Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III

Front Cover
Rajiv Khosla
Springer, Aug 25, 2005 - Computers - 1400 pages
Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established for almost a decade, and it cont- ues each year to attract participants from all geographical areas of the world, including Europe, the Americas, Australasia and the Paci?c Rim. The KES conferences cover a wide range of intelligent systems topics. The broad focus of the conference series is the theory and applications of intelligent systems. From a pure research ?eld, intel- gent systems have advanced to the point where their abilities have been incorporated into many business and engineering application areas. KES 2005 provided a valuable mechanism for delegates to obtain an extensive view of the latest research into a range of intelligent-systems algorithms, tools and techniques. The conference also gave de- gates the chance to come into contact with those applying intelligent systems in diverse commercial areas. The combination of theory and practice represented a unique opp- tunity to gain an appreciation of the full spectrum of leading-edge intelligent-systems activity. The papers for KES 2005 were either submitted to invited sessions, chaired and organized by respected experts in their ?elds, or to a general session, managed by an extensive International Program Committee, or to the Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP) Workshop, managed by an International Workshop Technical Committee.
 

Contents

Intelligent Agent Ontologies and Environments
1
Excluding Fitness Helps Improve Robustness of Evolutionary Algorithms
8
Testing Voice Mimicry with the YOHO Speaker Verification Corpus
15
The Effect of Alteration in Service Environments
16
A RS Approach to Trends Breaks Detection
21
Image Multinoise Removal via Levy Process Analysis
22
Multilevel Semantic Analysis for Sports Video
24
Applying Extending Classifier System to Develop an OptionOperation
27
Annealing Sensor Networks
581
Measuring Global Behaviour of Multiagent Systems
587
Recognizing and Simulating Sketched Logic Circuits
588
Color Image Restoration Using Explicit Local Segmentation
589
A Lossless Watermarking Technique for Halftone Images
593
In Use Parameter Estimation of Inertial Sensors
595
Information Engineering and Ubiquitous Computing
602
Optimal Design Using Clonal Selection Algorithm
604

Evaluating the Size of the SOAP for Integration in B2B
29
Learning Plans with Patterns of Actions in BoundedRational Agents
30
Aerial Photograph Image Retrieval Using the MPEG7 Texture Descriptors
31
Applying TwoStage XCS Model on Global Overnight Effect
34
Personalised Search on Electronic Information
35
Yet Another Induction Algorithm
37
Intelligent Network Based Education
41
Data Mining Coupled Conceptual Spaces for Intelligent Agents
42
An Implementation of Learning Classifier Systems
45
Probabilistic Reasoning Techniques for the Tactical Military Domain
46
Network Based Engineering Design Education
48
Data Mining and Soft Computing Applications II
49
ImmunityBased Systems
53
Representative Term Based Feature Selection Method
56
An Optimization Approach for Feature Selection in an Electric Billing Database
57
The Design and Implementation
62
Integrating Relation and Keyword Matching in Information Retrieval
64
Emergence of Immune Memory and Tolerance
65
Heuristic Algorithm for Estimating Travel Speed in Traffic Signalized Networks
69
Mutual Repairing System Using ImmunityBased Diagnostic Mobile Agent
72
Production Testing of Spark Plugs Using a Neural Network
74
A CaseBased Reasoning Approach to Formulating University Timetables
76
A Network Selfrepair by Spatial Strategies in Spatial Prisoners Dilemma
79
Variable Neighborhood Search with Permutation Distance for QAP
81
A Critical Phenomenon in a Selfrepair Network by Mutual Copying
86
Estimation of the Optimal Number of ClusterHeads in Sensor Network
87
Using Rough Set to Induce Comparative Knowledge and Its Use in SARS Data
89
An Application of Information Retrieval Technique
90
A Worm Filter Based on the Number of Unacknowledged Requests
93
Mining Class Association Rules with Artificial Immune System
94
Comparison of Wavenet and Neuralnet for System Modeling
100
Efficient Migration Scheme Using Backward Recovery Algorithm
101
Detecting isa and partof Relations in Heterogeneous Data Flow
104
Skill Acquisition and Ubiquitous Human Computer Interaction
108
Medical Diagnosis
116
Generate Context Metadata Based on Biometric System
119
An Incremental FPGrowth Web Content Mining
121
