Knowledge-Based Intelligent Information and Engineering Systems: Pt. I: 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, ProceedingsDear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established for almost a decade, and it cont- ues each year to attract participants from all geographical areas of the world, including Europe, the Americas, Australasia and the Paci?c Rim. The KES conferences cover a wide range of intelligent systems topics. The broad focus of the conference series is the theory and applications of intelligent systems. From a pure research ?eld, intel- gent systems have advanced to the point where their abilities have been incorporated into many business and engineering application areas. KES 2005 provided a valuable mechanism for delegates to obtain an extensive view of the latest research into a range of intelligent-systems algorithms, tools and techniques. The conference also gave de- gates the chance to come into contact with those applying intelligent systems in diverse commercial areas. The combination of theory and practice represented a unique opp- tunity to gain an appreciation of the full spectrum of leading-edge intelligent-systems activity. The papers for KES 2005 were either submitted to invited sessions, chaired and organized by respected experts in their ?elds, or to a general session, managed by an extensive International Program Committee, or to the Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP) Workshop, managed by an International Workshop Technical Committee. |
Contents
Soft Computing Techniques in Stock Markets | 1 |
Estimation of the Hierarchical Structure of a Video Sequence | 8 |
Minority Game and the Wealth Distribution in the Artificial Mieko TanakaYamawaki Market | 15 |
Using Relevance Feedback to Learn Both the Distance Measure | 16 |
Managing Collaboration in a Multiagent System | 23 |
Multilevel Semantic Analysis for Sports Video | 24 |
Learning Plans with Patterns of Actions in BoundedRational Agents | 30 |
Aerial Photograph Image Retrieval Using the MPEG7 Texture Descriptors | 31 |
Multiagent Systems and Evolutionary Computing | 626 |
Parameter Space Exploration of AgentBased Models | 633 |
Nonlinear State Estimation | 635 |
Efficient Preprocessing for Large WindowBased Modular Exponentiation | 640 |
Fuzzy Logic and Neurofuzzy Modelling of Diesel Spray Penetration | 642 |
Feature Generation by Simple FLD | 643 |
Location and ContextBased Systems | 649 |
Computational Intelligence for Cyclic Gestures Recognition of a Partner Robot | 650 |
Applying TwoStage XCS Model on Global Overnight Effect | 34 |
Yet Another Induction Algorithm | 37 |
An Implementation of Learning Classifier Systems | 45 |
Probabilistic Reasoning Techniques for the Tactical Military Domain | 46 |
Network Based Engineering Design Education | 48 |
Intelligent Multimedia Solutions and the Security | 54 |
LearningbyDoing Through Metaphorical Simulation | 55 |
The Design and Implementation | 62 |
Heuristic Algorithm for Estimating Travel Speed in Traffic Signalized Networks | 69 |
ImmunityBased Systems | 75 |
A CaseBased Reasoning Approach to Formulating University Timetables | 76 |
Determination of Optimal Locations for the Variable Message Signs | 81 |
Evolutionary and Selforganizing Sensors Actuators | 84 |
A Critical Phenomenon in a Selfrepair Network by Mutual Copying | 86 |
Estimation of the Optimal Number of ClusterHeads in Sensor Network | 87 |
An Application of Information Retrieval Technique | 90 |
A Worm Filter Based on the Number of Unacknowledged Takeshi Okamoto Requests | 93 |
Mining Class Association Rules with Artificial Immune System | 94 |
Development of Integrated TransitFare Card System | 95 |
