38
Lecture Notes in Artif icial Intelligence 3801 Edited by J. G. Carbonell and J. Siekmann Subseries of Lecture Notes in Computer Science

Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: [email protected] HujunYin

  • Upload
    hadat

  • View
    221

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Lecture Notes in Artificial Intelligence 3801Edited by J. G. Carbonell and J. Siekmann

Subseries of Lecture Notes in Computer Science

Page 2: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Yue Hao Jiming Liu Yuping WangYiu-ming Cheung Hujun YinLicheng Jiao Jianfeng MaYong-Chang Jiao (Eds.)

ComputationalIntelligenceand Security

International Conference, CIS 2005Xi’an, China, December 15-19, 2005Proceedings, Part I

13

Page 3: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Volume Editors

Yue HaoE-mail: [email protected]

Jiming LiuE-mail: [email protected]

Yuping WangE-mail: [email protected]

Yiu-ming CheungE-mail: [email protected]

Hujun YinE-mail: [email protected]

Licheng JiaoE-mail: [email protected]

Jianfeng MaE-mail: [email protected]

Yong-Chang JiaoE-mail: [email protected]

Library of Congress Control Number: 2005937069

CR Subject Classification (1998): I.2, H.3, H.4, H.5, F.2.2, I.4

ISSN 0302-9743ISBN-10 3-540-30818-0 Springer Berlin Heidelberg New YorkISBN-13 978-3-540-30818-8 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.

Springer is a part of Springer Science+Business Media

springeronline.com

© Springer-Verlag Berlin Heidelberg 2005Printed in Germany

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper SPIN: 11596448 06/3142 5 4 3 2 1 0

Page 4: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Preface

The International Conference on Computational Intelligence and Security (CIS)is an annual international conference that brings together researchers, engineers,developers and practitioners from both academia and industry to share experi-ence and exchange and cross-fertilize ideas on all areas of computational in-telligence and information security. The conference serves as a forum for thedissemination of state-of-the-art research and the development, and implemen-tations of systems, technologies and applications in these two broad, interrelatedfields. This year CIS 2005 was co-organized by the IEEE (Hong Kong) Compu-tational Intelligence Chapter and Xidian University, and co-sponsored by HongKong Baptist University, National Natural Science Foundation of China, KeyLaboratory of Computer Networks and Information Security of the Ministry ofEducation of China, and Guangdong University of Technology. CIS 2005 receivedin total 1802 submissions from 41 countries and regions all over the world. Allof them were strictly peer reviewed by the Program Committee and expertsin the field. Finally, 337 high-quality papers were accepted yielding an accep-tance rate of 18.7%. Among them, 84 papers are the extended papers and 253are the regular papers. The conference was greatly enriched by a wide range oftopics covering all areas of computational intelligence and information security.Furthermore, tutorials and workshops were held for discussions of the proposedideas. Such practice is extremely important for the effective development of thetwo fields and computer science in general.

We would like to thank the organizers: the IEEE (Hong Kong) ComputationalIntelligence Chapter and Xidian University for their great contributions and ef-forts in this big event. Thanks also go to the sponsors, the Institute of Electricaland Electronics Engineers (IEEE), Hong Kong Baptist University (HKBU), Na-tional Natural Science Foundation of China, Key Laboratory of Computer Net-works and Information Security of the Ministry of Education of China, Guang-dong University of Technology (GDUT), and the publisher, Springer, for theirunremitting support and collaboration to make CIS 2005 possible and successful.Furthermore, we would like to sincerely thank the Program Committee mem-bers and additional reviewers for their professional, efficient input to the reviewprocess. Last but not the least, the Organizing Committee is much appreciatedfor their enormous efforts and marvelous work.

October 2005 Yue Hao and Jiming LiuGeneral Co-chairs of CIS 2005

Yuping Wang, Yiu-ming CheungHujun Yin and Licheng Jiao

Program Committee Co-chairs of CIS 2005Jianfeng Ma and Yong-Chang Jiao

Organizing Committee Co-chairs of CIS 2005

Page 5: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Organization

CIS 2005 was organized by IEEE (Hong Kong) Computational Intelligence Chap-ter and Xidian University.

General Co-chairs

Yue Hao Xidian University, ChinaJiming Liu Hong Kong Baptist University, Hong Kong,

China

Steering Committee Chair

Yiu-ming Cheung Hong Kong Baptist University, Hong Kong,China

Organizing Committee

Jianfeng Ma Xidian University, China (Co-chair)Yong-Chang Jiao Xidian University, China (Co-chair)Hailin Liu Guangdong University of Technology, China

(Tutorial and Workshop Chair)Hecheng Li Xidian University, China (Treasurer)Lixia Han Xidian University, China (Publicity Chair)Yuen-tan Hou Hong Kong Baptist University, Hong Kong,

China (Publicity Chair)Liang Ming Xidian University, China (Registration Chair)Yuanyuan Zuo Xidian University, China (Local Arrangement

Chair)Shuguang Zhao Xidian University, China (Publication Chair)Kapluk Chan Nanyang Technological University, Singapore

(Asia Liaison)Yan Wu Xidian University, China (Secretary)Jingxuan Wei Xidian University, China (Secretary)Rongzu Yu Xidian University, China (Web Master)

Program Committee

Yiu-ming Cheung (Co-chair) (Hong Kong, China)Licheng Jiao (Co-chair) (China)

Page 6: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

VIII Organization

Yuping Wang (Co-chair) (China)Hujun Yin (Co-chair) (UK) Michel Ab-dalla (France)Khurshid Ahmad (UK)Francesco Amigoni (Italy)Sherlock Au (Hong Kong, China)Dunin-Keplicz Barbara (Poland)Mike Barley (New Zealand)Chaib-draa Brahim (Canada)Tony Browne (UK)Scott Buffett (Canada)Matthew Casey (UK)Dario Catalano (France)Kapluk Chan (Singapore)Keith Chun-chung Chan (Hong Kong,China)Michael Chau (Hong Kong, China)Sheng Chen (UK)Songcan Chen (China)Zheng Chen (China)Xiaochun Cheng (UK)William Cheung (Hong Kong, China)Sungzoon Cho (Korea)Paolo Ciancarini (Italy)Stelvio Cimato (Italy)Helder Coelho (Portugal)Carlos Coello (USA)Emilio Corchado (Spain)Wei Dai (Australia)Joerg Denzinger (Canada)Tharam Dillon (Australia)Tom Downs (Australia)Richard Everson (UK)Bin Fang (China)Marcus Gallagher (Australia)Matjaz Gams (Slovenia)John Qiang Gan (UK)Joseph A. Giampapa (USA)Maria Gini (USA)Eric Gregoire (France)Heikki Helin (Finland)Tony Holden (UK)Vasant Honavar (USA)Mike Howard (USA)Huosheng Hu (UK)

Yupu Hu (China)Marc van Hulle (Belgium)Michael N. Huhns (USA)Samuel Kaski (Finland)Sokratis Katsikas (Greece)Hiroyuki Kawano (Japan)John Keane (UK)Alvin Kwan (Hong Kong, China)Kwok-Yan Lam (Singapore)Loo Hay Lee (Singapore)Bicheng Li (China)Guoping Liu (UK)Huan Liu (USA)Zhe-Ming Lu (Germany)Magdon-Ismail Malik (USA)Xiamu Niu (China)Wenjiang Pei (China)Hartmut Pohl (Germany)Javier Lopez (Spain)V. J. Rayward-Smith (UK)Henry H.Q. Rong (Hong Kong, China)Guenter Rudolph (Germany)Patrizia Scandurra (Italy)Bernhard Sendhoff (Germany)Michael Small (Hong Kong, China)Vic Rayward Smith (UK)Fischer-Huebner Simone (Sweden)Stephanie Teufel (Switzerland)Peter Tino (UK)Christos Tjortjis (UK)Vicenc Torra (Spain)Kwok-ching Tsui (Hong Kong, China)Bogdan Vrusias (UK)Bing Wang (UK)Ke Wang (Canada)Haotian Wu (Hong Kong, China)Gaoxi Xiao (Singapore)Hongji Yang (UK)Shuang-Hua Yang (UK)Zheng Rong Yang (UK)Xinfeng Ye (New Zealand)Benjamin Yen (Hong Kong, China)Dingli Yu (UK)Jeffrey Yu (Hong Kong, China)Qingfu Zhang (UK)