Performance Comparison for MLP Networks
123
Contribution of Biological Studies to the Understanding and Modeling
124
Relative Magnitude of Gaussian Curvature from Shading Images
128
Combining Machine Learned and Heuristic Rules Using GRDR
131
A RuleBased and ComputationIndependent Business Modelling Language
134
Web Access Path Prediction Using Fuzzy Case Based Reasoning
135
Automatic Detection of Breast Tumours from Ultrasound Images
138
Indoor Location Determination Using a Topological Model
143
An Automatic Body ROI Determination for 3D Visualization
145
Design and Implement a Web News Retrieval System
149
A Promising Symbiosis
154
Soft Computing and Their Applications IV
157
Development of Engineering Ontology on the Basis of IDEF0 Activity Model
162
Integrating Service Registries with OWLS Ontologies
163
A Novel Approach to Retrosynthetic Analysis
169
On Selforganising Diagnostics in Impact Sensing Networks
170
Intelligent Hybrid Systems and Control
172
Reconfigurable PowerAware Scalable Booth Multiplier
176
Effective Information Sharing Using Concept Mapping
177
Base Reference Analytical Hierarchy Process for Engineering Process Selection
184
Hybrid Filter Fusion for Robust Visual Information Processing
186
Enterprise Information System Contextual Ontologies Project
191
Study on the Development of Design Rationale Management System
198
An HILS and RCP Based Interworking Scheme for Computational Evaluation
200
Combining Demographic Data with Collaborative Filtering
201
Intelligent Agent Technology and Applications I
205
Computer Vision Image Processing and Retrieval
206
AgentBased Software Architecture for Simulating Distributed Negotiation
212
Bayesian Inference Driven Behavior Network Architecture
214
An AgentEnhanced Workflow Management System
215
A Multiagent Framework for NET
219
Face Recognition by Multiple Classifiers a DivideandConquer Approach
225
On an IT Security Framework
226
Toward ImprovementOriented Reuse of Experience
228
Investigating the Transport Communicating Rates of Wireless Networks
233
A Fast Image Retrieval Using the Unification Search Method
240
Utilizing Active Software to Capture Tacit Knowledge for Strategic Use
242
EmotionBased Smart Recruitment System
243
Forming Proactive Team Cooperation by Observations
247
Communicative Intelligence II
255
Research on Confidential Level Extended BLP Model
257
Emotional Extraction System by Using the Color Combination
258
Development and Implementation
261
Mining Internet Data Sets for Computational Grids
268
A Seal Imprint Verification with Rotation Invariance
272
Towards Using FirstPerson Shooter Computer Games
276
Robust Authenticated Encryption Scheme with Message Linkages
281
An Empirical Analysis
282
ContextAware Computing Based Adaptable Heart
284
A New Approach for Conflict Resolution of Authorization
290
Analysis of Conversation Quanta for Conversational Knowledge Circulation
296
Human Face Detection Using Skin Color Context Awareness
298
Improved Video Watermark Detection
300
Data Engineering Knowledge Engineering and Ontologies
304
A Covert Timing ChannelFree Optimistic Concurrency Control Scheme
310
Reversible Watermarking Based on Improved Patchwork Algorithm
317
A Unifying Ontology Modeling for Knowledge Management
318
An Evolvable Hardware System Under Uneven Environment
319
The Efficient Multipurpose Convertible Undeniable Signature Scheme
325
On KnowledgeBased Editorial Design System
332
Features and Issues
336
A Study on the Correction of Gun Fire Error Using Neural Network
339
An OCR Postprocessing Approach Based on Multiknowledge
346
Anytime Iterative Optimal Control Using Fuzzy Feedback Scheduler
350
Calendars and Topologies as Types
352
An Experimental Comparison on Gabor Wavelet
353
Mining Quantitative Data Based on Tolerance Rough Set Model
359
Iris Pattern Recognition Using Fuzzy LDA Method
364
Precise Segmentation Rendering for Medical Images
366
Precision Tracking Basedon Fuzzy Reasoning Segmentation
371
InformationBased Pruning for Interesting Association Rule Mining
372
Fuzzy Lowpass Filtering
378
Fast Video Retrieval via the Statistics of Motion Within the RegionsofInterest
381
Intelligent Data Analysis and Applications II
382
Fuzzy Logic Based Intelligent Tool for Databases
386
A New CellBased Clustering Method
391
Knowledge Representation and Its Practical Application
393
Design of a Digital Forensics Image Mining System
395
A Multistage FuzzyGrey Approach to Analyzing Software Development Cost
396
Meeting the Need for Knowledge Management in Schools
403
Advanced Network Application
405
A Method for Acquiring Fingerprint by Linear Sensor