Comparison of Wavenet and Neuralnet for System Modeling | 100 |
Efficient Migration Scheme Using Backward Recovery Algorithm | 101 |
Detecting isa and partof Relations in Heterogeneous Data Flow Paolo Ceravolo and Daniel Rocacher | 104 |
Intelligent EMail Analysis News Extraction and Web Mining | 107 |
Modelling of Neuronal Growth with Synapse Formation | 108 |
Medical Diagnosis | 116 |
Generate Context Metadata Based on Biometric System | 119 |
An Incremental FPGrowth Web Content Mining | 121 |
Performance Comparison for MLP Networks | 123 |
Contribution of Biological Studies to the Understanding and Modeling | 124 |
Similarity Retrieval from TimeSeries Tropical Cyclone Observations | 128 |
Combining Machine Learned and Heuristic Rules Using GRDR | 131 |
A RuleBased and ComputationIndependent Business Modelling Language | 134 |
Web Access Path Prediction Using Fuzzy Case Based Reasoning | 135 |
Automatic Detection of Breast Tumours from Ultrasound Images | 138 |
Indoor Location Determination Using a Topological Model | 143 |
An Automatic Body ROI Determination for 3D Visualization | 145 |
Intelligent Data Processing in Process Systems and Plants | 149 |
A Promising Symbiosis | 154 |
Semantic Integration and Ontologies | 157 |
Analysis Between Lifestyle Family Medical History | 161 |
Development of Engineering Ontology on the Basis of IDEF0 Activity Model | 162 |
Integrating Service Registries with OWLS Ontologies KyongHa Lee KyuChul Lee DaeWook Lee and SukHo Lee | 163 |
A Novel Approach to Retrosynthetic Analysis | 169 |
Data Integration Hub for a Hybrid Paper Search | 170 |
Intelligent Hybrid Systems and Control | 172 |
Reconfigurable PowerAware Scalable Booth Multiplier | 176 |
Effective Information Sharing Using Concept Mapping | 177 |
Base Reference Analytical Hierarchy Process for Engineering Process Selection | 184 |
A Hybrid Tabu Search Based Clustering Algorithm | 186 |
A Multiagent Model for Intelligent Distributed Control Systems | 191 |
Edge Detection in Digital Image Using Variable Template Operator YoungHyun Baek OhSung Byun SungRyong Moon and DeokSoo Baek | 195 |
Study on the Development of Design Rationale Management System | 198 |
An HILS and RCP Based Interworking Scheme for Computational Evaluation | 200 |
Combining Demographic Data with Collaborative Filtering | 201 |
Intelligent Agent Technology and Applications I | 205 |
Computer Vision Image Processing and Retrieval | 206 |
AgentBased Workflows Knowledge Sharing and Reuse | 208 |
AgentBased Software Architecture for Simulating Distributed Negotiation | 212 |
Bayesian Inference Driven Behavior Network Architecture | 214 |
An AgentEnhanced Workflow Management System | 215 |
A Multiagent Framework for NET | 219 |
Knowledge Sharing Between Design and Manufacture Sean D Cochrane Keith Case Robert I Young Jenny A Harding | 221 |
Face Recognition by Multiple Classifiers a DivideandConquer Approach | 225 |
On an IT Security Framework | 226 |
Emotional Intelligence and Smart Systems | 228 |
Investigating the Transport Communicating Rates of Wireless Networks | 233 |
A Hybrid Approach to Determining the Best Combination | 235 |
Agent Team Coordination in the Mobile Agent Network | 240 |
Emergence of Immune Memory and Tolerance | 242 |
EmotionBased Smart Recruitment System | 243 |
Forming Proactive Team Cooperation by Observations Yu Zhang and Richard A Volz | 247 |
Multimedia Authentication and Watermarking Applications | 249 |
Intelligent Design Support Systems | 255 |
Research on Confidential Level Extended BLP Model | 257 |
Emotional Extraction System by Using the Color Combination | 258 |
on a Fuzzy Multiple Objective Decision Support System | 261 |