Page 7: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Organization IX

Additional Reviewers

Ailing ChenAsim Karimbian YangBin SongBinsheng LiuBo AnBo ChenBo ChengBo LiuBo ZhangBobby D. GerardoByunggil LeeChangan YuanChanghan KimChangji WangChangjie WangChangsheng YiChanyun YangChiachen LinChienchih YuChinhung LiuChong LiuChong WangChong WuChongzhao HanChundong WangChunhong CaoChunxiang GuChunxiang XuChunyan LiangCongfu XuCuiran LiDaoyi DongDarong HuangDayong DengDechang PiDeji WangDong ZhangDongmei FuEnhong ChenEunjun YoonFan ZhangFang Liu

Fei LiuFei YuFeng LiuFengzhan TianFuyan LiuFuzheng YangGuangming ShiGuicheng WangGuiguang DingGuimin ChenGumin JeongGuogang TianGuojiang FuGuowei YangHaewon ChoiHaiguang ChenHaiyan JinHansuh KooHeejo LeeHeejun SongHong LiuHong ZhangHongbin ShenHongbing LiuHongfang ZhouHongsheng SuHongtao WuHongwei GaoHongwei HuoHongxia CaiHongzhen ZhengHorong HenryHsinhung WuHua XuHua ZhongHuafeng DengHuanjun LiuHuantong GengHuaqiu WangHui WangHuiliang ZhangHuiying LiHyun Sun Kang

Hyungkyu YangHyungwoo KangJeanshyan WangJian LiaoJian WangJian ZhaoJianming FuJianping ZengJianyu XiaoJiawei ZhangJieyu MengJiguo LiJing HanJing LiuJingmei liuJinlong WangJinqian LiangJin-Seon LeeJinwei WangJongwan KimJuan ZhangJun KongJun MaJun ZhangJunbo GaoJuncheol ParkJunying ZhangK. W. ChauKang-Soo YouKanta MatsuuraKe LiaoKeisuke TakemoriKihyeon KwonKongfa HuKyoungmi LeeLei SunLi WangLiang ZhangLiangli MaLiangxiao JiangLianying ZhouLiaojun PangLibiao Zhang

Page 8: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

X Organization

Licheng WangLiefeng BoLijun WuLimin WangLin LinLing ChenLing ZhangLingfang ZengLinhuan WangLiping YanMeng ZhangMengjie YuMing DongMing LiMing LiMinxia LuoMurat EkinciNi ZhangNoria FoukiaOmran MahamedPengfei LiuPing GuoPurui SuQi LiuQi XiaQian ChenQiang GuoQiang WangQiang WeiQiang ZhangQin WangQinghao MengQinghua HuQiuhua ZhengQizhi ZhangRavi PrakashRonghua ShangRongjun LiRongqing YiRongxing LuRuo HuSangho ParkSangyoung LeeSeonghoon LeeSeunggwan Lee

Shangmin LuanShaowei WangShaozhen ChenShengfeng TianShenghui SuShi MinShifeng RuiShiguo LianShuping YaoSinjae KangSongwook LeeSooyeon ShinSunghae JunSungjune HongSuresh SundaramTangfei TaoTao GuanTao PengTeemupekka VirtanenTerry HouseTianding ChenTianyang DongTieli SunTingzhu HuangyW. X. WangWei ChenWei HuWei YanWei ZhangWeiguo HanWeijun ChenWeimin XueWeixing WangWeizhen YanWencang ZhaoWenjie LiWen QuanWensen AnWenyuan WangXia XuXiangchong LiuXiangchu FengXiangyong LiXianhua DaiXiaofeng Chen

Xiaofeng LiuXiaofeng RongXiaohong HaoXiaohui YuanXiaoliang HeXiaoyan TaoXiaozhu LinXijian PingXinbo GaoXinchen ZhangXingzhou ZhangXinling ShiXinman ZhangXiuPing GuoXiuqin ChuXuebing ZhouXuelong ChenYajun GuoYan WangYanchun LiangYao WangYeonseung RyuYi LiYibo ZhangYichun LiuYifei PuYijia ZhangYijuan ShiYijun MoYilin LinYiming ZhouYinliang ZhaoYintian LiuYong XuYong ZhangYongjie WangYongjun LiYuan ShuYuan YuanYubao LiuYufeng ZhangYufu NingYukun CaoYunfeng LiYuqian Zhao

Page 9: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Organization XI

Zaobin GanZhansheng LiuZhaofeng MaZhenchuan ChaiZhengtao JiangZhenlong DuZhi Liu

Zhian ChengZhicheng ChenZhigang MaZhihong DengZhihua CaiZhiqing MengZhisong Pan

Zhiwei NiZhiwu LiaoZhong LiuZiyi ChenZongben Xu

Sponsoring Institutions

IEEE (Hong Kong) Computational Intelligence ChapterXidian UniversityHong Kong Baptist UniversityNational Natural Science Foundation of ChinaGuangdong University of Technology

Page 10: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part I

Learning and Fuzzy Systems

Empirical Analysis of Database Privacy Using Twofold IntegralsJordi Nin, Vicenc Torra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Intrusion Detection Alert Verification Based on Multi-level FuzzyComprehensive Evaluation

Chengpo Mu, Houkuan Huang, Shengfeng Tian . . . . . . . . . . . . . . . . . . . 9

Improving the Scalability of Automatic ProgrammingHenrik Berg, Roland Olsson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Texture Segmentation by Unsupervised Learning and HistogramAnalysis Using Boundary Tracing

Woobeom Lee, Wookhyun Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

An Improved Bayesian Network Learning Algorithm Based onDependency Analysis

Fengzhan Tian, Shengfeng Tian, Jian Yu, Houkuan Huang . . . . . . . . . 33

Mining Common Patterns on GraphsIvan Olmos, Jesus A. Gonzalez, Mauricio Osorio . . . . . . . . . . . . . . . . . 41

Moderated Innovations in Self-poised Ensemble LearningRicardo Nanculef, Carlos Valle, Hector Allende,Claudio Moraga . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

An Adaptive Framework for Solving Multiple Hard Problems UnderTime Constraints

Sandip Aine, Rajeev Kumar, P.P. Chakrabarti . . . . . . . . . . . . . . . . . . . . 57

An RLS-Based Natural Actor-Critic Algorithm for Locomotion of aTwo-Linked Robot Arm

Jooyoung Park, Jongho Kim, Daesung Kang . . . . . . . . . . . . . . . . . . . . . 65

Dynamic Clustering Using Multi-objective Evolutionary AlgorithmEnhong Chen, Feng Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Multimodal FeedForward Self-organizing MapsAndrew P. Paplinski, Lennart Gustafsson . . . . . . . . . . . . . . . . . . . . . . . . 81

Page 11: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XIV Table of Contents – Part I

Decision Fusion Based Unsupervised Texture Image SegmentationHua Zhong, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Speaker Adaptation Techniques for Speech Recognition with aSpeaker-Independent Phonetic Recognizer

Weon-Goo Kim, MinSeok Jang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Fuzzy QoS Controllers in Diff-Serv Scheduler Using Genetic AlgorithmsBaolin Sun, Qiu Yang, Jun Ma, Hua Chen . . . . . . . . . . . . . . . . . . . . . . . 101

Neural Network Based Algorithms for Diagnosis and Classification ofBreast Cancer Tumor

In-Sung Jung, Devinder Thapa, Gi-Nam Wang . . . . . . . . . . . . . . . . . . . 107

New Learning Algorithm for Hierarchical Structure Learning AutomataOperating in P-Model Stationary Random Environment

Yoshio Mogami . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

A TFN-Based AHP Model for Solving Group Decision-Making ProblemsJian Cao, Gengui Zhou, Feng Ye . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

A Tactics for Robot Soccer with Fuzzy Logic MediatorJeongjun Lee, Dongmin Ji, Wonchang Lee, Geuntaek Kang,Moon G. Joo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

Gait Control for Biped Robot Using Fuzzy Wavelet Neural NetworkPengfei Liu, Jiuqiang Han . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

A New Approach for Regression: Visual Regression ApproachDeyu Meng, Chen Xu, Wenfeng Jing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

Orthogonally Rotational Transformation for Naive Bayes LearningLimin Wang, Chunhong Cao, Haijun Li, Haixia Chen,Liyan Dong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

Efficient Learning Bayesian Networks Using PSOTao Du, S.S. Zhang, Zongjiang Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

Improving K-Modes Algorithm Considering Frequencies of AttributeValues in Mode

Zengyou He, Shengchun Deng, Xiaofei Xu . . . . . . . . . . . . . . . . . . . . . . . 157

Distance Protection of Compensated Transmission Line UsingComputational Intelligence