410
Improved Image Coding with Classified VQ and SideMatch VQ
411
Evaluating the Functioning of Rules
416
Capturing Window Attributes for Extending Web Browsing History Records
418
Using Bayesian Networks for Modeling Students Learning Bugs
422
Creativitiy Support Environment and Its Social Applications
423
Block Standstill and Homogeneity Based Fast Motion Estimation Algorithm
425
Temporal Knowledge Representation and Reasoning Model
430
Position Estimation for Goods Tracking System Using Mobile Detectors
431
Computerized Support for Idea Generation
437
Improving Image Quality for JPEG Compression
442
The Architecture to Implement the Home Automation Systems
445
Approaches and Methods into Security Engineering III
446
PersonCentered Care as Creative Problem Solving
451
Separated Ethernet Algorithm for Intelligent Building Network Integration
452
Efficient Revocation of Security Capability
453
Multimedia Signal Processing
456
Approaches and Methods of Security Engineering I
459
A Study on PrivacyRelated Considerations
460
A Hybrid Method of Data Hiding and Image Compression
463
Using Affective Leaner States to Enhance Learning
465
An Efficient and Secured Media Access Mechanism
470
Collective Intelligence
472
Dynamic Integrated Model for Distributed Multimedia System
476
PilotSymbol Aided SFBCOFDM Channel Estimation
477
A Study of Power Network Stabilization Using an Artificial Neural Network
479
Cryptographic Protocol Design Concept with Genetic Algorithms
483
An Adaptive Repeater System for OFDM with Frequency Hopping Control
485
Autonomous Synchronization Scheme Access Control for Sensor Network
487
An Efficient Backoff Scheme for IEEE 802 11e EDCF Differential Service
490
Intelligent and Effective Digital Watermarking Scheme
492
Speech Authentication by Semifragile Watermarking
497
Performance Improvement of OFDM System
498
Communicative Intelligent I
500
A Programmable Pipelined Queue for Approximate String Matching
503
Arbitrated Verifier Signature with Message Recovery for Proof of Ownership
504
Smart Systems
505
Multiagent System for Web Advertising
507
Chance Discovery I
511
Distributed Web Integration with Multiagent Data Mining
513
A Mobile Agent Approach to Intrusion Detection in Network Systems
514
Computational Methods for Intelligent Neurofuzzy Applications
518
Nontextual Document Ranking Using Crawler Information
520
Waste Incinerator Emission Prediction
526
A Propagation Strategy Implemented in Communicative Environment
527
Local Feature Analysis with Class Information
532
A Context of Creative Design
533
Comparison of the Effectiveness of Decimation
540
Fault Diagnosis of Discrete Event Systems Using Place Invariants
541
Chance Discovery and the Disembodiment of Mind
547
Adaptive Fuzzy OutputFeedback Controller for SISO Affine Nonlinear Systems
549
Soft Computing Techniques and Their Applications III
554
Information Hiding and Multimedia Signal Processing
561
OnLine Reinforcement Learning
562
Using Interval Singleton Type 2 Fuzzy Logic System
566
Copyright Authentication Enhancement of Digital Watermarking
567
Evolutionary and Selforganizing Sensors Actuators
573
Using Rough Set to Reduce SVM Classifier Complexity
575
Compressed Domain Video Watermarking in Motion Vector
580
KnowledgeBased Fuzzy Control of PilotScale SBR for Wastewater Treatment
608
A New Technique of Determining Speakers Intention for Sentences
612
CSFs for HCI in Ubiquitous Computing Environments
616
Analysis of RED with Multiple ClassBased Queues
618
New Approach for Speedingup Technique of the Retrieval
619
Control System for Optimal Flight Trajectories for Terrain Collision Avoidance
622
Learning Behaviors of the Hierarchical Structure Stochastic Automata
624
Multiagent Systems and Evolutionary Computing
626
Parameter Space Exploration of AgentBased Models
633
Design and Implementation of Home Media Server
635
Efficient Preprocessing for Large WindowBased Modular Exponentiation
640
Feature Generation by Simple FLD
643
Location and ContextBased Systems
649
eLearning and
651
Building Hyperheuristics Through Ant Colony Optimization
654
Influence of Music Listening on the Cerebral Activity by Analyzing EEG
657
RealTime Cocomposing System Using Multiaspects
661
An Efficient Eye Location Using ContextAware Binarization Method
662
Modeling Understanding Level of Learner in Collaborative Learning
665
Ubiquitous Pattern Recognition
668
iJADE Tourist Guide A Mobile LocationAwareness AgentBased System
671
New Logical Classes of Plausibility Functions in DempsterShafer Theory
675
Integrated Management of Multilevel Road Network
