280 - Chu-Hsing Lin, Jung-Chun Liu, Chih-Chieh Lien:
Detection Method Based on Reverse Proxy against Web Flooding Attacks. 281-284 - Shengnan Zhang, Limin Song, Lianqiang Niu:
Study on X-VRML-Based Modelling of Virtual Museum. 285-288
Digital Crime and Forensics 1
- Alessandro Brawerman, Cicero F. Marques, Francisco J. K. G. Navarro, Rafael Ribeiro Macedo:
A Model for a Distance Learning System over the Internet. 291-292 - Diego Alex Harmatiuk, Silvio Bortoleto, Wesley Pereira de Oliveira, Durval Neto, Everson Volaco:
E-Business Model Approach to Determine Models to Datawarehouse. 293-295 - Peng-Cheng Wang, Kuo-Chen Wu, Chung-Ming Wang:
A Reversible Steganographic Algorithm for Point-Sampled Geometry. 296-301 - Chia-Chen Lin, Wen-Xiu Zhang:
Secret Sharing Scheme with Non-expansible Shadow Size for Color Images. 302-307 - Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou:
An Ordered Multi-proxy Multi-signature Scheme. 308-313 - Shengbing Che, Qiangbo Huang, Bin Ma:
Adaptive Image Hiding Algorithm Based on Classification. 314-319 - Lin-Yu Tseng, Yung-Kuan Chan, Yu-An Ho, Yen-Ping Chu:
Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process. 320-325 - Yunpeng Zhang, Tongtong Xue, Zhengjun Zhai, Chunyan Ma, Xiaobin Cai:
The Improvement of Public Key Cryptography Based on Chaotic Neural Networks. 326-330 - ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni:
Reversible Watermarking Based on the Invariant Sum Value. 331-334 - Chih-Cheng Lo, Yi-Ting Chen, Shu-Chuan Chu, Jeng-Shyang Pan:
A GA-Based Image Halftoning Technique. 335-338
Intelligent Video Processing 1
- Yi-Chun Lee, Chin-Hsing Chen:
Face Recognition Based on Digital Curvelet Transform. 341-345 - Wen-Chia Lee, Chin-Hsing Chen:
Subpixel Edge Location Using Orthogonal Fourier-Mellin Moments Based Edge Location Error Compensation Model. 346-351 - Ji-Hong Chen, Chin-Hsing Chen, Wen-Yuan Chen:
A Watermarking Method for Still Images Using Modified Code Division Multiple Access. 352-357 - Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang:
A Fast and Stable Superresolution Reconstruction Method for Compressed Video Sequences. 358-362 - Diala Dhouib, Habib Chabchoub, Sid-Ali Addouche, Abderrahman El Mhamedi:
A New Multi Criteria Aid Model for Process Piloting Using Case-Based Reasoning. 363-367 - Pengyu Liu, Kebin Jia:
A Fast Mode Decision Scheme with Variable Block Sizes in H.264/AVC. 368-371 - Jifeng Sun, Wenkai Huang, Zhiyong Zhang:
An Edge-Recovery-Based Error Concealment Method for Video. 372-375 - Chenwei Deng, Baojun Zhao:
Mesh-Based In-band Motion Estimation Method. 376-380 - Yuhki Shiraishi, Fumiaki Takeda:
Development of a Portable Automatic Inspection System for Printed Labels Using a Web Camera. 381-385 - Bowen Fu, Wenhe Zhang, Lianqiang Niu:
A Kind of Parallel Reference Frame Display Control Algorithm. 386-390
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography 2
- Jin Hu Huang, David M. W. Powers:
Suffix Tree Based Approach for Chinese Information Retrieval. 393-397 - Yuan-Liang Tang, Chin-Feng Lee, Huai-En Lee:
Efficient Image Recovery Based on Self-Embedding. 398-402 - Hsien-Chu Wu, Fang-Yu Hsu, Hwang-Yu Chen:
Tamper Detection of Relational Database Based on SVR Predictive Difference. 403-408 - Chin-Feng Lee, Tsung-Chia Yang:
A Blind Associative Watermarking Technique Using Self-Embedding. 409-413 - Liu Lu, Wanyu Liu:
A Novel Algorithm for Ultrasonic Stereovision Data Enhancement. 414-419 - Millie Pant, Radha Thangaraj, Ajith Abraham:
Optimal Tuning of PI Speed Controller Using Nature Inspired Heuristics. 420-425 - Tung-Shou Chen, Jeanne Chen, Yuan-Hung Kao, Tsang-Chou Hsieh:
A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC). 426-430 - Hao Luo, Fa-Xin Yu, Jeng-Shyang Pan, Zhe-Ming Lu:
Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding. 431-436 - Peng-Jen Lai, Ming-Hung Shu:
Tardiness in Fuzzy Flow Shop Scheduling Problems Based on Possibility and Necessity Measures. 437-441 - Nung-Yue Shi, Chih-Ping Chu:
Fast Parallel Molecular Solution to the Hitting-Set Problem. 442-447
E-Commerce Security 3
- Chia-Chen Lin, Po-Hsuan Chiang:
A Mobile Trading Scheme for Digital Content Based on Digital Rights. 451-456 - Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
Fast Modular Multiplication for E-Commerce Cryptosystem. 457-461 - Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun:
Multi-recastable E-Bidding Scheme. 462-466 - Chin-Chen Chang, Jung-San Lee:
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol. 467-471 - Dai-Rui Lin, Chih-I Wang, D. J. Guan:
An Efficiently Online/Offline Signcryption for Firewall. 472-478 - Han-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh:
Self-Certified Proxy Convertible Authenticated Encryption Scheme. 479-483 - Yao-Lung Yeh, Jing-Cyun You, Gwo-Jia Jong:
The 2D Bar-Code Technology Applications in Medical Information Management. 484-487 - Mostafa A. El-Hosseini, Aboul Ella Hassanien, Ajith Abraham, Hameed Al-Qaheri:
Cultural-Based Genetic Algorithm: Design and Real World Applications. 488-493 - Chin-Shiuh Shieh, I-Cheng Lin, Wei Kuang Lai:
Improvement of SCTP Performance in Vertical Handover. 494-498 - Wei-Ru Lai, Che-Hui Liao, Chang-Ching Lu, Ming-Kuan Liao:
A Prediction Mechanism of Mail Retrieval Based on the User Behavior Analysis for Electronic Mail Database System. 499-504
Digital Crime and Forensics 2
- Katia Bortoleto, Silvio Bortoleto:
Model of Approach and Determination of the Failure Pertaining to School. 507-509 - Thiago T. Angelico, Thais Santos Bueno, Silvio Bortoleto, Anderson Ravanello:
KDD on IVR Navigation Trees: Case Study. 510-512 - Hsien-Chu Wu, Yu-Chi Liu, Kuo-Ching Liu, Chwei-Shyong Tsai:
A Block-Based Authentication Watermarking Technique for Binary Images. 513-518 - Hsien-Chu Wu, Kuo-Ching Liu, Jun-Dong Chang, Ching-Hui Huang:
An Image Steganographic Scheme Based on Support Vector Regression. 519-524 - Chin-Feng Lee, Jau-Ji Shen, Hung-Lin Chao:
Complete Double Layered Embedding Scheme for Information Hiding. 525-528 - Jin-Yu Zhang, Man-Gui Liang:
NGN Service Pricing Support Decision System Based on Fuzzy Neural Network: NPDSS. 529-534 - Wen-Ping Chen, Shih-Wei Kau, Wen-Shyang Hwang, Bin-Yih Liao, Wen-Tsung Hu:
A Collision Avoidance Protocol for Supporting All-Optical Ring Network. 535-540 - Ji-Xin Liu, Zhe-Ming Lu, Jeng-Shyang Pan:
A Robust Audio Watermarking Algorithm Based on DCT and Vector Quantization. 541-544 - Hung-Peng Lee, Hsin-Chiu Chang, Tsung-Ching Lin, Trieu-Kien Truong:
A Weight Method of Decoding the Binary BCH Code. 545-549 - Wenjun Huang, Xiamu Niu, Wei Song, Meiyu Lu:
Digital Watermark for 3D Face Model Authentication and EER Performance Analysis. 550-554
Intelligent Video Processing 2
- Chao-Ho Chen, Che-Wei Hsu, Chin-Hsing Chen:
Video Stabilization by Feature-Block Motion Estimation. 557-560 - Tsong-Yi Chen, Thou-Ho Chen, Che-Ping Su, Yi-Jun Chen:
The Study on Video Enhancement in the Low-Light Environment by Spatio-temporal Filtering. 561-564 - Chao-Ho Chen, Yin-Chan Chang, Tsong-Yi Chen, Da-Jinn Wang:
People Counting System for Getting In/Out of a Bus Based on Video Processing. 565-569 - Zhipin Deng, Ke-bin Jia:
A Video Similarity Matching Algorithm Supporting for Different Time Scales. 570-574 - Yi-Chun Liao, Ming-Hong Syu:
An Actor-Based Video Segmentation System Using Visual and Audio Information in E-Learning. 575-580 - Jeanne Chen, Tung-Shou Chen, Ping-Feng Chen:
Prediction Filling Differences for Compress a Set of HDR Images. 581-586 - Ching-Biau Tzeng, Tzuu-Shaang Wey, Sheng-Hsiung Ma:
Building a Flexible Energy Management System with LonWorks Control Network. 587-593 - Anhong Wang, Yao Zhao, Jeng-Shyang Pan:
Efficient Scalable Distributed Video Coding Based on Residual SW-SPIHT. 594-597 - An-Pin Chen, Yu-Chia Hsu, Chien-Hua Huang, Ya-Chun Yang:
Applying the Extended Classifier System to Trade Interest Rate Futures Based on Technical Analysis. 598-603 - Lianqiang Niu, Nan Jiang:
A Moving Objects Detection Algorithm Based on Improved Background Subtraction. 604-607
Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography 3
- Fang Rong Hsu, Wen Chun Lo:
Bioinformatics Approach to Discover the Relationship between Single Nucleotide Polymorphisms and Tumors. 611-615 - Hao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, Chiang-Lung Liu:
A Lossless Secret Image Sharing Method. 616-619 - Cheng-Hsing Yang, Shu-Chien Huang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Non-embedded Image Protection Approaches Based on Vector Quantization. 620-625 - Tzu-Chuen Lu, Li-Ling Hsu:
The Technique of Information Hiding Based on Modification Function and LSB Matching. 626-631 - Ching-Hui Huang, Chih-Chiang Lee, Hsien-Chu Wu, Chung-Ming Wang:
Lossless Data Hiding for Color Images. 632-637 - Michal Choras, Rafal Kozik, Aleksandra Zelek:
A Novel Shape-Texture Approach to Palmprint Detection and Identification. 638-643 - Yufeng Zhao, Yao Zhao, Zhenfeng Zhu, Jeng-Shyang Pan:
A Novel Image Annotation Scheme Based on Neural Network. 644-647 - Eri Domoto, Koji Okuhara, Hiroaki Ishii:
Database-Driven Disease Prevention by Daily Menu Management and Physical Condition. 648-651 - Rafael Falcón, Benoît Depaire, Koen Vanhoof, Ajith Abraham:
Towards a Suitable Reconciliation of the Findings in Collaborative Fuzzy Clustering. 652-657 - Chen-Chiung Hsieh, Wei-Ru Lai, Albert Chiang:
A Real Time Spatial/Temporal/Motion Integrated Surveillance System in Compressed Domain. 658-665
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.