Upload
hadat
View
221
Download
0
Embed Size (px)
Citation preview
Lecture Notes in Artificial Intelligence 3801Edited by J. G. Carbonell and J. Siekmann
Subseries of Lecture Notes in Computer Science
Yue Hao Jiming Liu Yuping WangYiu-ming Cheung Hujun YinLicheng Jiao Jianfeng MaYong-Chang Jiao (Eds.)
ComputationalIntelligenceand Security
International Conference, CIS 2005Xi’an, China, December 15-19, 2005Proceedings, Part I
13
Volume Editors
Yue HaoE-mail: [email protected]
Jiming LiuE-mail: [email protected]
Yuping WangE-mail: [email protected]
Yiu-ming CheungE-mail: [email protected]
Hujun YinE-mail: [email protected]
Licheng JiaoE-mail: [email protected]
Jianfeng MaE-mail: [email protected]
Yong-Chang JiaoE-mail: [email protected]
Library of Congress Control Number: 2005937069
CR Subject Classification (1998): I.2, H.3, H.4, H.5, F.2.2, I.4
ISSN 0302-9743ISBN-10 3-540-30818-0 Springer Berlin Heidelberg New YorkISBN-13 978-3-540-30818-8 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.
Springer is a part of Springer Science+Business Media
springeronline.com
© Springer-Verlag Berlin Heidelberg 2005Printed in Germany
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper SPIN: 11596448 06/3142 5 4 3 2 1 0
Preface
The International Conference on Computational Intelligence and Security (CIS)is an annual international conference that brings together researchers, engineers,developers and practitioners from both academia and industry to share experi-ence and exchange and cross-fertilize ideas on all areas of computational in-telligence and information security. The conference serves as a forum for thedissemination of state-of-the-art research and the development, and implemen-tations of systems, technologies and applications in these two broad, interrelatedfields. This year CIS 2005 was co-organized by the IEEE (Hong Kong) Compu-tational Intelligence Chapter and Xidian University, and co-sponsored by HongKong Baptist University, National Natural Science Foundation of China, KeyLaboratory of Computer Networks and Information Security of the Ministry ofEducation of China, and Guangdong University of Technology. CIS 2005 receivedin total 1802 submissions from 41 countries and regions all over the world. Allof them were strictly peer reviewed by the Program Committee and expertsin the field. Finally, 337 high-quality papers were accepted yielding an accep-tance rate of 18.7%. Among them, 84 papers are the extended papers and 253are the regular papers. The conference was greatly enriched by a wide range oftopics covering all areas of computational intelligence and information security.Furthermore, tutorials and workshops were held for discussions of the proposedideas. Such practice is extremely important for the effective development of thetwo fields and computer science in general.
We would like to thank the organizers: the IEEE (Hong Kong) ComputationalIntelligence Chapter and Xidian University for their great contributions and ef-forts in this big event. Thanks also go to the sponsors, the Institute of Electricaland Electronics Engineers (IEEE), Hong Kong Baptist University (HKBU), Na-tional Natural Science Foundation of China, Key Laboratory of Computer Net-works and Information Security of the Ministry of Education of China, Guang-dong University of Technology (GDUT), and the publisher, Springer, for theirunremitting support and collaboration to make CIS 2005 possible and successful.Furthermore, we would like to sincerely thank the Program Committee mem-bers and additional reviewers for their professional, efficient input to the reviewprocess. Last but not the least, the Organizing Committee is much appreciatedfor their enormous efforts and marvelous work.
October 2005 Yue Hao and Jiming LiuGeneral Co-chairs of CIS 2005
Yuping Wang, Yiu-ming CheungHujun Yin and Licheng Jiao
Program Committee Co-chairs of CIS 2005Jianfeng Ma and Yong-Chang Jiao
Organizing Committee Co-chairs of CIS 2005
Organization
CIS 2005 was organized by IEEE (Hong Kong) Computational Intelligence Chap-ter and Xidian University.
General Co-chairs
Yue Hao Xidian University, ChinaJiming Liu Hong Kong Baptist University, Hong Kong,
China
Steering Committee Chair
Yiu-ming Cheung Hong Kong Baptist University, Hong Kong,China
Organizing Committee
Jianfeng Ma Xidian University, China (Co-chair)Yong-Chang Jiao Xidian University, China (Co-chair)Hailin Liu Guangdong University of Technology, China
(Tutorial and Workshop Chair)Hecheng Li Xidian University, China (Treasurer)Lixia Han Xidian University, China (Publicity Chair)Yuen-tan Hou Hong Kong Baptist University, Hong Kong,
China (Publicity Chair)Liang Ming Xidian University, China (Registration Chair)Yuanyuan Zuo Xidian University, China (Local Arrangement
Chair)Shuguang Zhao Xidian University, China (Publication Chair)Kapluk Chan Nanyang Technological University, Singapore
(Asia Liaison)Yan Wu Xidian University, China (Secretary)Jingxuan Wei Xidian University, China (Secretary)Rongzu Yu Xidian University, China (Web Master)
Program Committee
Yiu-ming Cheung (Co-chair) (Hong Kong, China)Licheng Jiao (Co-chair) (China)
VIII Organization
Yuping Wang (Co-chair) (China)Hujun Yin (Co-chair) (UK) Michel Ab-dalla (France)Khurshid Ahmad (UK)Francesco Amigoni (Italy)Sherlock Au (Hong Kong, China)Dunin-Keplicz Barbara (Poland)Mike Barley (New Zealand)Chaib-draa Brahim (Canada)Tony Browne (UK)Scott Buffett (Canada)Matthew Casey (UK)Dario Catalano (France)Kapluk Chan (Singapore)Keith Chun-chung Chan (Hong Kong,China)Michael Chau (Hong Kong, China)Sheng Chen (UK)Songcan Chen (China)Zheng Chen (China)Xiaochun Cheng (UK)William Cheung (Hong Kong, China)Sungzoon Cho (Korea)Paolo Ciancarini (Italy)Stelvio Cimato (Italy)Helder Coelho (Portugal)Carlos Coello (USA)Emilio Corchado (Spain)Wei Dai (Australia)Joerg Denzinger (Canada)Tharam Dillon (Australia)Tom Downs (Australia)Richard Everson (UK)Bin Fang (China)Marcus Gallagher (Australia)Matjaz Gams (Slovenia)John Qiang Gan (UK)Joseph A. Giampapa (USA)Maria Gini (USA)Eric Gregoire (France)Heikki Helin (Finland)Tony Holden (UK)Vasant Honavar (USA)Mike Howard (USA)Huosheng Hu (UK)
Yupu Hu (China)Marc van Hulle (Belgium)Michael N. Huhns (USA)Samuel Kaski (Finland)Sokratis Katsikas (Greece)Hiroyuki Kawano (Japan)John Keane (UK)Alvin Kwan (Hong Kong, China)Kwok-Yan Lam (Singapore)Loo Hay Lee (Singapore)Bicheng Li (China)Guoping Liu (UK)Huan Liu (USA)Zhe-Ming Lu (Germany)Magdon-Ismail Malik (USA)Xiamu Niu (China)Wenjiang Pei (China)Hartmut Pohl (Germany)Javier Lopez (Spain)V. J. Rayward-Smith (UK)Henry H.Q. Rong (Hong Kong, China)Guenter Rudolph (Germany)Patrizia Scandurra (Italy)Bernhard Sendhoff (Germany)Michael Small (Hong Kong, China)Vic Rayward Smith (UK)Fischer-Huebner Simone (Sweden)Stephanie Teufel (Switzerland)Peter Tino (UK)Christos Tjortjis (UK)Vicenc Torra (Spain)Kwok-ching Tsui (Hong Kong, China)Bogdan Vrusias (UK)Bing Wang (UK)Ke Wang (Canada)Haotian Wu (Hong Kong, China)Gaoxi Xiao (Singapore)Hongji Yang (UK)Shuang-Hua Yang (UK)Zheng Rong Yang (UK)Xinfeng Ye (New Zealand)Benjamin Yen (Hong Kong, China)Dingli Yu (UK)Jeffrey Yu (Hong Kong, China)Qingfu Zhang (UK)
Organization IX
Additional Reviewers
Ailing ChenAsim Karimbian YangBin SongBinsheng LiuBo AnBo ChenBo ChengBo LiuBo ZhangBobby D. GerardoByunggil LeeChangan YuanChanghan KimChangji WangChangjie WangChangsheng YiChanyun YangChiachen LinChienchih YuChinhung LiuChong LiuChong WangChong WuChongzhao HanChundong WangChunhong CaoChunxiang GuChunxiang XuChunyan LiangCongfu XuCuiran LiDaoyi DongDarong HuangDayong DengDechang PiDeji WangDong ZhangDongmei FuEnhong ChenEunjun YoonFan ZhangFang Liu
Fei LiuFei YuFeng LiuFengzhan TianFuyan LiuFuzheng YangGuangming ShiGuicheng WangGuiguang DingGuimin ChenGumin JeongGuogang TianGuojiang FuGuowei YangHaewon ChoiHaiguang ChenHaiyan JinHansuh KooHeejo LeeHeejun SongHong LiuHong ZhangHongbin ShenHongbing LiuHongfang ZhouHongsheng SuHongtao WuHongwei GaoHongwei HuoHongxia CaiHongzhen ZhengHorong HenryHsinhung WuHua XuHua ZhongHuafeng DengHuanjun LiuHuantong GengHuaqiu WangHui WangHuiliang ZhangHuiying LiHyun Sun Kang