677
Information TechnologyBased Educational Software Framework
681
Person Tracking with Infrared Sensors
682
BehaviorBased Blind GoalOriented Robot Navigation by Fuzzy Logic
686
Entropy Criterion for ClassifierIndependent Feature Selection
689
News Video Retrieval Using Automatic Indexing of Korean ClosedCaption
694
Finding and Autolabeling of Task Groups on EMails and Documents
696
Architecture of a Web Operating System Based on Multiagent Systems
700
Person Recognition by Pressure Sensors
703
Logic Based Intelligent Information Systems
708
eBased Systems in Education Commerce and Health
713
Representation of Procedural Knowledge of an Intelligent Agent
714
Neural Networks for Data Mining
716
A KnowledgeBased Interaction Model Between Users
722
Detecting Search Engine Spam from a Trackback Network in Blogspace
723
Nonalethic Reasoning in Distributed Systems
724
The Searching Methods of Mobile Agents
728
Analysis for Adaptability of PolicyImproving System with a Mixture Model
730
A Connectionist Model for Predicate Logic Reasoning
732
Synthetic Character with Bayesian Network and Behavior Network
737
Parallel Stochastic Optimization for Humanoid Locomotion
738
A Time Judgement System Based on an Association Mechanism
742
Visualizing Dynamics of the Hot Topics
745
A Deductive Semantic Brokering System
746
ResponseDriven WebBased Assessment System
749
Intelligent Environments for NextGeneration eMarkets
751
Intelligent Consumer Purchase Intention Prediction System for Green Products
752
Intelligent Systems for eBusiness and eLearning II
758
Specifying Distributed Authorization with Delegation
761
Computational Biology and Bioinformatics
763
A My Page Service Realizing Method by Using Market Expectation Engine
765
Dynamic Location Management for OnDemand Car Sharing System
768
Multiagent Modeling of Peer to Peer Communication
772
Intelligent Data Analysis Decision Making and Modelling Adaptive Financial
775
Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data
777
A CaseOriented Game for Business Learning
779
Development of Judging Method of Understanding Level in Web Learning
781
Learning ValueAdded Information of Asset Management
785
A Medical Advisory System
789
A Hybrid Approach to Combine HMM and SVM Methods
792
eLearning Materials Development Based on Abstract Analysis
794
An Efficient Method for Creating Requirement Specification
799
Complex Adaptive Systems
806
Study on the Velocity of Saccadic Eye Movements
808
A Burglary Data Case Study
813
Adaptation on the Commons
820
Innovations in Intelligent Agents
821
New Directions
825
An Automated Argument System Based on Logic
830
Hyperspectral Image Watermarking with an Evolutionary Algorithm
833
Supporting Adaptive Learning with High Level Timed Petri Nets
834
Cognitive Hybrid Reasoning Intelligent Agent System
838
Blind Signal Separation Through Cooperating ANNs
847
Generating CG Movies Based on a Cognitive Model of Shot Transition
848
Reasoning About Time in a BDI Architecture
851
Sustainable Memory System Using Global and Conical Spaces
861
Classifier Fusion to Predict Breast Cancer Tumors
866
Locomotion Control Technique for Immersive Conversation Environment
875
Intelligent Human Computer Interaction Systems
880
A Robust and Invisible Watermarking of 3D Triangle Meshes
881
Analysis and Synthesis of HelpDesk Responses
890
Attribute Intensity Calculating Method from Evaluative Sentences
893
Improving Search on WWW HR Web Directory by Introducing Ontologies
894
Extended Fuzzy Description Logic ALCN
896
Development of a New Vocal Cords Based on Human Biological Structures
908
Weak Key Analysis and Microcontroller Implementation
910
An Experimental Study on Computer Programming with Linguistic Expressions
911
Ontology Modeling and Storage System for Robot Context Understanding
922
Effect of Direct Communication in Ant System
925
Clustering Categorical Streams Using Attribute Selection
929
ActivityObject Bayesian Networks for Detecting Occluded Objects
937
Experience Management and Knowledge Management
938
Combining an OrderSemisensitive Text Similarity and Closest Fit Approach
943
Design of a Simultaneous Mobile Robot Localization
945
A Framework of Checking Subsumption Relations Between Composite Concepts
953
An Adaptive Forecasting Method for Data Streams
957
Mining Classification Rules Using Evolutionary Multiobjective Algorithms
959
TwoPhase Path Retrieval Method for Similar XML Document Retrieval
967
Computational Intelligence Tools Techniques and Algorithms
972
Using Artificial Neural Network Ensembles to Extract Data Content
974