S.R. Samantaray, P.K. Dash, G. Panda, B.K. Panigrahi . . . . . . . . . . 163

Page 12: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part I XV

Computational Intelligence for Network Intrusion Detection: RecentContributions

Asim Karim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

Evolutionary Computation

Design of a Switching PID Controller Using Advanced GeneticAlgorithm for a Nonlinear System

Jung-Shik Kong, Bo-Hee Lee, Jin-Geol Kim . . . . . . . . . . . . . . . . . . . . . . 176

Preference Bi-objective Evolutionary Algorithm for ConstrainedOptimization

Yuping Wang, Dalian Liu, Yiu-Ming Cheung . . . . . . . . . . . . . . . . . . . . . 184

Self-adaptive Differential EvolutionMahamed G.H. Omran, Ayed Salman, Andries P. Engelbrecht . . . . . . 192

Steady-State Evolutionary Algorithm for Multimodal Function GlobalOptimization

Ziyi Chen, Lishan Kang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

Finding Optimal Addition Chains Using a Genetic Algorithm ApproachNareli Cruz-Cortes, Francisco Rodrıguez-Henrıquez,Raul Juarez-Morales, Carlos A. Coello Coello . . . . . . . . . . . . . . . . . . . . 208

Using Reconfigurable Architecture-Based Intrinsic IncrementalEvolution to Evolve a Character Classification System

Jin Wang, Je Kyo Jung, Yong-min Lee, Chong Ho Lee . . . . . . . . . . . . 216

On the Relevance of Using Gene Expression Programming inDestination-Based Traffic Engineering

Antoine B. Bagula, Hong F. Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

Model and Convergence for the Combination of Genetic Algorithm andAnt Algorithm

Jianli Ding, Wansheng Tang, Yufu Ning . . . . . . . . . . . . . . . . . . . . . . . . . 230

Moving Block Sequence and Organizational Evolutionary Algorithm forGeneral Floorplanning

Jing Liu, Weicai Zhong, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

Integrating the Simplified Interpolation into the Genetic Algorithm forConstrained Optimization Problems

Hong Li, Yong-Chang Jiao, Yuping Wang . . . . . . . . . . . . . . . . . . . . . . . . 247

Page 13: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XVI Table of Contents – Part I

Using Ensemble Method to Improve the Performance of GeneticAlgorithm

Shude Zhou, Zengqi Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

Parallel Mining for Classification Rules with Ant Colony AlgorithmLing Chen, Li Tu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

A Genetic Algorithm Approach on Reverse Logistics Optimization forProduct Return Distribution Network

Gengui Zhou, Zhenyu Cao, Jian Cao, Zhiqing Meng . . . . . . . . . . . . . . . 267

Multi-objective Evolutionary Design and Knowledge Discovery of LogicCircuits with an Improved Genetic Algorithm

Shuguang Zhao, Licheng Jiao, Jun Zhao . . . . . . . . . . . . . . . . . . . . . . . . . 273

Robust Mobile Robot Localization Using an Evolutionary Particle FilterBo Yin, Zhiqiang Wei, Xiaodong Zhuang . . . . . . . . . . . . . . . . . . . . . . . . 279

Hybrid Genetic Algorithm for Solving the Degree-Constrained MinimalBandwidth Multicast Routing Problem

Yun Pan, Zhenwei Yu, Licheng Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

Using Fuzzy Possibilistic Mean and Variance in Portfolio Selection ModelWeiguo Zhang, Yingluo Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

A Novel Genetic Algorithm for Multi-criteria Minimum Spanning TreeProblem

Lixia Han, Yuping Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

Intelligent Agents and Systems

A Software Architecture for Multi-agent SystemsVasu S. Alagar, Mao Zheng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

User-Oriented Multimedia Service Using Smart Sensor Agent Modulein the Intelligent Home

Jong-Hyuk Park, Jun Choi, Sang-Jin Lee, Hye-Ung Park,Deok-Gyu Lee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313

Meta-learning Experiences with the Mindful SystemCiro Castiello, Anna Maria Fanelli . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Learning Cooperation from Classifier SystemsTrung Hau Tran, Cedric Sanza, Yves Duthen . . . . . . . . . . . . . . . . . . . . . 329

Page 14: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part I XVII

Location Management Using Hierarchical Structured Agents forDistributed Databases

Romeo Mark A. Mateo, Bobby D. Gerardo, Jaewan Lee . . . . . . . . . . . . 337

On line Measurement System of Virtual Dielectric Loss Based onWavelets and LabVIEW and Correlation Technics

BaoBao Wang, Ye Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343

Model Checking Temporal Logics of Knowledge and Its Application inSecurity Verification

Lijun Wu, Kaile Su, Qingliang Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349

A Computational Approach for Belief ChangeShangmin Luan, Guozhong Dai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355

Feature Selection by Fuzzy Inference and Its Application to Spam-MailFiltering

Jong-Wan Kim, Sin-Jae Kang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

Design of Multiagent Framework for Cellular NetworksA.K. Sharma, Dimple Juneja . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

Transitive Dependence Based Formation of Virtual OrganizationsBo An, Chunyan Miao, Zhiqi Shen, Yuan Miao, Daijie Cheng . . . . . . 375

An Agent Based Education Resource Purvey SystemXiaochun Cheng, Xin He, Xiaoqi Ma, Dongdai Zhou, Peijun Duan,Shaochun Zhong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

Model of Game Agent for Auction-Based NegotiationJun Hu, Chun Guan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

An Autonomous Mobile Robot Based on Quantum AlgorithmDaoyi Dong, Chunlin Chen, Chenbin Zhang, Zonghai Chen . . . . . . . . 393

A MPC and Genetic Algorithm Based Approach for Multiple UAVsCooperative Search

Jing Tian, Yanxing Zheng, Huayong Zhu, Lincheng Shen . . . . . . . . . . 399

Self-organization Evolution of Supply Networks: System Modeling andSimulation Based on Multi-agent

Gang Li, Linyan Sun, Ping Ji, Haiquan Li . . . . . . . . . . . . . . . . . . . . . . . 405

Modeling and Analysis of Multi-agent Systems Based on π-CalculusFenglei Liu, Zhenhua Yu, Yuanli Cai . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410

Page 15: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XVIII Table of Contents – Part I

A Cooperation Mechanism in Agent-Based Autonomic Storage SystemsJingli Zhou, Gang Liu, Shengsheng Yu, Yong Su . . . . . . . . . . . . . . . . . . 416

A Mobile Agent Based Spam Filter SystemXiaochun Cheng, Xiaoqi Ma, Long Wang, Shaochun Zhong . . . . . . . . . 422

Hexagon-Based Q-Learning to Find a Hidden Target ObjectHan-Ul Yoon, Kwee-Bo Sim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

Intelligent Information Retrieval

A Naive Statistics Method for Electronic Program GuideRecommendation System

Jin An Xu, Kenji Araki . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434

A Hybrid Text Classification System Using Sentential Frequent ItemsetsShizhu Liu, Heping Hu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442

An Approach of Information Extraction from Web Documents forAutomatic Ontology Generation

Ki-Won Yeom, Ji-Hyung Park . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450

Improving Text Categorization Using the Importance of Words inDifferent Categories

Zhihong Deng, Ming Zhang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458

Image Copy Detection with Rotating ToleranceMingni Wu, Chiachen Lin, Chinchen Chang . . . . . . . . . . . . . . . . . . . . . 464

Interactive and Adaptive Search Context for the User with theExploration of Personalized View Reformulation

Supratip Ghose, Geun-Sik Jo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470

Integrating Collaborate and Content-Based Filtering for PersonalizedInformation Recommendation

Zhiyun Xin, Jizhong Zhao, Ming Gu, Jiaguang Sun . . . . . . . . . . . . . . . 476

Interest Region-Based Image Retrieval System Based on Graph-CutSegmentation and Feature Vectors

Dongfeng Han, Wenhui Li, Xiaomo Wang, Yanjie She . . . . . . . . . . . . . 483

A Method for Automating the Extraction of Specialized Informationfrom the Web

Ling Lin, Antonio Liotta, Andrew Hippisley . . . . . . . . . . . . . . . . . . . . . . 489

Page 16: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part I XIX

An Incremental Updating Method for Clustering-BasedHigh-Dimensional Data Indexing

Ben Wang, John Q. Gan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495

Support Vector Machine

Typhoon Track Prediction by a Support Vector Machine Using DataReduction Methods

Hee-Jun Song, Sung-Hoe Huh, Joo-Hong Kim, Chang-Hoi Ho,Seon-Ki Park . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503