Hyungkyu YangHyungwoo KangJeanshyan WangJian LiaoJian WangJian ZhaoJianming FuJianping ZengJianyu XiaoJiawei ZhangJieyu MengJiguo LiJing HanJing LiuJingmei liuJinlong WangJinqian LiangJin-Seon LeeJinwei WangJongwan KimJuan ZhangJun KongJun MaJun ZhangJunbo GaoJuncheol ParkJunying ZhangK. W. ChauKang-Soo YouKanta MatsuuraKe LiaoKeisuke TakemoriKihyeon KwonKongfa HuKyoungmi LeeLei SunLi WangLiang ZhangLiangli MaLiangxiao JiangLianying ZhouLiaojun PangLibiao Zhang
X Organization
Licheng WangLiefeng BoLijun WuLimin WangLin LinLing ChenLing ZhangLingfang ZengLinhuan WangLiping YanMeng ZhangMengjie YuMing DongMing LiMing LiMinxia LuoMurat EkinciNi ZhangNoria FoukiaOmran MahamedPengfei LiuPing GuoPurui SuQi LiuQi XiaQian ChenQiang GuoQiang WangQiang WeiQiang ZhangQin WangQinghao MengQinghua HuQiuhua ZhengQizhi ZhangRavi PrakashRonghua ShangRongjun LiRongqing YiRongxing LuRuo HuSangho ParkSangyoung LeeSeonghoon LeeSeunggwan Lee
Shangmin LuanShaowei WangShaozhen ChenShengfeng TianShenghui SuShi MinShifeng RuiShiguo LianShuping YaoSinjae KangSongwook LeeSooyeon ShinSunghae JunSungjune HongSuresh SundaramTangfei TaoTao GuanTao PengTeemupekka VirtanenTerry HouseTianding ChenTianyang DongTieli SunTingzhu HuangyW. X. WangWei ChenWei HuWei YanWei ZhangWeiguo HanWeijun ChenWeimin XueWeixing WangWeizhen YanWencang ZhaoWenjie LiWen QuanWensen AnWenyuan WangXia XuXiangchong LiuXiangchu FengXiangyong LiXianhua DaiXiaofeng Chen
Xiaofeng LiuXiaofeng RongXiaohong HaoXiaohui YuanXiaoliang HeXiaoyan TaoXiaozhu LinXijian PingXinbo GaoXinchen ZhangXingzhou ZhangXinling ShiXinman ZhangXiuPing GuoXiuqin ChuXuebing ZhouXuelong ChenYajun GuoYan WangYanchun LiangYao WangYeonseung RyuYi LiYibo ZhangYichun LiuYifei PuYijia ZhangYijuan ShiYijun MoYilin LinYiming ZhouYinliang ZhaoYintian LiuYong XuYong ZhangYongjie WangYongjun LiYuan ShuYuan YuanYubao LiuYufeng ZhangYufu NingYukun CaoYunfeng LiYuqian Zhao
Organization XI
Zaobin GanZhansheng LiuZhaofeng MaZhenchuan ChaiZhengtao JiangZhenlong DuZhi Liu
Zhian ChengZhicheng ChenZhigang MaZhihong DengZhihua CaiZhiqing MengZhisong Pan
Zhiwei NiZhiwu LiaoZhong LiuZiyi ChenZongben Xu
Sponsoring Institutions
IEEE (Hong Kong) Computational Intelligence ChapterXidian UniversityHong Kong Baptist UniversityNational Natural Science Foundation of ChinaGuangdong University of Technology
Table of Contents – Part I
Learning and Fuzzy Systems
Empirical Analysis of Database Privacy Using Twofold IntegralsJordi Nin, Vicenc Torra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Intrusion Detection Alert Verification Based on Multi-level FuzzyComprehensive Evaluation
Chengpo Mu, Houkuan Huang, Shengfeng Tian . . . . . . . . . . . . . . . . . . . 9
Improving the Scalability of Automatic ProgrammingHenrik Berg, Roland Olsson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Texture Segmentation by Unsupervised Learning and HistogramAnalysis Using Boundary Tracing
Woobeom Lee, Wookhyun Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
An Improved Bayesian Network Learning Algorithm Based onDependency Analysis
Fengzhan Tian, Shengfeng Tian, Jian Yu, Houkuan Huang . . . . . . . . . 33
Mining Common Patterns on GraphsIvan Olmos, Jesus A. Gonzalez, Mauricio Osorio . . . . . . . . . . . . . . . . . 41
Moderated Innovations in Self-poised Ensemble LearningRicardo Nanculef, Carlos Valle, Hector Allende,Claudio Moraga . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
An Adaptive Framework for Solving Multiple Hard Problems UnderTime Constraints
Sandip Aine, Rajeev Kumar, P.P. Chakrabarti . . . . . . . . . . . . . . . . . . . . 57
An RLS-Based Natural Actor-Critic Algorithm for Locomotion of aTwo-Linked Robot Arm
Jooyoung Park, Jongho Kim, Daesung Kang . . . . . . . . . . . . . . . . . . . . . 65
Dynamic Clustering Using Multi-objective Evolutionary AlgorithmEnhong Chen, Feng Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Multimodal FeedForward Self-organizing MapsAndrew P. Paplinski, Lennart Gustafsson . . . . . . . . . . . . . . . . . . . . . . . . 81
XIV Table of Contents – Part I
Decision Fusion Based Unsupervised Texture Image SegmentationHua Zhong, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Speaker Adaptation Techniques for Speech Recognition with aSpeaker-Independent Phonetic Recognizer
Weon-Goo Kim, MinSeok Jang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Fuzzy QoS Controllers in Diff-Serv Scheduler Using Genetic AlgorithmsBaolin Sun, Qiu Yang, Jun Ma, Hua Chen . . . . . . . . . . . . . . . . . . . . . . . 101
Neural Network Based Algorithms for Diagnosis and Classification ofBreast Cancer Tumor
In-Sung Jung, Devinder Thapa, Gi-Nam Wang . . . . . . . . . . . . . . . . . . . 107
New Learning Algorithm for Hierarchical Structure Learning AutomataOperating in P-Model Stationary Random Environment
Yoshio Mogami . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
A TFN-Based AHP Model for Solving Group Decision-Making ProblemsJian Cao, Gengui Zhou, Feng Ye . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
A Tactics for Robot Soccer with Fuzzy Logic MediatorJeongjun Lee, Dongmin Ji, Wonchang Lee, Geuntaek Kang,Moon G. Joo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Gait Control for Biped Robot Using Fuzzy Wavelet Neural NetworkPengfei Liu, Jiuqiang Han . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
A New Approach for Regression: Visual Regression ApproachDeyu Meng, Chen Xu, Wenfeng Jing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Orthogonally Rotational Transformation for Naive Bayes LearningLimin Wang, Chunhong Cao, Haijun Li, Haixia Chen,Liyan Dong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Efficient Learning Bayesian Networks Using PSOTao Du, S.S. Zhang, Zongjiang Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Improving K-Modes Algorithm Considering Frequencies of AttributeValues in Mode
Zengyou He, Shengchun Deng, Xiaofei Xu . . . . . . . . . . . . . . . . . . . . . . . 157
Distance Protection of Compensated Transmission Line UsingComputational Intelligence
S.R. Samantaray, P.K. Dash, G. Panda, B.K. Panigrahi . . . . . . . . . . 163
Table of Contents – Part I XV
Computational Intelligence for Network Intrusion Detection: RecentContributions
Asim Karim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Evolutionary Computation
Design of a Switching PID Controller Using Advanced GeneticAlgorithm for a Nonlinear System
Jung-Shik Kong, Bo-Hee Lee, Jin-Geol Kim . . . . . . . . . . . . . . . . . . . . . . 176
Preference Bi-objective Evolutionary Algorithm for ConstrainedOptimization
Yuping Wang, Dalian Liu, Yiu-Ming Cheung . . . . . . . . . . . . . . . . . . . . . 184
Self-adaptive Differential EvolutionMahamed G.H. Omran, Ayed Salman, Andries P. Engelbrecht . . . . . . 192
Steady-State Evolutionary Algorithm for Multimodal Function GlobalOptimization
Ziyi Chen, Lishan Kang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Finding Optimal Addition Chains Using a Genetic Algorithm ApproachNareli Cruz-Cortes, Francisco Rodrıguez-Henrıquez,Raul Juarez-Morales, Carlos A. Coello Coello . . . . . . . . . . . . . . . . . . . . 208
Using Reconfigurable Architecture-Based Intrinsic IncrementalEvolution to Evolve a Character Classification System
Jin Wang, Je Kyo Jung, Yong-min Lee, Chong Ho Lee . . . . . . . . . . . . 216
On the Relevance of Using Gene Expression Programming inDestination-Based Traffic Engineering
Antoine B. Bagula, Hong F. Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Model and Convergence for the Combination of Genetic Algorithm andAnt Algorithm
Jianli Ding, Wansheng Tang, Yufu Ning . . . . . . . . . . . . . . . . . . . . . . . . . 230
Moving Block Sequence and Organizational Evolutionary Algorithm forGeneral Floorplanning
Jing Liu, Weicai Zhong, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Integrating the Simplified Interpolation into the Genetic Algorithm forConstrained Optimization Problems
Hong Li, Yong-Chang Jiao, Yuping Wang . . . . . . . . . . . . . . . . . . . . . . . . 247
XVI Table of Contents – Part I
Using Ensemble Method to Improve the Performance of GeneticAlgorithm