A Mutual Influence Algorithm for Multiple Concurrent Negotiations
986
Network Security RealTime and Fault Tolerant Systems
987
Program Simplification in Genetic Programming for Object Classification
988
The Interactive Evolutionary Computation Based on the Social Distance
991
Algorithms for CTL System Modification
1000
Wavelength Converter Assignment Problem in All Optical WDM Networks
1004
Multimedia Security and Stegnography
1005
An Efficient MDS Algorithm for the Analysis
1015
A Preliminary Design for a PrivacyFriendly Free P2P Media File
1018
Mobile Agent System
1021
SE33Intelligent IDBased Threshold System by an Encryption
1022
A New Steganography Scheme in the Domain
1032
A Quantitative Trust Model Based on Multiple Evaluation Criteria Hak Joon Kim and Keon Myung Lee
1036
Method of Hiding Information in Agglutinative Language Documents
1039
Performance Analysis of a Antenna Array System
1050
Dual Communication System Using Wired and Wireless
1051
Stegnography
1058
Theory and Application of Artificial Neural Networks
1064
Intelligent Method for Building Security Countermeasures
1069
A Verifiable Fingerprint Vault Scheme
1072
A Genetic Information Based Load Redistribution Approach
1081
Audio CoFIP Contents Fingerprinting Robust Against Collusion Attack Kotaro Sonoda Ryouichi Nishimura and Yˆoiti Suzuki
1083
Data Hiding in a Hologram by Modified Digital Halftoning Techniques
1086
Approaches and Methods of Security Engineering II
1094
A New Watermark Surviving After Reshooting
1099
A Reversible Information Hiding Scheme Based on Vector Quantization
1101
Implementation of Adaptive ReedSolomon Decoder
1111
Soft Computing Approach to Industrial Engineering II
1115
A Relationship Between Products Evaluation and IT Systems Assurance
1125
The Air Pollution Constraints Considered Best Generation Mix
1129
Gesture Recognition by Attention Control Method
1139
Ranking Functions Perceptrons and Associated Probabilities
1143
System Architecture Analysis of a Hybrid Watermarking Method
1145
Intelligent Multimedia Service System
1146
Watermarking with Association Rules Alignment
1159
A General Fuzzy Min Max Neural Network
1160
Condition Monitoring Capability Developed Through a Knowledge
1173
Extracting High Quality Scenario
1174
Improved Method of Spread Spectrum Watermarking Techniques
1175
An Approach to Automatic Text Production
1187
Multimedia Retrieval I
1190
Intelligent Watermarking Algorithms
1193
Effective Video Scene Detection Approach Based on Cinematic Rules
1197
Physiological Modeling and Simulation for Aerobic Circulation
1204
Neural Network Based Image Retrieval
1210
Improved Quantization Watermarking with an Adaptive Quantization Step Size
1212
Knowledge Based Intelligent Systems for Health Care
1218
Method for Searching Similar Images Using Quality Index Measurement
1224
Implementation of Image Steganographic System Using Wavelet Zerotree
1226
Leximancer Concept Mapping of Patient Case Studies
1232
A RSTInvariant Robust DWTHMM Watermarking Algorithm
1233
Automated Information Mining on Multimedia TV News Archives
1238
Preprocessing for Extracting Information from Medical Record
1246
Soft Computing Techniques and Their Applications II
1248
A Distributed Backup Agent Based on Grid Computing Architecture
1252
Health Support Intelligent System for Diabetic Patient by Mobile Phone
1260
Automatic Extraction System of a Kidney Region Based on the QLearning
1261
An Intelligent Extracting Web Content Agent on the Internet
1265
Intelligent Learning Environment
1274
Word Sense Disambiguation of Thai Language with Unsupervised Learning
1275
Trend of Fuzzy Multivariant Analysis in Management Engineering
1283
A Visualization System for Organizing and Sharing Research Information
1288
Binary Neural Networks A CMOS Design Approach
1291
Experience Management and Information Systems
1298
Automatic Generation of Answers Using Solution Network
1303
Automatic Detection of Failure Patterns Using Data Mining
1312
Knowledge Level Design Support
1317
Automatic Classification Using Decision Tree and Support Vector Machine
1325
A New Algorithm to Discover PageAction Rules on Web HengLi Yang and QingFung Lin
1331
Mining Association Rules from Distorted Data for Privacy Preservation Peng Zhang Yunhai Tong Shiwei Tang and Dongqing Yang
1345
Individualized Product Design by Evolutionary Algorithms Maik Maurer and Udo Lindemann
1359
Building the Fuzzy Control System Based on the Pilot Knowledge Michał Lower Dariusz Krol and Bogusław Szlachetko
1373
Author Index 917
1381
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information