Forecasting Tourism Demand Using a Multifactor Support VectorMachine Model

Ping-Feng Pai, Wei-Chiang Hong, Chih-Sheng Lin . . . . . . . . . . . . . . . . 512

A Study of Modelling Non-stationary Time Series Using SupportVector Machines with Fuzzy Segmentation Information

Shaomin Zhang, Lijia Zhi, Shukuan Lin . . . . . . . . . . . . . . . . . . . . . . . . . 520

Support Vector Machine Based Trajectory Metamodel for ConceptualDesign of Multi-stage Space Launch Vehicle

Saqlain Akhtar, He Linshu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528

Transductive Support Vector Machines Using Simulated AnnealingFan Sun, Maosong Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

Input Selection for Support Vector Machines Using Genetic AlgorithmsHee-Jun Song, Seon-Gu Lee, Sung-Hoe Huh . . . . . . . . . . . . . . . . . . . . . . 544

Associating kNN and SVM for Higher Classification AccuracyChe-Chang Hsu, Chan-Yun Yang, Jr-Syu Yang . . . . . . . . . . . . . . . . . . . 550

Multi-class SVMs Based on SOM Decoding Algorithm and ItsApplication in Pattern Recognition

Xiaoyan Tao, Hongbing Ji . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

Selective Dissemination of XML Documents Using GAs and SVMK.G. Srinivasa, S. Sharath, K.R. Venugopal, Lalit M. Patnaik . . . . . . 562

A Smoothing Support Vector Machine Based on Exact Penalty FunctionZhiqing Meng, Gengui Zhou, Yihua Zhu, Lifang Peng . . . . . . . . . . . . . 568

Speech Acts Tagging System for Korean Using Support Vector MachinesSongwook Lee, Jongmin Eun, Jungyun Seo . . . . . . . . . . . . . . . . . . . . . . . 574

Page 17: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XX Table of Contents – Part I

A New Support Vector Machine for Multi-class ClassificationZhiquan Qi, Yingjie Tian, Naiyang Deng . . . . . . . . . . . . . . . . . . . . . . . . 580

Support Vector Classification with Nominal AttributesYingjie Tian, Naiyang Deng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586

A New Smooth Support Vector MachineYubo Yuan, Chunzhong Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592

The Application of Support Vector Machine in the PotentialityEvaluation for Revegetation of Abandoned Lands from Coal MiningActivities

Chuanli Zhuang, Zetian Fu, Ping Yang, Xiaoshuan Zhang . . . . . . . . . . 598

Prediction of T-cell Epitopes Using Support Vector Machine andSimilarity Kernel

Feng Shi, Jing Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604

Radial Basis Function Support Vector Machine Based Soft-MagneticRing Core Inspection

Liangjiang Liu, Yaonan Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609

Direct Adaptive NN Control of a Class of Feedforward SystemsWang Dongliang, Liu Bin, Zhang Zengke . . . . . . . . . . . . . . . . . . . . . . . . 616

Swarm Intelligence

Performance of an Ant Colony Optimization (ACO) Algorithm on theDynamic Load-Balanced Clustering Problem in Ad Hoc Networks

Chin Kuan Ho, Hong Tat Ewe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622

Hybrid Particle Swarm Optimization for Flow Shop Scheduling withStochastic Processing Time

Bo Liu, Ling Wang, Yi-hui Jin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630

Particle Swarm Optimizer with C-Pg MutationGuojiang Fu, Shaomei Wang, Mingjun Chen, Ning Li . . . . . . . . . . . . . 638

Algal Bloom Prediction with Particle Swarm Optimization AlgorithmK.W. Chau . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645

Synthesis of the Antenna Array Using a Modified Particle SwarmOptimization Algorithm

Tengbo Chen, Yong-Chang Jiao, Fushun Zhang . . . . . . . . . . . . . . . . . . . 651

Page 18: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part I XXI

An Ant Colony Optimization Approach to the Degree-ConstrainedMinimum Spanning Tree Problem

Y.T. Bau, C.K. Ho, H.T. Ewe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657

Crowd Avoidance Strategy in Particle Swarm AlgorithmGuimin Chen, Qi Han, Jianyuan Jia, Wenchao Song . . . . . . . . . . . . . . 663

Particle Swarm Optimization with Multiscale Searching MethodXiaohui Yuan, Jing Peng, Yasumasa Nishiura . . . . . . . . . . . . . . . . . . . . 669

Outcome-Space Branch and Bound Algorithm for Solving LinearMultiplicative Programming

Yuelin Gao, Chengxian Xu, Yueting Yang . . . . . . . . . . . . . . . . . . . . . . . . 675

A Binary Ant Colony Optimization for the Unconstrained FunctionOptimization Problem

Min Kong, Peng Tian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682

Data Mining

Mining Dynamic Association Rules in DatabasesJinfeng Liu, Gang Rong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688

A Novel Typical-Sample-Weighted Clustering Algorithm for LargeData Sets

Jie Li, Xinbo Gao, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696

Mining Weighted Generalized Fuzzy Association Rules with FuzzyTaxonomies

Shen Bin, Yao Min, Yuan Bo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704

Concept Chain Based Text ClusteringShaoxu Song, Jian Zhang, Chunping Li . . . . . . . . . . . . . . . . . . . . . . . . . . 713

An Efficient Range Query Under the Time Warping DistanceChuyu Li, Long Jin, Sungbo Seo, Keun Ho Ryu . . . . . . . . . . . . . . . . . . . 721

Robust Scene Boundary Detection Based on AudiovisualInformation

Soon-tak Lee, Joon-sik Baek, Joong-hwan Baek . . . . . . . . . . . . . . . . . . . 729

An FP-Tree Based Approach for Mining All Strongly Correlated ItemPairs

Zengyou He, Shengchun Deng, Xiaofei Xu . . . . . . . . . . . . . . . . . . . . . . . 735

Page 19: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXII Table of Contents – Part I

An Improved kNN Algorithm – Fuzzy kNNWenqian Shang, Houkuan Huang, Haibin Zhu, Yongmin Lin,Zhihai Wang, Youli Qu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741

A New Integrated Personalized Recommendation AlgorithmHongfang Zhou, Boqin Feng, Lintao Lv, Zhurong Wang . . . . . . . . . . . . 747

An Improved EMASK Algorithm for Privacy-Preserving FrequentPattern Mining

Congfu Xu, Jinlong Wang, Hongwei Dan, Yunhe Pan . . . . . . . . . . . . . 752

CR*-Tree: An Improved R-Tree Using Cost ModelHaibo Chen, Zhanquan Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758

Grid-ODF: Detecting Outliers Effectively and Efficiently in LargeMulti-dimensional Databases

Wei Wang, Ji Zhang, Hai Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765

Clustering XML Documents by Structure Based on Common NeighborXizhe Zhang, Tianyang Lv, Zhengxuan Wang, Wanli Zuo . . . . . . . . . . 771

A Generalized Global Convergence Theory of Projection-Type NeuralNetworks for Optimization

Rui Zhang, Zongben Xu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777

Hierarchical Recognition of English Calling Card by UsingMultiresolution Images and Enhanced Neural Network

Kwang-Baek Kim, Sungshin Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785

An Novel Artificial Immune Systems Multi-objective OptimizationAlgorithm for 0/1 Knapsack Problems

Wenping Ma, Licheng Jiao, Maoguo Gong, Fang Liu . . . . . . . . . . . . . . 793

RD-Based Seeded Region Growing for Extraction of Breast Tumor inan Ultrasound Volume

Jong In Kwak, Sang Hyun Kim, Nam Chul Kim . . . . . . . . . . . . . . . . . . 799

Improving Classification for Microarray Data Sets by ConstructingSynthetic Data

Shun Bian, Wenjia Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809

A Method to Locate the Position of Mobile Robot Using ExtendedKalman Filter

Ping Wei, Chengxian Xu, Fengji Zhao . . . . . . . . . . . . . . . . . . . . . . . . . . . 815

Page 20: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part I XXIII

Simulated Annealing with Injecting Star-Alignment for MultipleSequence Alignments

Hongwei Huo, Hua Ming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821

A Noise-Insensitive Hierarchical Min-Max Octree for Visualization ofUltrasound Datasets

Sukhyun Lim, Kang-hee Seo, Byeong-Seok Shin . . . . . . . . . . . . . . . . . . . 827

A Novel Fusing Algorithm for Retinal Fundus ImagesBin Fang, Xinge You, Yuan Yan Tang . . . . . . . . . . . . . . . . . . . . . . . . . . . 833

Improving PSO-Based Multiobjective Optimization Using Competitionand Immunity Clonal