Shude Zhou, Zengqi Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Parallel Mining for Classification Rules with Ant Colony AlgorithmLing Chen, Li Tu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
A Genetic Algorithm Approach on Reverse Logistics Optimization forProduct Return Distribution Network
Gengui Zhou, Zhenyu Cao, Jian Cao, Zhiqing Meng . . . . . . . . . . . . . . . 267
Multi-objective Evolutionary Design and Knowledge Discovery of LogicCircuits with an Improved Genetic Algorithm
Shuguang Zhao, Licheng Jiao, Jun Zhao . . . . . . . . . . . . . . . . . . . . . . . . . 273
Robust Mobile Robot Localization Using an Evolutionary Particle FilterBo Yin, Zhiqiang Wei, Xiaodong Zhuang . . . . . . . . . . . . . . . . . . . . . . . . 279
Hybrid Genetic Algorithm for Solving the Degree-Constrained MinimalBandwidth Multicast Routing Problem
Yun Pan, Zhenwei Yu, Licheng Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Using Fuzzy Possibilistic Mean and Variance in Portfolio Selection ModelWeiguo Zhang, Yingluo Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
A Novel Genetic Algorithm for Multi-criteria Minimum Spanning TreeProblem
Lixia Han, Yuping Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Intelligent Agents and Systems
A Software Architecture for Multi-agent SystemsVasu S. Alagar, Mao Zheng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
User-Oriented Multimedia Service Using Smart Sensor Agent Modulein the Intelligent Home
Jong-Hyuk Park, Jun Choi, Sang-Jin Lee, Hye-Ung Park,Deok-Gyu Lee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Meta-learning Experiences with the Mindful SystemCiro Castiello, Anna Maria Fanelli . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Learning Cooperation from Classifier SystemsTrung Hau Tran, Cedric Sanza, Yves Duthen . . . . . . . . . . . . . . . . . . . . . 329
Table of Contents – Part I XVII
Location Management Using Hierarchical Structured Agents forDistributed Databases
Romeo Mark A. Mateo, Bobby D. Gerardo, Jaewan Lee . . . . . . . . . . . . 337
On line Measurement System of Virtual Dielectric Loss Based onWavelets and LabVIEW and Correlation Technics
BaoBao Wang, Ye Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Model Checking Temporal Logics of Knowledge and Its Application inSecurity Verification
Lijun Wu, Kaile Su, Qingliang Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
A Computational Approach for Belief ChangeShangmin Luan, Guozhong Dai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Feature Selection by Fuzzy Inference and Its Application to Spam-MailFiltering
Jong-Wan Kim, Sin-Jae Kang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Design of Multiagent Framework for Cellular NetworksA.K. Sharma, Dimple Juneja . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Transitive Dependence Based Formation of Virtual OrganizationsBo An, Chunyan Miao, Zhiqi Shen, Yuan Miao, Daijie Cheng . . . . . . 375
An Agent Based Education Resource Purvey SystemXiaochun Cheng, Xin He, Xiaoqi Ma, Dongdai Zhou, Peijun Duan,Shaochun Zhong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Model of Game Agent for Auction-Based NegotiationJun Hu, Chun Guan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
An Autonomous Mobile Robot Based on Quantum AlgorithmDaoyi Dong, Chunlin Chen, Chenbin Zhang, Zonghai Chen . . . . . . . . 393
A MPC and Genetic Algorithm Based Approach for Multiple UAVsCooperative Search
Jing Tian, Yanxing Zheng, Huayong Zhu, Lincheng Shen . . . . . . . . . . 399
Self-organization Evolution of Supply Networks: System Modeling andSimulation Based on Multi-agent
Gang Li, Linyan Sun, Ping Ji, Haiquan Li . . . . . . . . . . . . . . . . . . . . . . . 405
Modeling and Analysis of Multi-agent Systems Based on π-CalculusFenglei Liu, Zhenhua Yu, Yuanli Cai . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
XVIII Table of Contents – Part I
A Cooperation Mechanism in Agent-Based Autonomic Storage SystemsJingli Zhou, Gang Liu, Shengsheng Yu, Yong Su . . . . . . . . . . . . . . . . . . 416
A Mobile Agent Based Spam Filter SystemXiaochun Cheng, Xiaoqi Ma, Long Wang, Shaochun Zhong . . . . . . . . . 422
Hexagon-Based Q-Learning to Find a Hidden Target ObjectHan-Ul Yoon, Kwee-Bo Sim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Intelligent Information Retrieval
A Naive Statistics Method for Electronic Program GuideRecommendation System
Jin An Xu, Kenji Araki . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
A Hybrid Text Classification System Using Sentential Frequent ItemsetsShizhu Liu, Heping Hu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
An Approach of Information Extraction from Web Documents forAutomatic Ontology Generation
Ki-Won Yeom, Ji-Hyung Park . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Improving Text Categorization Using the Importance of Words inDifferent Categories
Zhihong Deng, Ming Zhang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
Image Copy Detection with Rotating ToleranceMingni Wu, Chiachen Lin, Chinchen Chang . . . . . . . . . . . . . . . . . . . . . 464
Interactive and Adaptive Search Context for the User with theExploration of Personalized View Reformulation
Supratip Ghose, Geun-Sik Jo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Integrating Collaborate and Content-Based Filtering for PersonalizedInformation Recommendation
Zhiyun Xin, Jizhong Zhao, Ming Gu, Jiaguang Sun . . . . . . . . . . . . . . . 476
Interest Region-Based Image Retrieval System Based on Graph-CutSegmentation and Feature Vectors
Dongfeng Han, Wenhui Li, Xiaomo Wang, Yanjie She . . . . . . . . . . . . . 483
A Method for Automating the Extraction of Specialized Informationfrom the Web
Ling Lin, Antonio Liotta, Andrew Hippisley . . . . . . . . . . . . . . . . . . . . . . 489
Table of Contents – Part I XIX
An Incremental Updating Method for Clustering-BasedHigh-Dimensional Data Indexing
Ben Wang, John Q. Gan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Support Vector Machine
Typhoon Track Prediction by a Support Vector Machine Using DataReduction Methods
Hee-Jun Song, Sung-Hoe Huh, Joo-Hong Kim, Chang-Hoi Ho,Seon-Ki Park . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Forecasting Tourism Demand Using a Multifactor Support VectorMachine Model
Ping-Feng Pai, Wei-Chiang Hong, Chih-Sheng Lin . . . . . . . . . . . . . . . . 512
A Study of Modelling Non-stationary Time Series Using SupportVector Machines with Fuzzy Segmentation Information
Shaomin Zhang, Lijia Zhi, Shukuan Lin . . . . . . . . . . . . . . . . . . . . . . . . . 520
Support Vector Machine Based Trajectory Metamodel for ConceptualDesign of Multi-stage Space Launch Vehicle
Saqlain Akhtar, He Linshu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
Transductive Support Vector Machines Using Simulated AnnealingFan Sun, Maosong Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Input Selection for Support Vector Machines Using Genetic AlgorithmsHee-Jun Song, Seon-Gu Lee, Sung-Hoe Huh . . . . . . . . . . . . . . . . . . . . . . 544
Associating kNN and SVM for Higher Classification AccuracyChe-Chang Hsu, Chan-Yun Yang, Jr-Syu Yang . . . . . . . . . . . . . . . . . . . 550
Multi-class SVMs Based on SOM Decoding Algorithm and ItsApplication in Pattern Recognition
Xiaoyan Tao, Hongbing Ji . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Selective Dissemination of XML Documents Using GAs and SVMK.G. Srinivasa, S. Sharath, K.R. Venugopal, Lalit M. Patnaik . . . . . . 562
A Smoothing Support Vector Machine Based on Exact Penalty FunctionZhiqing Meng, Gengui Zhou, Yihua Zhu, Lifang Peng . . . . . . . . . . . . . 568
Speech Acts Tagging System for Korean Using Support Vector MachinesSongwook Lee, Jongmin Eun, Jungyun Seo . . . . . . . . . . . . . . . . . . . . . . . 574
XX Table of Contents – Part I
A New Support Vector Machine for Multi-class ClassificationZhiquan Qi, Yingjie Tian, Naiyang Deng . . . . . . . . . . . . . . . . . . . . . . . . 580
Support Vector Classification with Nominal AttributesYingjie Tian, Naiyang Deng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