Secure Tamper Localization in Binary Document Image Authentication | 263 |
A System for Matchmaking in Mobile Environments Andrea Calı | 268 |
ContextAware Evolvable Systems | 270 |
A Seal Imprint Verification with Rotation Invariance | 272 |
Towards Integration of Web Services into Agents | 275 |
Towards Using FirstPerson Shooter Computer Games | 276 |
Robust Authenticated Encryption Scheme with Message Linkages | 281 |
An Empirical Analysis | 282 |
Structured Reasoning to Support Deliberative Dialogue | 283 |
ContextAware Computing Based Adaptable Heart | 284 |
New Directions 825 | 288 |
How to Make Robot a Robust and Interactive Communicator Yoshiyasu Ogasawara Masashi Okamoto Yukiko I Nakano | 289 |
A New Approach for Conflict Resolution of Authorization Yun Bai | 290 |
Multiple Sensor Fusion and Motion Control | 291 |
Analysis of Conversation Quanta for Conversational Knowledge Circulation | 296 |
KnowledgeBased System for Color Maps Recognition | 297 |
Human Face Detection Using Skin Color Context Awareness | 298 |
Improved Video Watermark Detection | 300 |
Approaches and Methods to Security Engineering V | 303 |
Data Engineering Knowledge Engineering and Ontologies | 304 |
Adaptive Gabor Wavelet for Efficient Object Recognition | 308 |
A Covert Timing ChannelFree Optimistic Concurrency Control Scheme | 310 |
A Matrix Representation and Mapping Approach to Knowledge Acquisition | 311 |
Secure Password Authentication for Keystroke Dynamics | 317 |
A Unifying Ontology Modeling for Knowledge AnPin Chen and MuYen Chen Management | 318 |
An Evolvable Hardware System Under Uneven Environment In Ja Jeon Phill Kyu Rhee and Hanho Lee | 319 |
A Model Transformation Based Conceptual Framework | 325 |
An Efficient Face Location Using Integrated Feature Space | 327 |
On KnowledgeBased Editorial Design System Hyojeong Jin and Ikuro Choh | 332 |
Intelligant Fuzzy Systems and Control | 336 |
Knowledge Representation for the Intelligent Legal Case Retrieval | 339 |
A Fuzzy Method for Measuring Efficiency Under Fuzzy Environment HsuanShih Lee PeiDi Shen and WenLi Chyr | 343 |
An OCR Postprocessing Approach Based on Multiknowledge Li Zhuang and Xiaoyan Zhu | 346 |
Anytime Iterative Optimal Control Using Fuzzy Feedback Scheduler | 350 |
Calendars and Topologies as Types | 352 |
Knowledge Discovery and Data Mining | 353 |
A Coupled Fuzzy Logic Control for Routers Queue Management | 357 |
Mining Quantitative Data Based on Tolerance Rough Set Model | 359 |
Iris Pattern Recognition Using Fuzzy LDA Method | 364 |
Precise Segmentation Rendering for Medical Images | 366 |
Precision Tracking Basedon Fuzzy Reasoning Segmentation | 371 |
InformationBased Pruning for Interesting Association Rule Mining | 372 |
Fuzzy Lowpass Filtering | 378 |
Fast Video Retrieval via the Statistics of Motion Within the RegionsofInterest | 381 |
Intelligent Data Analysis and Applications II | 382 |
Fuzzy Logic Based Intelligent Tool for Databases | 386 |
A New CellBased Clustering Method | 391 |
Knowledge Representation and Its Practical Application | 393 |
Design of a Digital Forensics Image Mining System Ross Brown Binh Pham and Olivier de Vel | 395 |
A Multistage FuzzyGrey Approach to Analyzing Software Development Cost | 396 |
Meeting the Need for Knowledge Management in Schools | 403 |
Advanced Network Application | 405 |
Aspects of Consideration When Designing | 410 |
Improved Image Coding with Classified VQ and SideMatch VQ | 411 |
Evaluating the Functioning of Rules | 416 |
Capturing Window Attributes for Extending Web Browsing History Records | 418 |
Knowledge Management for Robot Activities in a Real World Context | 422 |