Xiaohua Zhang, Hongyun Meng, Licheng Jiao . . . . . . . . . . . . . . . . . . . . 839

Clonal Selection Algorithm for Dynamic Multiobjective OptimizationRonghua Shang, Licheng Jiao, Maoguo Gong, Bin Lu . . . . . . . . . . . . . 846

Key Frame Extraction Based on Evolutionary Artificial Immune NetworkFang Liu, Xiaoying Pan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852

Clonal Selection Algorithm with Immunologic Regulation for FunctionOptimization

Hang Yu, Maoguo Gong, Licheng Jiao, Bin Zhang . . . . . . . . . . . . . . . . 858

A Fault-Tolerant and Minimum-Energy Path-Preserving TopologyControl Algorithm for Wireless Multi-hop Networks

Zhong Shen, Yilin Chang, Can Cui, Xin Zhang . . . . . . . . . . . . . . . . . . . 864

Computational Biomechanics and Experimental Verification of VascularStent

Yuexuan Wang, Hong Yi, Zhonghua Ni . . . . . . . . . . . . . . . . . . . . . . . . . . 870

Numerical Computing of Brain Electric Field in ElectroencephalogramDexin Zhao, Zhiyong Feng, Wenjie Li, Shugang Tang . . . . . . . . . . . . . 878

A Novel Multi-stage 3D Medical Image Segmentation: Methodologyand Validation

Jianfeng Xu, Lixu Gu, Xiahai Zhuang, Terry Peters . . . . . . . . . . . . . . . 884

Medical Image Alignment by Normal Vector InformationXiahai Zhuang, Lixu Gu, Jianfeng Xu . . . . . . . . . . . . . . . . . . . . . . . . . . . 890

Global Exponential Stability of Non-autonomous Delayed NeuralNetworks

Qiang Zhang, Dongsheng Zhou, Xiaopeng Wei . . . . . . . . . . . . . . . . . . . . 896

Page 21: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXIV Table of Contents – Part I

A Prediction Method for Time Series Based on Wavelet NeuralNetworks

Xiaobing Gan, Ying Liu, Francis R. Austin . . . . . . . . . . . . . . . . . . . . . . 902

Training Multi-layer Perceptrons Using MiniMin ApproachLiefeng Bo, Ling Wang, Licheng Jiao . . . . . . . . . . . . . . . . . . . . . . . . . . . 909

Two Adaptive Matching Learning Algorithms for IndependentComponent Analysis

Jinwen Ma, Fei Ge, Dengpan Gao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 915

Bioprocess Modeling Using Genetic Programming Based on a DoublePenalty Strategy

Yanling Wu, Jiangang Lu, Youxian Sun, Peifei Yu . . . . . . . . . . . . . . . . 921

An Improved Gibbs Sampling Algorithm for Finding TFBSCaisheng He, Xianhua Dai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927

Pattern Recognition

A Novel Fisher Criterion Based St-Subspace Linear DiscriminantMethod for Face Recognition

Wensheng Chen, Pong C. Yuen, Jian Huang, Jianhuang Lai . . . . . . . 933

EmoEars: An Emotion Recognition System for Mandarin SpeechBo Xie, Ling Chen, Gen-Cai Chen, Chun Chen . . . . . . . . . . . . . . . . . . . 941

User Identification Using User’s Walking Pattern over the ubiFloorIIJaeseok Yun, Woontack Woo, Jeha Ryu . . . . . . . . . . . . . . . . . . . . . . . . . 949

Evolving RBF Neural Networks for Pattern ClassificationZheng Qin, Junying Chen, Yu Liu, Jiang Lu . . . . . . . . . . . . . . . . . . . . . 957

Discrimination of Patchoulis of Different Geographical Origins withTwo-Dimensional IR Correlation Spectroscopy and Wavelet Transform

Daqi Zhan, Suqin Sun, Yiu-ming Cheung . . . . . . . . . . . . . . . . . . . . . . . . 965

Gait Recognition Using View Distance VectorsMurat Ekinci, Eyup Gedikli . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973

HMM Parameter Adaptation Using the Truncated First-Order VTSand EM Algorithm for Robust Speech Recognition

Haifeng Shen, Qunxia Li, Jun Guo, Gang Liu . . . . . . . . . . . . . . . . . . . . 979

Page 22: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part I XXV

Model Type Recognition Using De-interlacing and Block CodeGeneration

Cheol-Ki Kim, Sang-Gul Lee, Kwang-Baek Kim . . . . . . . . . . . . . . . . . . 985

R-functions Based Classification for Abnormal Software ProcessDetection

Anton Bougaev, Aleksey Urmanov . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991

A Unified Framework for Shot Boundary DetectionBing Han, Xinbo Gao, Hongbing Ji . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997

Image Recognition with LPP MixturesSiBao Chen, Min Kong, Bin Luo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003

Line-Based Camera CalibrationXiuqin Chu, Fangming Hu, Yushan Li . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009

Shot Boundary Detection Based on SVM and TMRAWei Fang, Sen Liu, Huamin Feng, Yong Fang . . . . . . . . . . . . . . . . . . . . 1015

Robust Pattern Recognition Scheme for Devanagari ScriptAmit Dhurandhar, Kartik Shankarnarayanan, Rakesh Jawale . . . . . . . 1021

Credit Evaluation Model and Applications Based on ProbabilisticNeural Network

Sulin Pang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027

Fingerprint Ridge Line Extraction Based on Tracing and DirectionalFeedback

Rui Ma, Yaxuan Qi, Changshui Zhang, Jiaxin Wang . . . . . . . . . . . . . . 1033

A New Method for Human Gait Recognition Using Temporal AnalysisHan Su, Fenggang Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1039

Microcalcification Patterns Recognition Based Combination ofAutoassociator and Classifier

Wencang Zhao, Xinbo Yu, Fengxiang Li . . . . . . . . . . . . . . . . . . . . . . . . . 1045

Improved Method for Gradient-Threshold Edge Detector Based on HVSFuzheng Yang, Shuai Wan, Yilin Chang . . . . . . . . . . . . . . . . . . . . . . . . . 1051

MUSC: Multigrid Shape Codes and Their Applications to ImageRetrieval

Arindam Biswas, Partha Bhowmick, Bhargab B. Bhattacharya . . . . . . 1057

Page 23: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXVI Table of Contents – Part I

Applications

Adaptation of Intelligent Characters to Changes of Game EnvironmentsByeong Heon Cho, Sung Hoon Jung, Kwang-Hyun Shim,Yeong Rak Seong, Ha Ryoung Oh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1064

An Knowledge Model for Self-regenerative Service ActivationsAdaptation Across Standards

Mengjie Yu, David Llewellyn Jones, A. Taleb-Bendiab . . . . . . . . . . . . . 1074

An Agent for the HCARD Model in the Distributed EnvironmentBobby D. Gerardo, Jae-Wan Lee, Jae-jeong Hwang,Jung-Eun Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082

A New Class of Filled Functions for Global MinimizationXiaoliang He, Chengxian Xu, Chuanchao Zhu . . . . . . . . . . . . . . . . . . . . 1088

Modified PSO Algorithm for Deadlock Control in FMSHesuan Hu, Zhiwu Li, Weidong Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094

Optimization Design of Controller Periods Using Evolution StrategyHong Jin, Hui Wang, Hongan Wang, Guozhong Dai . . . . . . . . . . . . . . 1100

Application of Multi-objective Evolutionary Algorithm in CoordinatedDesign of PSS and SVC Controllers

Zhenyu Zou, Quanyuan Jiang, Pengxiang Zhang, Yijia Cao . . . . . . . . 1106

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113

Page 24: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II

Cryptography and Coding

A Fast Inversion Algorithm and Low-Complexity Architecture overGF (2m)

Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park,Jongin Lim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

An ID-Based Optimistic Fair Signature Exchange Protocol from PairingsChunxiang Gu, Yuefei Zhu, Yajuan Zhang . . . . . . . . . . . . . . . . . . . . . . . 9

FMS Attack-Resistant WEP Implementation Is Still BrokenToshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii . . . . . . . . . . . . 17

Design of a New Kind of Encryption Kernel Based on RSA AlgorithmPing Dong, Xiangdong Shi, Jiehui Yang . . . . . . . . . . . . . . . . . . . . . . . . . 27

On the Security of Condorcet Electronic Voting SchemeYoon Cheol Lee, Hiroshi Doi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Special Distribution of the Shortest Linear Recurring Sequences inZ/(p) Field