A New Smooth Support Vector MachineYubo Yuan, Chunzhong Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
The Application of Support Vector Machine in the PotentialityEvaluation for Revegetation of Abandoned Lands from Coal MiningActivities
Chuanli Zhuang, Zetian Fu, Ping Yang, Xiaoshuan Zhang . . . . . . . . . . 598
Prediction of T-cell Epitopes Using Support Vector Machine andSimilarity Kernel
Feng Shi, Jing Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Radial Basis Function Support Vector Machine Based Soft-MagneticRing Core Inspection
Liangjiang Liu, Yaonan Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Direct Adaptive NN Control of a Class of Feedforward SystemsWang Dongliang, Liu Bin, Zhang Zengke . . . . . . . . . . . . . . . . . . . . . . . . 616
Swarm Intelligence
Performance of an Ant Colony Optimization (ACO) Algorithm on theDynamic Load-Balanced Clustering Problem in Ad Hoc Networks
Chin Kuan Ho, Hong Tat Ewe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Hybrid Particle Swarm Optimization for Flow Shop Scheduling withStochastic Processing Time
Bo Liu, Ling Wang, Yi-hui Jin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Particle Swarm Optimizer with C-Pg MutationGuojiang Fu, Shaomei Wang, Mingjun Chen, Ning Li . . . . . . . . . . . . . 638
Algal Bloom Prediction with Particle Swarm Optimization AlgorithmK.W. Chau . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Synthesis of the Antenna Array Using a Modified Particle SwarmOptimization Algorithm
Tengbo Chen, Yong-Chang Jiao, Fushun Zhang . . . . . . . . . . . . . . . . . . . 651
Table of Contents – Part I XXI
An Ant Colony Optimization Approach to the Degree-ConstrainedMinimum Spanning Tree Problem
Y.T. Bau, C.K. Ho, H.T. Ewe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
Crowd Avoidance Strategy in Particle Swarm AlgorithmGuimin Chen, Qi Han, Jianyuan Jia, Wenchao Song . . . . . . . . . . . . . . 663
Particle Swarm Optimization with Multiscale Searching MethodXiaohui Yuan, Jing Peng, Yasumasa Nishiura . . . . . . . . . . . . . . . . . . . . 669
Outcome-Space Branch and Bound Algorithm for Solving LinearMultiplicative Programming
Yuelin Gao, Chengxian Xu, Yueting Yang . . . . . . . . . . . . . . . . . . . . . . . . 675
A Binary Ant Colony Optimization for the Unconstrained FunctionOptimization Problem
Min Kong, Peng Tian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Data Mining
Mining Dynamic Association Rules in DatabasesJinfeng Liu, Gang Rong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
A Novel Typical-Sample-Weighted Clustering Algorithm for LargeData Sets
Jie Li, Xinbo Gao, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Mining Weighted Generalized Fuzzy Association Rules with FuzzyTaxonomies
Shen Bin, Yao Min, Yuan Bo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Concept Chain Based Text ClusteringShaoxu Song, Jian Zhang, Chunping Li . . . . . . . . . . . . . . . . . . . . . . . . . . 713
An Efficient Range Query Under the Time Warping DistanceChuyu Li, Long Jin, Sungbo Seo, Keun Ho Ryu . . . . . . . . . . . . . . . . . . . 721
Robust Scene Boundary Detection Based on AudiovisualInformation
Soon-tak Lee, Joon-sik Baek, Joong-hwan Baek . . . . . . . . . . . . . . . . . . . 729
An FP-Tree Based Approach for Mining All Strongly Correlated ItemPairs
Zengyou He, Shengchun Deng, Xiaofei Xu . . . . . . . . . . . . . . . . . . . . . . . 735
XXII Table of Contents – Part I
An Improved kNN Algorithm – Fuzzy kNNWenqian Shang, Houkuan Huang, Haibin Zhu, Yongmin Lin,Zhihai Wang, Youli Qu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
A New Integrated Personalized Recommendation AlgorithmHongfang Zhou, Boqin Feng, Lintao Lv, Zhurong Wang . . . . . . . . . . . . 747
An Improved EMASK Algorithm for Privacy-Preserving FrequentPattern Mining
Congfu Xu, Jinlong Wang, Hongwei Dan, Yunhe Pan . . . . . . . . . . . . . 752
CR*-Tree: An Improved R-Tree Using Cost ModelHaibo Chen, Zhanquan Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Grid-ODF: Detecting Outliers Effectively and Efficiently in LargeMulti-dimensional Databases
Wei Wang, Ji Zhang, Hai Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
Clustering XML Documents by Structure Based on Common NeighborXizhe Zhang, Tianyang Lv, Zhengxuan Wang, Wanli Zuo . . . . . . . . . . 771
A Generalized Global Convergence Theory of Projection-Type NeuralNetworks for Optimization
Rui Zhang, Zongben Xu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Hierarchical Recognition of English Calling Card by UsingMultiresolution Images and Enhanced Neural Network
Kwang-Baek Kim, Sungshin Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
An Novel Artificial Immune Systems Multi-objective OptimizationAlgorithm for 0/1 Knapsack Problems
Wenping Ma, Licheng Jiao, Maoguo Gong, Fang Liu . . . . . . . . . . . . . . 793
RD-Based Seeded Region Growing for Extraction of Breast Tumor inan Ultrasound Volume
Jong In Kwak, Sang Hyun Kim, Nam Chul Kim . . . . . . . . . . . . . . . . . . 799
Improving Classification for Microarray Data Sets by ConstructingSynthetic Data
Shun Bian, Wenjia Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
A Method to Locate the Position of Mobile Robot Using ExtendedKalman Filter
Ping Wei, Chengxian Xu, Fengji Zhao . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
Table of Contents – Part I XXIII
Simulated Annealing with Injecting Star-Alignment for MultipleSequence Alignments
Hongwei Huo, Hua Ming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
A Noise-Insensitive Hierarchical Min-Max Octree for Visualization ofUltrasound Datasets
Sukhyun Lim, Kang-hee Seo, Byeong-Seok Shin . . . . . . . . . . . . . . . . . . . 827
A Novel Fusing Algorithm for Retinal Fundus ImagesBin Fang, Xinge You, Yuan Yan Tang . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Improving PSO-Based Multiobjective Optimization Using Competitionand Immunity Clonal
Xiaohua Zhang, Hongyun Meng, Licheng Jiao . . . . . . . . . . . . . . . . . . . . 839
Clonal Selection Algorithm for Dynamic Multiobjective OptimizationRonghua Shang, Licheng Jiao, Maoguo Gong, Bin Lu . . . . . . . . . . . . . 846
Key Frame Extraction Based on Evolutionary Artificial Immune NetworkFang Liu, Xiaoying Pan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Clonal Selection Algorithm with Immunologic Regulation for FunctionOptimization
Hang Yu, Maoguo Gong, Licheng Jiao, Bin Zhang . . . . . . . . . . . . . . . . 858
A Fault-Tolerant and Minimum-Energy Path-Preserving TopologyControl Algorithm for Wireless Multi-hop Networks
Zhong Shen, Yilin Chang, Can Cui, Xin Zhang . . . . . . . . . . . . . . . . . . . 864
Computational Biomechanics and Experimental Verification of VascularStent
Yuexuan Wang, Hong Yi, Zhonghua Ni . . . . . . . . . . . . . . . . . . . . . . . . . . 870
Numerical Computing of Brain Electric Field in ElectroencephalogramDexin Zhao, Zhiyong Feng, Wenjie Li, Shugang Tang . . . . . . . . . . . . . 878
A Novel Multi-stage 3D Medical Image Segmentation: Methodologyand Validation
Jianfeng Xu, Lixu Gu, Xiahai Zhuang, Terry Peters . . . . . . . . . . . . . . . 884
Medical Image Alignment by Normal Vector InformationXiahai Zhuang, Lixu Gu, Jianfeng Xu . . . . . . . . . . . . . . . . . . . . . . . . . . . 890
Global Exponential Stability of Non-autonomous Delayed NeuralNetworks
Qiang Zhang, Dongsheng Zhou, Xiaopeng Wei . . . . . . . . . . . . . . . . . . . . 896
XXIV Table of Contents – Part I
A Prediction Method for Time Series Based on Wavelet NeuralNetworks
Xiaobing Gan, Ying Liu, Francis R. Austin . . . . . . . . . . . . . . . . . . . . . . 902
Training Multi-layer Perceptrons Using MiniMin ApproachLiefeng Bo, Ling Wang, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . 909
Two Adaptive Matching Learning Algorithms for IndependentComponent Analysis
Jinwen Ma, Fei Ge, Dengpan Gao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 915
Bioprocess Modeling Using Genetic Programming Based on a DoublePenalty Strategy
Yanling Wu, Jiangang Lu, Youxian Sun, Peifei Yu . . . . . . . . . . . . . . . . 921