Creativitiy Support Environment and Its Social Applications | 423 |
Block Standstill and Homogeneity Based Fast Motion Estimation Algorithm | 425 |
Temporal Knowledge Representation and Reasoning Model | 430 |
Position Estimation for Goods Tracking System Using Mobile Detectors | 431 |
Logics for Specifying Verifying and Reasoning | 437 |
Improving Image Quality for JPEG Compression | 442 |
The Architecture to Implement the Home Automation Systems | 445 |
Approaches and Methods into Security Engineering III | 446 |
PersonCentered Care as Creative Problem Solving | 451 |
Separated Ethernet Algorithm for Intelligent Building Network Integration | 452 |
Efficient Revocation of Security Capability | 453 |
A Hybrid Method of Data Hiding and Image Compression | 463 |
Design and Evaluation of an SARHR Scheme | 465 |
An Efficient and Secured Media Access Mechanism | 470 |
Collective Intelligence | 472 |
Dynamic Integrated Model for Distributed Multimedia System | 476 |
A Study of Power Network Stabilization Using an Artificial Neural Network | 479 |
Cryptographic Protocol Design Concept with Genetic Algorithms Kyeongmo Park and Chuleui Hong | 483 |
Autonomous Synchronization Scheme Access Control for Sensor Network | 487 |
Intelligent and Effective Digital Watermarking Scheme | 492 |
Multimedia Signal Processing | 497 |
Communicative Intelligent I | 500 |
A Programmable Pipelined Queue for Approximate String Matching Mitsuaki Nakasumi | 503 |
Chance Discovery I | 511 |
Distributed Web Integration with Multiagent Data Mining | 513 |
A Mobile Agent Approach to Intrusion Detection in Network Systems Grzegorz Kolaczek Agnieszka PieczynskaKuchtiak Krzysztof Juszczyszyn | 514 |
Computational Methods for Intelligent Neurofuzzy Applications | 518 |
The Interactive Evolutionary Computation Based on the Social Distance | 526 |
A Propagation Strategy Implemented in Communicative Environment Dariusz Krol | 527 |
Local Feature Analysis with Class Information | 532 |
A Context of Creative Design | 533 |
Supporting Exploratory Data Analysis by Preserving Contexts | 540 |
Fault Diagnosis of Discrete Event Systems Using Place Invariants | 541 |
Chance Discovery and the Disembodiment of Mind | 547 |
Adaptive Fuzzy OutputFeedback Controller for SISO Affine Nonlinear Systems | 549 |
Modeling the Discovery of Critical Utterances | 554 |
Information Hiding and Multimedia Signal Processing | 561 |
OnLine Reinforcement Learning | 562 |
Copyright Authentication Enhancement of Digital Watermarking | 567 |
Optimizing Linear Adaptive Broadside Array Antenna | 568 |
Defining and Detecting Emergence in Complex Networks | 573 |
Stability in Web Server Performance with HeavyTailed Distribution Takuo Nakashima and Mamoru Tsuichihara | 575 |
Compressed Domain Video Watermarking in Motion Vector | 580 |
Annealing Sensor Networks Andrew Jennings and Daud Channa | 581 |
Using Normal Vectors for Stereo Correspondence Construction JungShiong Chang Arthur ChunChieh Shih HongYuan Mark Liao | 582 |
Measuring Global Behaviour of Multiagent Systems | 587 |
Recognizing and Simulating Sketched Logic Circuits | 588 |
Color Image Restoration Using Explicit Local Segmentation | 589 |
A Lossless Watermarking Technique for Halftone Images | 593 |
In Use Parameter Estimation of Inertial Sensors | 595 |
Weight Training for Performance Optimization in Fuzzy Neural Network | 596 |
Information Engineering and Ubiquitous Computing | 602 |
Optimal Design Using Clonal Selection Algorithm | 604 |
KnowledgeBased Fuzzy Control of PilotScale SBR for Wastewater Treatment | 608 |
Soft Computing Techniques and Their Applications I | 611 |
A New Technique of Determining Speakers Intention for Sentences | 612 |