Qian Yin, Yunlun Luo, Ping Guo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Cryptanalysis of a Cellular Automata CryptosystemJingmei Liu, Xiangguo Cheng, Xinmei Wang . . . . . . . . . . . . . . . . . . . . . 49

A New Conceptual Framework Within Information Privacy: MetaPrivacy

Geoff Skinner, Song Han, Elizabeth Chang . . . . . . . . . . . . . . . . . . . . . . . 55

Error Oracle Attacks on Several Modes of OperationFengtong Wen, Wenling Wu, Qiaoyan Wen . . . . . . . . . . . . . . . . . . . . . . 62

Stability of the Linear Complexity of the Generalized Self-shrinkingSequences

Lihua Dong, Yong Zeng, Yupu Hu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

On the Construction of Some Optimal Polynomial CodesYajing Li, Weihong Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Page 25: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXVIII Table of Contents – Part II

Perceptual Hashing of Video Content Based on Differential BlockSimilarity

Xuebing Zhou, Martin Schmucker, Christopher L. Brown . . . . . . . . . . 80

Cryptographic Protocols

Secure Software Smartcard Resilient to CaptureSeung Wook Jung, Christoph Ruland . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Revised Fischlin’s (Blind) Signature SchemesKewei Lv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Certificateless Threshold Signature SchemesLicheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian . . . . . . . . . . . 104

An Efficient Certificateless Signature SchemeM. Choudary Gorantla, Ashutosh Saxena . . . . . . . . . . . . . . . . . . . . . . . . 110

ID-Based Restrictive Partially Blind SignaturesXiaofeng Chen, Fangguo Zhang, Shengli Liu . . . . . . . . . . . . . . . . . . . . . . 117

Batch Verification with DSA-Type Digital Signatures for UbiquitousComputing

Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho . . . . . . . . . . 125

On Anonymity of Group SignaturesSujing Zhou, Dongdai Lin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

The Running-Mode Analysis of Two-Party Optimistic Fair ExchangeProtocols

Yuqing Zhang, Zhiling Wang, Bo Yang . . . . . . . . . . . . . . . . . . . . . . . . . . 137

Password-Based Group Key Exchange Secure Against Insider GuessingAttacks

Jin Wook Byun, Dong Hoon Lee, Jongin Lim . . . . . . . . . . . . . . . . . . . . . 143

On the Security of Some Password-Based Key Agreement SchemesQiang Tang, Chris J. Mitchell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

A New Group Rekeying Method in Secure MulticastYong Xu, Yuxiang Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Pairing-Based Provable Blind Signature Scheme Without RandomOracles

Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong . . . . . . . . . . . . . 161

Page 26: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II XXIX

Efficient ID-Based Proxy Signature and Proxy Signcryption FormBilinear Pairings

Qin Wang, Zhenfu Cao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

An Identity-Based Threshold Signcryption Scheme with SemanticSecurity

Changgen Peng, Xiang Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173

A Token-Based Single Sign-On ProtocolLi Hui, Shen Ting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

Simple Threshold RSA Signature Scheme Based on Simple SecretSharing

Shaohua Tang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Efficient Compilers for Authenticated Group Key ExchangeQiang Tang, Chris J. Mitchell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Insider Impersonation-MIM Attack to Tripartite Key AgreementScheme and an Efficient Protocol for Multiple Keys

Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto . . . . . 198

Intrusion Detection

An Immune System Inspired Approach of Collaborative IntrusionDetection System Using Mobile Agents in Wireless Ad Hoc Networks

Ki-Won Yeom, Ji-Hyung Park . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

A New User-Habit Based Approach for Early Warning of WormsPing Wang, Binxing Fang, Xiaochun Yun . . . . . . . . . . . . . . . . . . . . . . . . 212

A Multi-gigabit Virus Detection Algorithm Using Ternary CAMIl-Seop Song, Youngseok Lee, Taeck-Geun Kwon . . . . . . . . . . . . . . . . . . 220

Sampling Distance Analysis of Gigantic Data Mining for IntrusionDetection Systems

Yong Zeng, Jianfeng Ma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

Hardware-Software Hybrid Packet Processing for Intrusion DetectionSystems

Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan . . . 236

D-S Evidence Theory and Its Data Fusion Application in IntrusionDetection

Junfeng Tian, Weidong Zhao, Ruizhong Du . . . . . . . . . . . . . . . . . . . . . . 244

Page 27: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXX Table of Contents – Part II

A New Network Anomaly Detection Technique Based on Per-Flow andPer-Service Statistics

Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto . . . . . . . . . 252

SoIDPS: Sensor Objects-Based Intrusion Detection and PreventionSystem and Its Implementation

SeongJe Cho, Hye-Young Chang, HongGeun Kim,WoongChul Choi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

A Statistical Model for Detecting Abnormality in Static-PriorityScheduling Networks with Differentiated Services

Ming Li, Wei Zhao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Tamper Detection for Ubiquitous RFID-Enabled Supply ChainVidyasagar Potdar, Chen Wu, Elizabeth Chang . . . . . . . . . . . . . . . . . . . 273

Measuring the Histogram Feature Vector for Anomaly Network TrafficWei Yan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

Efficient Small Face Detection in Surveillance Images Using MajorColor Component and LDA Scheme

Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn . . . . . 285

Fast Motion Detection Based on Accumulative Optical Flow andDouble Background Model

Jin Zheng, Bo Li, Bing Zhou, Wei Li . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

Reducing Worm Detection Time and False Alarm in Virus ThrottlingJangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi . . . . . . . . 297

Protection Against Format String Attacks by Binary RewritingJin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi,Sang Jun Lee, Byung Ki Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

Masquerade Detection System Based on Principal Component Analysisand Radial Basics Function

Zhanchun Li, Zhitang Li, Yao Li, Bin Liu . . . . . . . . . . . . . . . . . . . . . . . 309

Anomaly Detection Method Based on HMMs Using System Call andCall Stack Information

Cheng Zhang, Qinke Peng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

Parallel Optimization Technology for Backbone Network IntrusionDetection System

Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen . . . . . . . . . 322

Page 28: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II XXXI

Attack Scenario Construction Based on Rule and Fuzzy ClusteringLinru Ma, Lin Yang, Jianxin Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

A CBR Engine Adapting to IDSLingjuan Li, Wenyu Tang, Ruchuan Wang . . . . . . . . . . . . . . . . . . . . . . . 334

Application of Fuzzy Logic for Distributed Intrusion DetectionHee Suk Seo, Tae Ho Cho . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340

Security Models and Architecture

Dynamic Access Control for Pervasive Grid ApplicationsSyed Naqvi, Michel Riguidel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348

On the Security of the Canetti-Krawczyk ModelXinghua Li, Jianfeng Ma, SangJae Moon . . . . . . . . . . . . . . . . . . . . . . . . 356

A Novel Architecture for Detecting and Defending AgainstFlooding-Based DDoS Attacks

Yi Shi, Xinyu Yang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364

A Variant of Poly1305 MAC and Its Security ProofDayin Wang, Dongdai Lin, Wenling Wu . . . . . . . . . . . . . . . . . . . . . . . . . 375

Covert Channel Identification Founded on Information Flow AnalysisJianjun Shen, Sihan Qing, Qingni Shen, Liping Li . . . . . . . . . . . . . . . . 381

Real-Time Risk Assessment with Network Sensors and IntrusionDetection Systems

Andre Arnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne,Marie Elisabeth Gaup Moe, Svein Johan Knapskog . . . . . . . . . . . . . . . . 388

Design and Implementation of a Parallel Crypto ServerXiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou . . . . . . . . . . . . 398

Survivability Computation of Networked Information SystemsXuegang Lin, Rongsheng Xu, Miaoliang Zhu . . . . . . . . . . . . . . . . . . . . . 407

Assessment of Windows System Security Using VulnerabilityRelationship Graph

Yongzheng Zhang, Binxing Fang, Yue Chi, Xiaochun Yun . . . . . . . . . . 415

A New (t, n)-Threshold Multi-secret Sharing SchemeHuiXian Li, ChunTian Cheng, LiaoJun Pang . . . . . . . . . . . . . . . . . . . . 421

Page 29: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXXII Table of Contents – Part II

An Efficient Message Broadcast Authentication Scheme for SensorNetworks

Sang-ho Park, Taekyoung Kwon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

Digital Image Authentication Based on Error-Correction CodesFan Zhang, Xinhong Zhang, Zhiguo Chen . . . . . . . . . . . . . . . . . . . . . . . . 433

Design and Implementation of Efficient Cipher Engine for IEEE 802.11iCompatible with IEEE 802.11n and IEEE 802.11e

Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park,Ohyoung Song . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439

Secure Delegation-by-Warrant ID-Based Proxy Signcryption SchemeShanshan Duan, Zhenfu Cao, Yuan Zhou . . . . . . . . . . . . . . . . . . . . . . . . 445

Building Security Requirements Using State Transition Diagram atSecurity Threat Location

Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi,Sang Jun Lee, Byung Ki Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451

Study on Security iSCSI Based on SSHWeiping Liu, Wandong Cai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457

A Scheduling Algorithm Based on a Trust Mechanism in GridKenli Li, Yan He, Renfa Li, Tao Yang . . . . . . . . . . . . . . . . . . . . . . . . . . 463

Enhanced Security and Privacy Mechanism of RFID Service forPervasive Mobile Device

Byungil Lee, Howon Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

Worm Propagation Modeling and Analysis on NetworkYunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma . . . . 476

An Extensible AAA Infrastructure for IPv6Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu . . . . . . . . . . . . . . . . . 482

The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11iFan Zhang, Jianfeng Ma, SangJae Moon . . . . . . . . . . . . . . . . . . . . . . . . . 488

A Noble Key Pre-distribution Scheme with LU Matrix for SecureWireless Sensor Networks

Chang Won Park, Sung Jin Choi, Hee Yong Youn . . . . . . . . . . . . . . . . 494

Page 30: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II XXXIII

Security Management

A Virtual Bridge Certificate Authority ModelHaibo Tian, Xi Sun, Yumin Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500

Weak Signals in Information Security ManagementJorma Kajava, Reijo Savola, Rauno Varonen . . . . . . . . . . . . . . . . . . . . . 508

PDTM: A Policy-Driven Trust Management Framework in DistributedSystems

Wu Liu, Haixin Duan, Jianping Wu, Xing Li . . . . . . . . . . . . . . . . . . . . 518

Methodology of Quantitative Risk Assessment for Information SystemSecurity

Mengquan Lin, Qiangmin Wang, Jianhua Li . . . . . . . . . . . . . . . . . . . . . 526

A Secure and Efficient (t, n) Threshold Verifiable Multi-secret SharingScheme

Mei-juan Huang, Jian-zhong Zhang, Shu-cui Xie . . . . . . . . . . . . . . . . . . 532

Improvement on an Optimized Protocol for Mobile NetworkAuthentication and Security

ChinChen Chang, JungSan Lee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

Neural Network Based Flow Forecast and DiagnosisQianmu Li, Manwu Xu, Hong Zhang, Fengyu Liu . . . . . . . . . . . . . . . . . 542

Protecting Personal Data with Various Granularities: A Logic-BasedAccess Control Approach

Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai,Yoshinari Kanamori, Cherri M. Pancake . . . . . . . . . . . . . . . . . . . . . . . . 548

Enhancement of an Authenticated Multiple-Key Agreement ProtocolWithout Using Conventional One-Way Function

Huifeng Huang, Chinchen Chang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554

Topology-Based Macroscopical Response and Control Technology forNetwork Security Event

Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang . . . . . 560

Watermarking and Information Hiding

Adaptive Hiding Scheme Based on VQ-Indices Using CommutableCodewords

Chinchen Chang, Chiachen Lin, Junbin Yeh . . . . . . . . . . . . . . . . . . . . . . 567

Page 31: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXXIV Table of Contents – Part II

Reversible Data Hiding for Image Based on Histogram Modification ofWavelet Coefficients

Xiaoping Liang, Xiaoyun Wu, Jiwu Huang . . . . . . . . . . . . . . . . . . . . . . . 573

An Image Steganography Using Pixel CharacteristicsYoung-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon . . . 581

Alternatives for Multimedia Messaging System SteganographyKonstantinos Papapanagiotou, Emmanouel Kellinis,Giannis F. Marias, Panagiotis Georgiadis . . . . . . . . . . . . . . . . . . . . . . . . 589

Error Concealment for Video Transmission Based on WatermarkingShuai Wan, Yilin Chang, Fuzheng Yang . . . . . . . . . . . . . . . . . . . . . . . . . 597

Applying the AES and Its Extended Versions in a General Frameworkfor Hiding Information in Digital Images

Tran Minh Triet, Duong Anh Duc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605

An Image Hiding Algorithm Based on Bit PlaneBin Liu, Zhitang Li, Zhanchun Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611

A Blind Audio Watermarking Algorithm Robust AgainstSynchronization Attack

Xiangyang Wang, Hong Zhao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617

Semi-fragile Watermarking Algorithm for Detection and Localizationof Temper Using Hybrid Watermarking Method in MPEG-2 Video

Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong . . . . . . 623

Public Watermarking Scheme Based on Multiresolution Representationand Double Hilbert Scanning

Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou,Licong Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629

Performance Evaluation of Watermarking Techniques for SecureMultimodal Biometric Systems

Daesung Moon, Taehae Kim, SeungHwan Jung, Yongwha Chung,Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim . . . . . . . . . . . . . . . . . . . 635

An Improvement of Auto-correlation Based Video WatermarkingScheme Using Independent Component Analysis

Seong-Whan Kim, Hyun-Sung Sung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643

A Digital Watermarking Technique Based on Wavelet PackagesChen Xu, Weiqiang Zhang, Francis R. Austin . . . . . . . . . . . . . . . . . . . . 649

Page 32: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II XXXV

A Spectral Images Digital Watermarking AlgorithmLong Ma, Changjun Li, Shuni Song . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655

Restoration in Secure Text Document Image Authentication UsingErasable Watermarks

Niladri B. Puhan, Anthony T.S. Ho . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661

Web and Network Applications

The Study of RED Algorithm Used Multicast Router Based BufferManagement

Won-Hyuck Choi, Doo-Hyun Kim, Kwnag-Jae Lee,Jung-Sun Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669

Genetic Algorithm Utilized in Cost-Reduction Driven Web ServiceSelection

Lei Cao, Jian Cao, Minglu Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679

MacroOS: A Pervasive Computing Platform Supporting ContextAwareness and Context Management

Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan . . . . . . . . . . . . 687

A Frame for Selecting Replicated Multicast Servers Using GeneticAlgorithm

Qin Liu, Chanle Wu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695

On a Novel Methodology for Estimating Available Bandwidth AlongNetwork Paths

Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu . . . . . . . . . . . . . . . . . . . 703

A New AQM Algorithm for Enhancing Internet Capability AgainstUnresponsive Flows

Liyuan Zhao, Keqin Liu, Jun Zheng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711

Client Server Access: Wired vs. Wireless LEO Satellite-ATMConnectivity; A (MS-Ro-BAC) Experiment

Terry C. House . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719

An Algorithm for Automatic Inference of Referential Integrities DuringTranslation from Relational Database to XML Schema

Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik . . . . . . . . . . . . . . . . . . 725

A Fuzzy Integral Method to Merge Search Engine Results on WebShuning Cui, Boqin Feng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731

Page 33: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXXVI Table of Contents – Part II

The Next Generation PARLAY X with QoS/QoESungjune Hong, Sunyoung Han . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737

A Design of Platform for QoS-Guaranteed Multimedia ServicesProvisioning on IP-Based Convergence Network

Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim . . . . . . . . . . . . . . . 743

Introduction of Knowledge Management System for Technical Supportin Construction Industries

Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim . . . . . . . . . . . . . . . . . . . 749

An Event Correlation Approach Based on the Combination of IHU andCodebook

Qiuhua Zheng, Yuntao Qian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757

Image and Signal Processing

Face Recognition Based on Support Vector Machine Fusion andWavelet Transform

Bicheng Li, Hujun Yin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764

A Dynamic Face and Fingerprint Fusion System for IdentityAuthentication

Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li . . . . . 772

Image Recognition for Security Verification Using Real-Time JointTransform Correlation with Scanning Technique

Kyu B. Doh, Jungho Ohn, Ting-C Poon . . . . . . . . . . . . . . . . . . . . . . . . . 780

Binarized Revocable Biometrics in Face RecognitionYing-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling . . . . . 788

Short Critical Area Computational Method Using MathematicalMorphology

Junping Wang, Yue Hao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796

A Robust Lane Detection Approach Based on MAP Estimate andParticle Swarm Optimization

Yong Zhou, Xiaofeng Hu, Qingtai Ye . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804

MFCC and SVM Based Recognition of Chinese VowelsFuhai Li, Jinwen Ma, Dezhi Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812

Page 34: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II XXXVII

A Spatial/Frequency Hybrid Vector Quantizer Based on a Classificationin the DCT Domain