An Improved Gibbs Sampling Algorithm for Finding TFBSCaisheng He, Xianhua Dai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
Pattern Recognition
A Novel Fisher Criterion Based St-Subspace Linear DiscriminantMethod for Face Recognition
Wensheng Chen, Pong C. Yuen, Jian Huang, Jianhuang Lai . . . . . . . 933
EmoEars: An Emotion Recognition System for Mandarin SpeechBo Xie, Ling Chen, Gen-Cai Chen, Chun Chen . . . . . . . . . . . . . . . . . . . 941
User Identification Using User’s Walking Pattern over the ubiFloorIIJaeseok Yun, Woontack Woo, Jeha Ryu . . . . . . . . . . . . . . . . . . . . . . . . . 949
Evolving RBF Neural Networks for Pattern ClassificationZheng Qin, Junying Chen, Yu Liu, Jiang Lu . . . . . . . . . . . . . . . . . . . . . 957
Discrimination of Patchoulis of Different Geographical Origins withTwo-Dimensional IR Correlation Spectroscopy and Wavelet Transform
Daqi Zhan, Suqin Sun, Yiu-ming Cheung . . . . . . . . . . . . . . . . . . . . . . . . 965
Gait Recognition Using View Distance VectorsMurat Ekinci, Eyup Gedikli . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
HMM Parameter Adaptation Using the Truncated First-Order VTSand EM Algorithm for Robust Speech Recognition
Haifeng Shen, Qunxia Li, Jun Guo, Gang Liu . . . . . . . . . . . . . . . . . . . . 979
Table of Contents – Part I XXV
Model Type Recognition Using De-interlacing and Block CodeGeneration
Cheol-Ki Kim, Sang-Gul Lee, Kwang-Baek Kim . . . . . . . . . . . . . . . . . . 985
R-functions Based Classification for Abnormal Software ProcessDetection
Anton Bougaev, Aleksey Urmanov . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
A Unified Framework for Shot Boundary DetectionBing Han, Xinbo Gao, Hongbing Ji . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
Image Recognition with LPP MixturesSiBao Chen, Min Kong, Bin Luo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003
Line-Based Camera CalibrationXiuqin Chu, Fangming Hu, Yushan Li . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009
Shot Boundary Detection Based on SVM and TMRAWei Fang, Sen Liu, Huamin Feng, Yong Fang . . . . . . . . . . . . . . . . . . . . 1015
Robust Pattern Recognition Scheme for Devanagari ScriptAmit Dhurandhar, Kartik Shankarnarayanan, Rakesh Jawale . . . . . . . 1021
Credit Evaluation Model and Applications Based on ProbabilisticNeural Network
Sulin Pang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027
Fingerprint Ridge Line Extraction Based on Tracing and DirectionalFeedback
Rui Ma, Yaxuan Qi, Changshui Zhang, Jiaxin Wang . . . . . . . . . . . . . . 1033
A New Method for Human Gait Recognition Using Temporal AnalysisHan Su, Fenggang Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1039
Microcalcification Patterns Recognition Based Combination ofAutoassociator and Classifier
Wencang Zhao, Xinbo Yu, Fengxiang Li . . . . . . . . . . . . . . . . . . . . . . . . . 1045
Improved Method for Gradient-Threshold Edge Detector Based on HVSFuzheng Yang, Shuai Wan, Yilin Chang . . . . . . . . . . . . . . . . . . . . . . . . . 1051
MUSC: Multigrid Shape Codes and Their Applications to ImageRetrieval
Arindam Biswas, Partha Bhowmick, Bhargab B. Bhattacharya . . . . . . 1057
XXVI Table of Contents – Part I
Applications
Adaptation of Intelligent Characters to Changes of Game EnvironmentsByeong Heon Cho, Sung Hoon Jung, Kwang-Hyun Shim,Yeong Rak Seong, Ha Ryoung Oh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1064
An Knowledge Model for Self-regenerative Service ActivationsAdaptation Across Standards
Mengjie Yu, David Llewellyn Jones, A. Taleb-Bendiab . . . . . . . . . . . . . 1074
An Agent for the HCARD Model in the Distributed EnvironmentBobby D. Gerardo, Jae-Wan Lee, Jae-jeong Hwang,Jung-Eun Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
A New Class of Filled Functions for Global MinimizationXiaoliang He, Chengxian Xu, Chuanchao Zhu . . . . . . . . . . . . . . . . . . . . 1088
Modified PSO Algorithm for Deadlock Control in FMSHesuan Hu, Zhiwu Li, Weidong Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094
Optimization Design of Controller Periods Using Evolution StrategyHong Jin, Hui Wang, Hongan Wang, Guozhong Dai . . . . . . . . . . . . . . 1100
Application of Multi-objective Evolutionary Algorithm in CoordinatedDesign of PSS and SVC Controllers
Zhenyu Zou, Quanyuan Jiang, Pengxiang Zhang, Yijia Cao . . . . . . . . 1106
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113
Table of Contents – Part II
Cryptography and Coding
A Fast Inversion Algorithm and Low-Complexity Architecture overGF (2m)
Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park,Jongin Lim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
An ID-Based Optimistic Fair Signature Exchange Protocol from PairingsChunxiang Gu, Yuefei Zhu, Yajuan Zhang . . . . . . . . . . . . . . . . . . . . . . . 9
FMS Attack-Resistant WEP Implementation Is Still BrokenToshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii . . . . . . . . . . . . 17
Design of a New Kind of Encryption Kernel Based on RSA AlgorithmPing Dong, Xiangdong Shi, Jiehui Yang . . . . . . . . . . . . . . . . . . . . . . . . . 27
On the Security of Condorcet Electronic Voting SchemeYoon Cheol Lee, Hiroshi Doi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Special Distribution of the Shortest Linear Recurring Sequences inZ/(p) Field
Qian Yin, Yunlun Luo, Ping Guo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Cryptanalysis of a Cellular Automata CryptosystemJingmei Liu, Xiangguo Cheng, Xinmei Wang . . . . . . . . . . . . . . . . . . . . . 49
A New Conceptual Framework Within Information Privacy: MetaPrivacy
Geoff Skinner, Song Han, Elizabeth Chang . . . . . . . . . . . . . . . . . . . . . . . 55
Error Oracle Attacks on Several Modes of OperationFengtong Wen, Wenling Wu, Qiaoyan Wen . . . . . . . . . . . . . . . . . . . . . . 62
Stability of the Linear Complexity of the Generalized Self-shrinkingSequences
Lihua Dong, Yong Zeng, Yupu Hu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
On the Construction of Some Optimal Polynomial CodesYajing Li, Weihong Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
XXVIII Table of Contents – Part II
Perceptual Hashing of Video Content Based on Differential BlockSimilarity
Xuebing Zhou, Martin Schmucker, Christopher L. Brown . . . . . . . . . . 80
Cryptographic Protocols
Secure Software Smartcard Resilient to CaptureSeung Wook Jung, Christoph Ruland . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Revised Fischlin’s (Blind) Signature SchemesKewei Lv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Certificateless Threshold Signature SchemesLicheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian . . . . . . . . . . . 104
An Efficient Certificateless Signature SchemeM. Choudary Gorantla, Ashutosh Saxena . . . . . . . . . . . . . . . . . . . . . . . . 110
ID-Based Restrictive Partially Blind SignaturesXiaofeng Chen, Fangguo Zhang, Shengli Liu . . . . . . . . . . . . . . . . . . . . . . 117
Batch Verification with DSA-Type Digital Signatures for UbiquitousComputing
Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho . . . . . . . . . . 125
On Anonymity of Group SignaturesSujing Zhou, Dongdai Lin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
The Running-Mode Analysis of Two-Party Optimistic Fair ExchangeProtocols
Yuqing Zhang, Zhiling Wang, Bo Yang . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Password-Based Group Key Exchange Secure Against Insider GuessingAttacks
Jin Wook Byun, Dong Hoon Lee, Jongin Lim . . . . . . . . . . . . . . . . . . . . . 143
On the Security of Some Password-Based Key Agreement SchemesQiang Tang, Chris J. Mitchell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
A New Group Rekeying Method in Secure MulticastYong Xu, Yuxiang Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Pairing-Based Provable Blind Signature Scheme Without RandomOracles
Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong . . . . . . . . . . . . . 161
Table of Contents – Part II XXIX
Efficient ID-Based Proxy Signature and Proxy Signcryption FormBilinear Pairings