CSFs for HCI in Ubiquitous Computing Environments | 616 |
Analysis of RED with Multiple ClassBased Queues | 618 |
New Approach for Speedingup Technique of the Retrieval | 619 |
Control System for Optimal Flight Trajectories for Terrain Collision Avoidance | 622 |
Learning Behaviors of the Hierarchical Structure Stochastic Automata | 624 |
eLearning and | 651 |
Building Hyperheuristics Through Ant Colony Optimization | 654 |
A P2PBased System for Service Discovery from a Mobile Terminal | 655 |
Influence of Music Listening on the Cerebral Activity by Analyzing EEG | 657 |
A Pedagogical Overview on eLearning | 658 |
RealTime Cocomposing System Using Multiaspects | 661 |
An Efficient Eye Location Using ContextAware Binarization Method Jo Nam Jung Mi Young Nam and Phill Kyu Rhee | 662 |
Intelligent Agent Technology and Applications II | 664 |
Modeling Understanding Level of Learner in Collaborative Learning | 665 |
Ubiquitous Pattern Recognition | 668 |
Design and Implementation of ContextAwareness Processor | 670 |
iJADE Tourist Guide A Mobile LocationAwareness AgentBased System | 671 |
Dynamic Generation of Diagrams for Supporting Solving Process | 673 |
New Logical Classes of Plausibility Functions in DempsterShafer Theory | 675 |
Integrated Management of Multilevel Road Network | 677 |
The Design and Implementation | 678 |
Information TechnologyBased Educational Software Framework | 681 |
Person Tracking with Infrared Sensors Taisuke Hosokawa and Mineichi Kudo | 682 |
Music Plagiarism Detection Using Melody Databases | 684 |
BehaviorBased Blind GoalOriented Robot Navigation by Fuzzy Logic Meng Wang and James N K Liu | 686 |
A WebBased Information Communication Ethics Education System | 688 |
Entropy Criterion for ClassifierIndependent Feature Selection | 689 |
iJADE Reporter An Intelligent Multiagent Based Context | 693 |
Design of a Web Based Lab Administration System | 694 |
Finding and Autolabeling of Task Groups on EMails and Documents | 696 |
Architecture of a Web Operating System Based on Multiagent Jose Aguilar Niriaska Perozo Edgar Ferrer and Juan Vizcarrondo Systems | 700 |
Experiences with Pair and Tri Programming in a Second Level Course | 701 |
Person Recognition by Pressure Sensors | 703 |
Classification and Skimming of Articles for an Effective News Browsing | 704 |
A Study of Train Group Operation Multiagent Model Oriented to RITS Yangdong Ye Zundong Zhang Honghua Dai and Limin Jia | 707 |
Logic Based Intelligent Information Systems | 708 |
Extraction and Revision of Signboard Images for Recognition | 709 |
eBased Systems in Education Commerce and Health | 713 |
Representation of Procedural Knowledge of an Intelligent Agent | 714 |
ECA Rule Based Timely Collaboration Among Businesses | 721 |
Smart Systems | 722 |
Detecting Search Engine Spam from a Trackback Network in Blogspace Masahiro Kimura Kazumi Saito Kazuhiro Kazama and Shinya Sato | 723 |
Nonalethic Reasoning in Distributed Systems | 724 |
The Searching Methods of Mobile Agents | 728 |
Analysis for Adaptability of PolicyImproving System with a Mixture Model | 730 |
A Connectionist Model for Predicate Logic Reasoning | 732 |
KnowledgeBased RDF Specification for Ubiquitous Healthcare Services | 735 |
Synthetic Character with Bayesian Network and Behavior Network | 737 |
Parallel Stochastic Optimization for Humanoid Locomotion | 738 |
A Time Judgement System Based on an Association Mechanism | 742 |
Visualizing Dynamics of the Hot Topics | 745 |
A Deductive Semantic Brokering System | 746 |
ResponseDriven WebBased Assessment System Sylvia Encheva and Sharil Tumin | 749 |
Intelligent Environments for NextGeneration eMarkets | 751 |