Zhe-Ming Lu, Hui Pei, Hans Burkhardt . . . . . . . . . . . . . . . . . . . . . . . . . . 820

Removing of Metal Highlight Spots Based on Total Variation Inpaintingwith Multi-sources-flashing

Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang . . . . . . . . . . . 826

Component-Based Online Learning for Face Detection and VerificationKyoung-Mi Lee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832

SPIHT Algorithm Based on Fast Lifting Wavelet Transform in ImageCompression

Wenbing Fan, Jing Chen, Jina Zhen . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838

Modified EZW Coding for Stereo ResidualHan-Suh Koo, Chang-Sung Jeong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845

Optimal Prototype Filters for Near-Perfect-ReconstructionCosine-Modulated Filter Banks

Xuemei Xie, Guangming Shi, Xuyang Chen . . . . . . . . . . . . . . . . . . . . . . 851

Fast Motion Estimation Scheme for Real Time Multimedia Streamingwith H.264

Chan Lim, Hyun-Soo Kang, Tae-Yong Kim . . . . . . . . . . . . . . . . . . . . . . 857

Motion-Compensated 3D Wavelet Video Coding Based on AdaptiveTemporal Lifting Filter Implementation

Guiguang Ding, Qionghai Dai, Wenli Xu . . . . . . . . . . . . . . . . . . . . . . . . 863

Accurate Contouring Technique for Object Boundary Extraction inStereoscopic Imageries

Shin Hyoung Kim, Jong Whan Jang, Seung Phil Lee,Jae Ho Choi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869

Robust Object Tracking Based on Uncertainty Factorization SubspaceConstraints Optical Flow

Yunshu Hou, Yanning Zhang, Rongchun Zhao . . . . . . . . . . . . . . . . . . . . 875

Bearings-Only Target Tracking Using Node Selection Based on anAccelerated Ant Colony Optimization

Benlian Xu, Zhiquan Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881

Image Classification and Delineation of FragmentsWeixing Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887

Page 35: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XXXVIII Table of Contents – Part II

A Novel Wavelet Image Coding Based on Non-uniform ScalarQuantization

Guoyuo Wang, Wentao Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893

A General Image Based Nematode Identification System DesignBai-Tao Zhou, Won Nah, Kang-Woong Lee, Joong-Hwan Baek . . . . . 899

A Novel SVD-Based RLS Blind Adaptive Multiuser Detector forCDMA Systems

Ling Zhang, Xian-Da Zhang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905

New Electronic Digital Image Stabilization Algorithm in WaveletTransform Domain

Jung-Youp Suk, Gun-Woo Lee, Kuhn-Il Lee . . . . . . . . . . . . . . . . . . . . . . 911

Line Segments and Dominate Points Detection Based on HoughTransform

Z.W. Liao, S.X. Hu, T.Z. Huang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917

The Study of the Auto Color Image SegmentationJian Zhuang, Haifeng Du, Jinhua Zhang, Sun’an Wang . . . . . . . . . . . . 923

Regularized Image Restoration by Means of Fusion for Digital AutoFocusing

Vivek Maik, Jeongho Shin, Joonki Paik . . . . . . . . . . . . . . . . . . . . . . . . . . 929

Fast Ray-Space Interpolation Based on Occlusion Analysis and FeaturePoints Detection

Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye,Yong-Deak Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935

Non-parametric ICA Algorithm for Hybrid Sources Based on GKNNEstimation

Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu . . . . . . . . . . . . . . . . . 941

SUSAN Window Based Cost Calculation for Fast Stereo MatchingKyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong . . . . . . . . . . . . . . . 947

An Efficient Adaptive De-blocking AlgorithmZhiliang Xu, Shengli Xie, Youjun Xiang . . . . . . . . . . . . . . . . . . . . . . . . . 953

Facial Features Location by Analytic Boosted Cascade DetectorLei Wang, Beiji Zou, Jiaguang Sun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959

Page 36: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II XXXIX

New Approach for Segmentation and Pattern Recognition of JacquardImages

Zhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo,Jinxiang Dong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965

Nonstationarity of Network Traffic Within Multi-scale BurstinessConstraint

Jinwu Wei, Jiangxing Wu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971

Principle of Image Encrypting Algorithm Based on Magic CubeTransformation

Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan,Guanjun Bao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977

A Study on Motion Prediction and Coding for In-Band MotionCompensated Temporal Filtering

Dongdong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong . . . . . . . . . 983

Adaptive Sampling for Monte Carlo Global Illumination Using TsallisEntropy

Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert . . . . . . 989

Applications

Incremental Fuzzy Decision Tree-Based Network Forensic SystemZaiqiang Liu, Dengguo Feng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995

Robust Reliable Control for a Class of Fuzzy Dynamic Systems withTime-Varying Delay

Youqing Wang, Donghua Zhou . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003

Using Concept Taxonomies for Effective Tree InductionHong Yan Yi, B. de la Iglesia, V.J. Rayward-Smith . . . . . . . . . . . . . . . 1011

A Similarity-Based Recommendation Filtering Algorithm forEstablishing Reputation-Based Trust in Peer-to-Peer ElectronicCommunities

Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen . . . 1017

Automatic Classification of Korean Traditional Music Using RobustMulti-feature Clustering

Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh . . . . . . . . . . . . . . . . . . . . . . 1025

A Private and Efficient Mobile Payment ProtocolChangjie Wang, Ho-fung Leung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1030

Page 37: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

XL Table of Contents – Part II

Universal Designated-Verifier Proxy Blind Signatures for E-CommerceTianjie Cao, Dongdai Lin, Rui Xue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036

An Efficient Control Method for Elevator Group Control SystemUlvi Dagdelen, Aytekin Bagis, Dervis Karaboga . . . . . . . . . . . . . . . . . . . 1042

Next Generation Military Communication Systems ArchitectureQijian Xu, Naitong Zhang, Jie Zhang, Yu Sun . . . . . . . . . . . . . . . . . . . . 1048

Early Warning for Network WormsAntti Tikkanen, Teemupekka Virtanen . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054

Skeleton Representation of Character Based on Multiscale ApproachXinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang,Yuan Yan Tang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1060

Channel Equalization Based on Two Weights Neural NetworkWenming Cao, Wanfang Chai, Shoujue Wang . . . . . . . . . . . . . . . . . . . . 1068

Assessment of Uncertainty in Mineral Prospectivity Prediction UsingInterval Neutrosophic Set

Pawalai Kraipeerapun, Chun Che Fung, Warick Brown . . . . . . . . . . . . 1074

Ring-Based Anonymous Fingerprinting SchemeQiang Lei, Zhengtao Jiang, Yumin Wang . . . . . . . . . . . . . . . . . . . . . . . . 1080

Scalable and Robust Fingerprinting Scheme Using Statistically SecureExtension of Anti-collusion Code

Jae-Min Seol, Seong-Whan Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1086

Broadcast Encryption Using Identity-Based Public-Key CryptosystemLv Xixiang, Bo Yang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1092

Multimedia Digital Right Management Using Selective Scrambling forMobile Handset

Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin,Sung-Jea Ko . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1098

Design and Implementation of Crypto Co-processor and Its Applicationto Security Systems

HoWon Kim, Mun-Kyu Lee, Dong-Kyue Kim, Sang-Kyoon Chung,Kyoil Chung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104

Continuous Speech Research Based on HyperSausage NeuronWenming Cao, Jianqing Li, Shoujue Wang . . . . . . . . . . . . . . . . . . . . . . . 1110

Page 38: Lecture Notes in Artificial Intelligence 3801 - Springer978-3-540-31599-5/1.pdf · Lecture Notes in Artificial Intelligence 3801 ... Yiu-ming Cheung E-mail: ymc@comp.hkbu.edu.hk HujunYin

Table of Contents – Part II XLI

Variable-Rate Channel Coding for Space-Time Coded MIMO SystemChangcai Han, Dongfeng Yuan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1116

A New Watermarking Method Based on DWTXiang-chu Feng, Yongdong Yang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1122

Efficient Point Rendering Method Using Sequential Level-of-DetailDaniel Kang, Byeong-Seok Shin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1127

Construction of a Class of Compactly Supported Biorthogonal MultipleVector-Valued Wavelets

Tongqi Zhang, Qingjiang Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1134

Metabolic Visualization and Intelligent Shape Analysis of theHippocampus

Yoo-Joo Choi, Jeong-Sik Kim, Min-Jeong Kim, Soo-Mi Choi,Myoung-Hee Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1140

Characteristic Classification and Correlation Analysis of Source-LevelVulnerabilities in the Linux Kernel

Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee,Young Ik Eom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157