Qin Wang, Zhenfu Cao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
An Identity-Based Threshold Signcryption Scheme with SemanticSecurity
Changgen Peng, Xiang Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
A Token-Based Single Sign-On ProtocolLi Hui, Shen Ting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Simple Threshold RSA Signature Scheme Based on Simple SecretSharing
Shaohua Tang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Efficient Compilers for Authenticated Group Key ExchangeQiang Tang, Chris J. Mitchell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Insider Impersonation-MIM Attack to Tripartite Key AgreementScheme and an Efficient Protocol for Multiple Keys
Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto . . . . . 198
Intrusion Detection
An Immune System Inspired Approach of Collaborative IntrusionDetection System Using Mobile Agents in Wireless Ad Hoc Networks
Ki-Won Yeom, Ji-Hyung Park . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
A New User-Habit Based Approach for Early Warning of WormsPing Wang, Binxing Fang, Xiaochun Yun . . . . . . . . . . . . . . . . . . . . . . . . 212
A Multi-gigabit Virus Detection Algorithm Using Ternary CAMIl-Seop Song, Youngseok Lee, Taeck-Geun Kwon . . . . . . . . . . . . . . . . . . 220
Sampling Distance Analysis of Gigantic Data Mining for IntrusionDetection Systems
Yong Zeng, Jianfeng Ma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Hardware-Software Hybrid Packet Processing for Intrusion DetectionSystems
Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan . . . 236
D-S Evidence Theory and Its Data Fusion Application in IntrusionDetection
Junfeng Tian, Weidong Zhao, Ruizhong Du . . . . . . . . . . . . . . . . . . . . . . 244
XXX Table of Contents – Part II
A New Network Anomaly Detection Technique Based on Per-Flow andPer-Service Statistics
Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto . . . . . . . . . 252
SoIDPS: Sensor Objects-Based Intrusion Detection and PreventionSystem and Its Implementation
SeongJe Cho, Hye-Young Chang, HongGeun Kim,WoongChul Choi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
A Statistical Model for Detecting Abnormality in Static-PriorityScheduling Networks with Differentiated Services
Ming Li, Wei Zhao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Tamper Detection for Ubiquitous RFID-Enabled Supply ChainVidyasagar Potdar, Chen Wu, Elizabeth Chang . . . . . . . . . . . . . . . . . . . 273
Measuring the Histogram Feature Vector for Anomaly Network TrafficWei Yan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Efficient Small Face Detection in Surveillance Images Using MajorColor Component and LDA Scheme
Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn . . . . . 285
Fast Motion Detection Based on Accumulative Optical Flow andDouble Background Model
Jin Zheng, Bo Li, Bing Zhou, Wei Li . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Reducing Worm Detection Time and False Alarm in Virus ThrottlingJangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi . . . . . . . . 297
Protection Against Format String Attacks by Binary RewritingJin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi,Sang Jun Lee, Byung Ki Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Masquerade Detection System Based on Principal Component Analysisand Radial Basics Function
Zhanchun Li, Zhitang Li, Yao Li, Bin Liu . . . . . . . . . . . . . . . . . . . . . . . 309
Anomaly Detection Method Based on HMMs Using System Call andCall Stack Information
Cheng Zhang, Qinke Peng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Parallel Optimization Technology for Backbone Network IntrusionDetection System
Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen . . . . . . . . . 322
Table of Contents – Part II XXXI
Attack Scenario Construction Based on Rule and Fuzzy ClusteringLinru Ma, Lin Yang, Jianxin Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
A CBR Engine Adapting to IDSLingjuan Li, Wenyu Tang, Ruchuan Wang . . . . . . . . . . . . . . . . . . . . . . . 334
Application of Fuzzy Logic for Distributed Intrusion DetectionHee Suk Seo, Tae Ho Cho . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Security Models and Architecture
Dynamic Access Control for Pervasive Grid ApplicationsSyed Naqvi, Michel Riguidel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
On the Security of the Canetti-Krawczyk ModelXinghua Li, Jianfeng Ma, SangJae Moon . . . . . . . . . . . . . . . . . . . . . . . . 356
A Novel Architecture for Detecting and Defending AgainstFlooding-Based DDoS Attacks
Yi Shi, Xinyu Yang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
A Variant of Poly1305 MAC and Its Security ProofDayin Wang, Dongdai Lin, Wenling Wu . . . . . . . . . . . . . . . . . . . . . . . . . 375
Covert Channel Identification Founded on Information Flow AnalysisJianjun Shen, Sihan Qing, Qingni Shen, Liping Li . . . . . . . . . . . . . . . . 381
Real-Time Risk Assessment with Network Sensors and IntrusionDetection Systems
Andre Arnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne,Marie Elisabeth Gaup Moe, Svein Johan Knapskog . . . . . . . . . . . . . . . . 388
Design and Implementation of a Parallel Crypto ServerXiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou . . . . . . . . . . . . 398
Survivability Computation of Networked Information SystemsXuegang Lin, Rongsheng Xu, Miaoliang Zhu . . . . . . . . . . . . . . . . . . . . . 407
Assessment of Windows System Security Using VulnerabilityRelationship Graph
Yongzheng Zhang, Binxing Fang, Yue Chi, Xiaochun Yun . . . . . . . . . . 415
A New (t, n)-Threshold Multi-secret Sharing SchemeHuiXian Li, ChunTian Cheng, LiaoJun Pang . . . . . . . . . . . . . . . . . . . . 421
XXXII Table of Contents – Part II
An Efficient Message Broadcast Authentication Scheme for SensorNetworks
Sang-ho Park, Taekyoung Kwon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Digital Image Authentication Based on Error-Correction CodesFan Zhang, Xinhong Zhang, Zhiguo Chen . . . . . . . . . . . . . . . . . . . . . . . . 433
Design and Implementation of Efficient Cipher Engine for IEEE 802.11iCompatible with IEEE 802.11n and IEEE 802.11e
Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park,Ohyoung Song . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Secure Delegation-by-Warrant ID-Based Proxy Signcryption SchemeShanshan Duan, Zhenfu Cao, Yuan Zhou . . . . . . . . . . . . . . . . . . . . . . . . 445
Building Security Requirements Using State Transition Diagram atSecurity Threat Location
Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi,Sang Jun Lee, Byung Ki Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Study on Security iSCSI Based on SSHWeiping Liu, Wandong Cai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
A Scheduling Algorithm Based on a Trust Mechanism in GridKenli Li, Yan He, Renfa Li, Tao Yang . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Enhanced Security and Privacy Mechanism of RFID Service forPervasive Mobile Device
Byungil Lee, Howon Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Worm Propagation Modeling and Analysis on NetworkYunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma . . . . 476
An Extensible AAA Infrastructure for IPv6Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu . . . . . . . . . . . . . . . . . 482
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11iFan Zhang, Jianfeng Ma, SangJae Moon . . . . . . . . . . . . . . . . . . . . . . . . . 488
A Noble Key Pre-distribution Scheme with LU Matrix for SecureWireless Sensor Networks
Chang Won Park, Sung Jin Choi, Hee Yong Youn . . . . . . . . . . . . . . . . 494
Table of Contents – Part II XXXIII
Security Management
A Virtual Bridge Certificate Authority ModelHaibo Tian, Xi Sun, Yumin Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Weak Signals in Information Security ManagementJorma Kajava, Reijo Savola, Rauno Varonen . . . . . . . . . . . . . . . . . . . . . 508
PDTM: A Policy-Driven Trust Management Framework in DistributedSystems