Intelligent Consumer Purchase Intention Prediction System for Green Products | 752 |
IntelligenceBased Educational Package on Fluid Mechanics | 756 |
Intelligent Systems for eBusiness and eLearning II | 758 |
Specifying Distributed Authorization with Delegation | 761 |
Computational Biology and Bioinformatics | 763 |
A My Page Service Realizing Method by Using Market Expectation Engine | 765 |
Dynamic Location Management for OnDemand Car Sharing System | 768 |
Protein Motif Discovery with Linear Genetic Programming | 770 |
Multiagent Modeling of Peer to Peer Communication | 772 |
Intelligent Data Analysis Decision Making and Modelling Adaptive Financial | 775 |
Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data | 777 |
A CaseOriented Game for Business Kenji Nakano and Takao Terano Learning | 779 |
Development of Judging Method of Understanding Level in Web Learning | 781 |
Rule Generation Using NN and GA for SARSCoV Cleavage Site Prediction | 785 |
A Medical Advisory System | 789 |
A Hybrid Approach to Combine HMM and SVM Methods | 792 |
eLearning Materials Development Based on Abstract Analysis | 794 |
Agents in Bioinspired Computations | 799 |
Shared Learning Vector Quantization in a New Agent Architecture | 806 |
Study on the Velocity of Saccadic Eye Movements | 808 |
Relative Magnitude of Gaussian Curvature from Shading Images | 813 |
Adaptation on the Commons | 820 |
Innovations in Intelligent Agents | 821 |
Intelligent Information Processing for Remote Sensing | 827 |
An Automated Argument System Based on Logic | 830 |
Agent Technology for Coordinating UAV Target Tracking | 831 |
Supporting Adaptive Learning with High Level Timed Petri Shang Gao Zili Zhang Jason Wells and Igor Hawryszkiewycz Nets | 834 |
A Profiling Based Intelligent Resource Allocation System | 840 |
Exploring the Effective Search Context | 841 |
A BeliefDesireIntention Model of Confidence | 844 |
Generating CG Movies Based on a Cognitive Model of Shot Transition Kazunori Okamoto Yukiko I Nakano Masashi Okamoto | 848 |
Tropical Cyclone Eye Fix Using Genetic Algorithm with Temporal Information | 854 |
A Delegation Model for Designing Collaborative Multiagent Systems | 858 |
Sustainable Memory System Using Global and Conical Spaces | 861 |
Classifier Fusion to Predict Breast Cancer Tumors | 866 |
Regularized Feature Extractions and Support Vector Machines | 873 |
Locomotion Control Technique for Immersive Conversation Environment | 875 |
A Robust and Invisible Watermarking of 3D Triangle Meshes | 881 |
Distributed Visual Interfaces for Collaborative Exploration of Data Spaces | 887 |
Analysis and Synthesis of HelpDesk Responses Yuval Marom and Ingrid Zukerman | 890 |
Attribute Intensity Calculating Method from Evaluative Sentences | 893 |
Extended Fuzzy Description Logic ALCN | 896 |
Designing a Tool for Configuring an Intelligent and Flexible WebBased System | 901 |
Development of a New Vocal Cords Based on Human Biological Structures | 908 |
Weak Key Analysis and Microcontroller Implementation | 910 |
An Experimental Study on Computer Programming with Linguistic Expressions | 911 |
Semantic Discovery of Web Services | 915 |
Ontology Modeling and Storage System for Robot Context Understanding | 922 |
Effect of Direct Communication in Ant System | 925 |
Clustering Categorical Streams Using Attribute Selection | 929 |
ActivityObject Bayesian Networks for Detecting Occluded Objects | 937 |
Experience Management and Knowledge Management | 938 |
Combining an OrderSemisensitive Text Similarity and Closest Fit Approach | 943 |
Design of a Simultaneous Mobile Robot Localization | 945 |
A Framework of Checking Subsumption Relations Between Composite Concepts | 953 |
An Adaptive Forecasting Method for Data Streams | 957 |