Wu Liu, Haixin Duan, Jianping Wu, Xing Li . . . . . . . . . . . . . . . . . . . . 518
Methodology of Quantitative Risk Assessment for Information SystemSecurity
Mengquan Lin, Qiangmin Wang, Jianhua Li . . . . . . . . . . . . . . . . . . . . . 526
A Secure and Efficient (t, n) Threshold Verifiable Multi-secret SharingScheme
Mei-juan Huang, Jian-zhong Zhang, Shu-cui Xie . . . . . . . . . . . . . . . . . . 532
Improvement on an Optimized Protocol for Mobile NetworkAuthentication and Security
ChinChen Chang, JungSan Lee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
Neural Network Based Flow Forecast and DiagnosisQianmu Li, Manwu Xu, Hong Zhang, Fengyu Liu . . . . . . . . . . . . . . . . . 542
Protecting Personal Data with Various Granularities: A Logic-BasedAccess Control Approach
Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai,Yoshinari Kanamori, Cherri M. Pancake . . . . . . . . . . . . . . . . . . . . . . . . 548
Enhancement of an Authenticated Multiple-Key Agreement ProtocolWithout Using Conventional One-Way Function
Huifeng Huang, Chinchen Chang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Topology-Based Macroscopical Response and Control Technology forNetwork Security Event
Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang . . . . . 560
Watermarking and Information Hiding
Adaptive Hiding Scheme Based on VQ-Indices Using CommutableCodewords
Chinchen Chang, Chiachen Lin, Junbin Yeh . . . . . . . . . . . . . . . . . . . . . . 567
XXXIV Table of Contents – Part II
Reversible Data Hiding for Image Based on Histogram Modification ofWavelet Coefficients
Xiaoping Liang, Xiaoyun Wu, Jiwu Huang . . . . . . . . . . . . . . . . . . . . . . . 573
An Image Steganography Using Pixel CharacteristicsYoung-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon . . . 581
Alternatives for Multimedia Messaging System SteganographyKonstantinos Papapanagiotou, Emmanouel Kellinis,Giannis F. Marias, Panagiotis Georgiadis . . . . . . . . . . . . . . . . . . . . . . . . 589
Error Concealment for Video Transmission Based on WatermarkingShuai Wan, Yilin Chang, Fuzheng Yang . . . . . . . . . . . . . . . . . . . . . . . . . 597
Applying the AES and Its Extended Versions in a General Frameworkfor Hiding Information in Digital Images
Tran Minh Triet, Duong Anh Duc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
An Image Hiding Algorithm Based on Bit PlaneBin Liu, Zhitang Li, Zhanchun Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
A Blind Audio Watermarking Algorithm Robust AgainstSynchronization Attack
Xiangyang Wang, Hong Zhao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Semi-fragile Watermarking Algorithm for Detection and Localizationof Temper Using Hybrid Watermarking Method in MPEG-2 Video
Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong . . . . . . 623
Public Watermarking Scheme Based on Multiresolution Representationand Double Hilbert Scanning
Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou,Licong Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Performance Evaluation of Watermarking Techniques for SecureMultimodal Biometric Systems
Daesung Moon, Taehae Kim, SeungHwan Jung, Yongwha Chung,Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim . . . . . . . . . . . . . . . . . . . 635
An Improvement of Auto-correlation Based Video WatermarkingScheme Using Independent Component Analysis
Seong-Whan Kim, Hyun-Sung Sung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
A Digital Watermarking Technique Based on Wavelet PackagesChen Xu, Weiqiang Zhang, Francis R. Austin . . . . . . . . . . . . . . . . . . . . 649
Table of Contents – Part II XXXV
A Spectral Images Digital Watermarking AlgorithmLong Ma, Changjun Li, Shuni Song . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Restoration in Secure Text Document Image Authentication UsingErasable Watermarks
Niladri B. Puhan, Anthony T.S. Ho . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Web and Network Applications
The Study of RED Algorithm Used Multicast Router Based BufferManagement
Won-Hyuck Choi, Doo-Hyun Kim, Kwnag-Jae Lee,Jung-Sun Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
Genetic Algorithm Utilized in Cost-Reduction Driven Web ServiceSelection
Lei Cao, Jian Cao, Minglu Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
MacroOS: A Pervasive Computing Platform Supporting ContextAwareness and Context Management
Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan . . . . . . . . . . . . 687
A Frame for Selecting Replicated Multicast Servers Using GeneticAlgorithm
Qin Liu, Chanle Wu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
On a Novel Methodology for Estimating Available Bandwidth AlongNetwork Paths
Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu . . . . . . . . . . . . . . . . . . . 703
A New AQM Algorithm for Enhancing Internet Capability AgainstUnresponsive Flows
Liyuan Zhao, Keqin Liu, Jun Zheng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Client Server Access: Wired vs. Wireless LEO Satellite-ATMConnectivity; A (MS-Ro-BAC) Experiment
Terry C. House . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
An Algorithm for Automatic Inference of Referential Integrities DuringTranslation from Relational Database to XML Schema
Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik . . . . . . . . . . . . . . . . . . 725
A Fuzzy Integral Method to Merge Search Engine Results on WebShuning Cui, Boqin Feng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
XXXVI Table of Contents – Part II
The Next Generation PARLAY X with QoS/QoESungjune Hong, Sunyoung Han . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
A Design of Platform for QoS-Guaranteed Multimedia ServicesProvisioning on IP-Based Convergence Network
Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim . . . . . . . . . . . . . . . 743
Introduction of Knowledge Management System for Technical Supportin Construction Industries
Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim . . . . . . . . . . . . . . . . . . . 749
An Event Correlation Approach Based on the Combination of IHU andCodebook
Qiuhua Zheng, Yuntao Qian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Image and Signal Processing
Face Recognition Based on Support Vector Machine Fusion andWavelet Transform
Bicheng Li, Hujun Yin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
A Dynamic Face and Fingerprint Fusion System for IdentityAuthentication
Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li . . . . . 772
Image Recognition for Security Verification Using Real-Time JointTransform Correlation with Scanning Technique
Kyu B. Doh, Jungho Ohn, Ting-C Poon . . . . . . . . . . . . . . . . . . . . . . . . . 780
Binarized Revocable Biometrics in Face RecognitionYing-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling . . . . . 788
Short Critical Area Computational Method Using MathematicalMorphology
Junping Wang, Yue Hao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
A Robust Lane Detection Approach Based on MAP Estimate andParticle Swarm Optimization
Yong Zhou, Xiaofeng Hu, Qingtai Ye . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804
MFCC and SVM Based Recognition of Chinese VowelsFuhai Li, Jinwen Ma, Dezhi Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
Table of Contents – Part II XXXVII
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classificationin the DCT Domain
Zhe-Ming Lu, Hui Pei, Hans Burkhardt . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Removing of Metal Highlight Spots Based on Total Variation Inpaintingwith Multi-sources-flashing
Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang . . . . . . . . . . . 826
Component-Based Online Learning for Face Detection and VerificationKyoung-Mi Lee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in ImageCompression
Wenbing Fan, Jing Chen, Jina Zhen . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
Modified EZW Coding for Stereo ResidualHan-Suh Koo, Chang-Sung Jeong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