Mining Classification Rules Using Evolutionary Multiobjective Algorithms | 959 |
TwoPhase Path Retrieval Method for Similar XML Document Retrieval | 967 |
Computational Intelligence Tools Techniques and Algorithms | 972 |
Using Artificial Neural Network Ensembles to Extract Data Content | 974 |
A Mutual Influence Algorithm for Multiple Concurrent Negotiations | 986 |
Network Security RealTime and Fault Tolerant Systems | 987 |
Program Simplification in Genetic Programming for Object Classification | 988 |
Algorithms for CTL System Modification | 1000 |
Wavelength Converter Assignment Problem in All Optical WDM Networks | 1004 |
Multimedia Security and Stegnography | 1005 |
An Efficient MDS Algorithm for the Analysis | 1015 |
A Preliminary Design for a PrivacyFriendly Free P2P Media File | 1018 |
Mobile Agent System | 1021 |
SE33Intelligent IDBased Threshold System by an Encryption | 1022 |
Development of an Intelligent Information Security Evaluation Indices System | 1029 |
A New Steganography Scheme in the Domain | 1032 |
A Quantitative Trust Model Based on Multiple Evaluation Criteria | 1036 |
Method of Hiding Information in Agglutinative Language Documents | 1039 |
Adaptive Modulation and Coding Scheme | 1043 |
Performance Analysis of a Antenna Array System | 1050 |
Dual Communication System Using Wired and Wireless | 1051 |
Intelligent Tool for Enterprise Vulnerability Assessment | 1056 |
Stegnography | 1058 |
Design and Implementation of SMS Security System for Wireless Environment | 1062 |
Theory and Application of Artificial Neural Networks | 1064 |
Intelligent Method for Building Security Countermeasures | 1069 |
A Verifiable Fingerprint Vault Scheme | 1072 |
Watermaking Applications I | 1076 |
A Genetic Information Based Load Redistribution Approach | 1081 |
Audio CoFIP Contents Fingerprinting Robust Against Collusion Attack Kotaro Sonoda Ryouichi Nishimura and Yˆoiti Suzuki | 1083 |
Data Hiding in a Hologram by Modified Digital Halftoning Techniques | 1086 |
An Architecture of a Wavelet Based Approach for the Approximate Querying | 1088 |
A Low Cost and Efficient Sign Language Video Transmission System Mohsen Ashourian Reza Enteshari and Ioannis Lambadaris | 1090 |
Approaches and Methods of Security Engineering II | 1094 |
A New Watermark Surviving After Reshooting | 1099 |
A Reversible Information Hiding Scheme Based on Vector Quantization ChinChen Chang and WenChuan Wu | 1101 |
Implementation of a NetworkBased Distributed System | 1104 |
Implementation of Adaptive ReedSolomon Decoder | 1111 |
Shadow Watermark Extraction System | 1115 |
Authenticated IPv6 Packet Traceback | 1118 |
A Relationship Between Products Evaluation and IT Systems Assurance Taihoon Kim and Seungyoun Lee | 1125 |
SVGBased Countermeasure to Geometric Longjiang Yu Xiamu Niu and ShengHe Sun Attack | 1129 |
Knowledge Acqusition for Mobile Embedded Software Development | 1131 |
Gesture Recognition by Attention Control Method | 1139 |
Ranking Functions Perceptrons and Associated Probabilities | 1143 |
System Architecture Analysis of a Hybrid Watermarking Method | 1145 |
Intelligent Multimedia Service System | 1146 |
Directed Mutation Operators An Overview Stefan Berlik and Bernd Reusch | 1151 |
Watermarking with Association Rules Alignment | 1159 |
Optimum Pricing Strategy for Maximization of Profits and Chance Discovery | 1160 |
An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing | 1168 |
Extracting High Quality Scenario | 1174 |
Improved Method of Spread Spectrum Watermarking Techniques | 1175 |
Medical Text Mining and Natural Language Processing | 1180 |
An Approach to Automatic Text Production | 1187 |
Multimedia Retrieval I | 1190 |
Intelligent Watermarking Algorithms | 1193 |
Annotating Protein Interactions Using Google and Gene Ontology | 1195 |
Effective Video Scene Detection Approach Based on Cinematic Rules | 1197 |
3DWT Based Motion Suppression for Video Shot Boundary Detection | 1204 |
Neural Network Based Image Retrieval | 1210 |
Improved Quantization Watermarking with an Adaptive Quantization Step Size | 1212 |
Shot Type Classification in Sports Video Using Fuzzy Information Granular | 1217 |
Knowledge Based Intelligent Systems for Health Care | 1218 |
Method for Searching Similar Images Using Quality Index Measurement | 1224 |
Representing Association Classification Rules Mined from Health Data | 1225 |
Implementation of Image Steganographic System Using Wavelet Zerotree | 1226 |
Edge ProjectionBased Image Registration | 1231 |
Leximancer Concept Mapping of Patient Case Studies | 1232 |
A RSTInvariant Robust DWTHMM Watermarking Algorithm | 1233 |
Automated Information Mining on Multimedia TV News Archives | 1238 |
Soft Computing Approach to Industrial Engineering | 1245 |
Preprocessing for Extracting Information from Medical Record | 1246 |
Soft Computing Techniques and Their Applications II | 1248 |
A Distributed Backup Agent Based on Grid Computing Architecture HueyMing Lee and ChengHsiung Yang | 1252 |
A Dynamic Supervising Model Based on Grid Environment HueyMing Lee ChaoChi Hsu and MuHsiu Hsu | 1258 |
Health Support Intelligent System for Diabetic Patient by Mobile Phone | 1260 |
Automatic Extraction System of a Kidney Region Based on the QLearning | 1261 |
An Intelligent Extracting Web Content Agent on the Internet | 1265 |
A Rendering System for Image Extraction from Music and Dance Chihaya Watanabe and Hisao Shiizuka | 1272 |
Intelligent Learning Environment | 1274 |
Word Sense Disambiguation of Thai Language with Unsupervised Learning | 1275 |
Trend of Fuzzy Multivariant Analysis in Management Engineering | 1283 |
A Visualization System for Organizing and Sharing Research Information | 1288 |
Binary Neural Networks A CMOS Design Approach | 1291 |
Fuzzy Logic Experience Model in Human Resource Management Zhen Xu Binheng Song and Liang Chen | 1298 |
Automatic Generation of Answers Using Solution Network | 1303 |
Other editions - View all
Knowledge-Based Intelligent Information and Engineering Systems: 9th ... Rajiv Khosla Limited preview - 2005 |
Knowledge-Based Intelligent Information and Engineering Systems: Pt. I: 9th ... Robert J. Howlett No preview available - 2005 |
Knowledge-Based Intelligent Information and Engineering Systems: 9th ... Rajiv Khosla No preview available - 2005 |
Common terms and phrases
Abstract agent analysis application approach Artificial Intelligence association rules attributes Bayesian network behavior Berlin Heidelberg 2005 calculated chatbot classified clonal selection cluster communication concept data mining database decision defined detection developed distribution documents domain Engineering environment evaluation example extracted feature feature extraction filter framework frequency fuzzy fuzzy sets genetic algorithm goal graph Heidelberg IEEE iJADE implementation input integration intelligent interaction Japan KeyGraph Khosla knowledge KOSP language learning LNAI membership function method mobile neural network node object OFDM ontology operation optimal output paper parameters particle filter pattern performance problem proposed query represent retrieval scenario scheme selection semantic server shown shows signal simulation Smart Clients solution Springer-Verlag Berlin Heidelberg structure Table techniques Technology TFIDF tion University variables vector watermark wireless