Optimal Prototype Filters for Near-Perfect-ReconstructionCosine-Modulated Filter Banks
Xuemei Xie, Guangming Shi, Xuyang Chen . . . . . . . . . . . . . . . . . . . . . . 851
Fast Motion Estimation Scheme for Real Time Multimedia Streamingwith H.264
Chan Lim, Hyun-Soo Kang, Tae-Yong Kim . . . . . . . . . . . . . . . . . . . . . . 857
Motion-Compensated 3D Wavelet Video Coding Based on AdaptiveTemporal Lifting Filter Implementation
Guiguang Ding, Qionghai Dai, Wenli Xu . . . . . . . . . . . . . . . . . . . . . . . . 863
Accurate Contouring Technique for Object Boundary Extraction inStereoscopic Imageries
Shin Hyoung Kim, Jong Whan Jang, Seung Phil Lee,Jae Ho Choi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869
Robust Object Tracking Based on Uncertainty Factorization SubspaceConstraints Optical Flow
Yunshu Hou, Yanning Zhang, Rongchun Zhao . . . . . . . . . . . . . . . . . . . . 875
Bearings-Only Target Tracking Using Node Selection Based on anAccelerated Ant Colony Optimization
Benlian Xu, Zhiquan Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Image Classification and Delineation of FragmentsWeixing Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887
XXXVIII Table of Contents – Part II
A Novel Wavelet Image Coding Based on Non-uniform ScalarQuantization
Guoyuo Wang, Wentao Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893
A General Image Based Nematode Identification System DesignBai-Tao Zhou, Won Nah, Kang-Woong Lee, Joong-Hwan Baek . . . . . 899
A Novel SVD-Based RLS Blind Adaptive Multiuser Detector forCDMA Systems
Ling Zhang, Xian-Da Zhang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
New Electronic Digital Image Stabilization Algorithm in WaveletTransform Domain
Jung-Youp Suk, Gun-Woo Lee, Kuhn-Il Lee . . . . . . . . . . . . . . . . . . . . . . 911
Line Segments and Dominate Points Detection Based on HoughTransform
Z.W. Liao, S.X. Hu, T.Z. Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
The Study of the Auto Color Image SegmentationJian Zhuang, Haifeng Du, Jinhua Zhang, Sun’an Wang . . . . . . . . . . . . 923
Regularized Image Restoration by Means of Fusion for Digital AutoFocusing
Vivek Maik, Jeongho Shin, Joonki Paik . . . . . . . . . . . . . . . . . . . . . . . . . . 929
Fast Ray-Space Interpolation Based on Occlusion Analysis and FeaturePoints Detection
Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye,Yong-Deak Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935
Non-parametric ICA Algorithm for Hybrid Sources Based on GKNNEstimation
Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu . . . . . . . . . . . . . . . . . 941
SUSAN Window Based Cost Calculation for Fast Stereo MatchingKyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong . . . . . . . . . . . . . . . 947
An Efficient Adaptive De-blocking AlgorithmZhiliang Xu, Shengli Xie, Youjun Xiang . . . . . . . . . . . . . . . . . . . . . . . . . 953
Facial Features Location by Analytic Boosted Cascade DetectorLei Wang, Beiji Zou, Jiaguang Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959
Table of Contents – Part II XXXIX
New Approach for Segmentation and Pattern Recognition of JacquardImages
Zhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo,Jinxiang Dong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
Nonstationarity of Network Traffic Within Multi-scale BurstinessConstraint
Jinwu Wei, Jiangxing Wu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971
Principle of Image Encrypting Algorithm Based on Magic CubeTransformation
Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan,Guanjun Bao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977
A Study on Motion Prediction and Coding for In-Band MotionCompensated Temporal Filtering
Dongdong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong . . . . . . . . . 983
Adaptive Sampling for Monte Carlo Global Illumination Using TsallisEntropy
Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert . . . . . . 989
Applications
Incremental Fuzzy Decision Tree-Based Network Forensic SystemZaiqiang Liu, Dengguo Feng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
Robust Reliable Control for a Class of Fuzzy Dynamic Systems withTime-Varying Delay
Youqing Wang, Donghua Zhou . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003
Using Concept Taxonomies for Effective Tree InductionHong Yan Yi, B. de la Iglesia, V.J. Rayward-Smith . . . . . . . . . . . . . . . 1011
A Similarity-Based Recommendation Filtering Algorithm forEstablishing Reputation-Based Trust in Peer-to-Peer ElectronicCommunities
Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen . . . 1017
Automatic Classification of Korean Traditional Music Using RobustMulti-feature Clustering
Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh . . . . . . . . . . . . . . . . . . . . . . 1025
A Private and Efficient Mobile Payment ProtocolChangjie Wang, Ho-fung Leung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1030
XL Table of Contents – Part II
Universal Designated-Verifier Proxy Blind Signatures for E-CommerceTianjie Cao, Dongdai Lin, Rui Xue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036
An Efficient Control Method for Elevator Group Control SystemUlvi Dagdelen, Aytekin Bagis, Dervis Karaboga . . . . . . . . . . . . . . . . . . . 1042
Next Generation Military Communication Systems ArchitectureQijian Xu, Naitong Zhang, Jie Zhang, Yu Sun . . . . . . . . . . . . . . . . . . . . 1048
Early Warning for Network WormsAntti Tikkanen, Teemupekka Virtanen . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054
Skeleton Representation of Character Based on Multiscale ApproachXinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang,Yuan Yan Tang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1060
Channel Equalization Based on Two Weights Neural NetworkWenming Cao, Wanfang Chai, Shoujue Wang . . . . . . . . . . . . . . . . . . . . 1068
Assessment of Uncertainty in Mineral Prospectivity Prediction UsingInterval Neutrosophic Set
Pawalai Kraipeerapun, Chun Che Fung, Warick Brown . . . . . . . . . . . . 1074
Ring-Based Anonymous Fingerprinting SchemeQiang Lei, Zhengtao Jiang, Yumin Wang . . . . . . . . . . . . . . . . . . . . . . . . 1080
Scalable and Robust Fingerprinting Scheme Using Statistically SecureExtension of Anti-collusion Code
Jae-Min Seol, Seong-Whan Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1086
Broadcast Encryption Using Identity-Based Public-Key CryptosystemLv Xixiang, Bo Yang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1092
Multimedia Digital Right Management Using Selective Scrambling forMobile Handset
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin,Sung-Jea Ko . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1098
Design and Implementation of Crypto Co-processor and Its Applicationto Security Systems
HoWon Kim, Mun-Kyu Lee, Dong-Kyue Kim, Sang-Kyoon Chung,Kyoil Chung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
Continuous Speech Research Based on HyperSausage NeuronWenming Cao, Jianqing Li, Shoujue Wang . . . . . . . . . . . . . . . . . . . . . . . 1110
Table of Contents – Part II XLI
Variable-Rate Channel Coding for Space-Time Coded MIMO SystemChangcai Han, Dongfeng Yuan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1116
A New Watermarking Method Based on DWTXiang-chu Feng, Yongdong Yang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1122
Efficient Point Rendering Method Using Sequential Level-of-DetailDaniel Kang, Byeong-Seok Shin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1127
Construction of a Class of Compactly Supported Biorthogonal MultipleVector-Valued Wavelets
Tongqi Zhang, Qingjiang Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1134
Metabolic Visualization and Intelligent Shape Analysis of theHippocampus
Yoo-Joo Choi, Jeong-Sik Kim, Min-Jeong Kim, Soo-Mi Choi,Myoung-Hee Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1140
Characteristic Classification and Correlation Analysis of Source-LevelVulnerabilities in the Linux Kernel
Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee,Young Ik Eom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157