Proceedings of the 9th Joint International Conference on Information Sciences (JCIS-06)
342 articles
Proceedings Article
A DSAS-Based Minimum Makespan Model for Multi-location Investment Using Fractional Programming
Cheng-Chang Chang, Yan-Kwang Chen, Wen-Chieh Hsu
This study focuses on an enterprise that wants to expand its business to multiple cities in global and to be one of well-known multinational enterprises (MNEs). Suppose the enterprise utilizes the wholly owned market entry strategy, as well as the decentralized synchronized (market) advancement strategy...
Proceedings Article
A Behavioral Fuzzy Model for Analysis of Overreaction and Underreaction in the Brazilian Stock Market
Renato Aguiar, Roberto Moura Sales, Lucy Sousa
In this paper empirical tests for the overreaction and underreaction hypothesis in the Brazilian stock market are presented. For these tests, due to the complexity of these phenomena, a new model based on the fuzzy set theory is proposed. It is shown that such model is strongly connected with two heuristics...
Proceedings Article
A Modification to the Copula Approach for Pricing Correlation-Dependent Credit Derivatives
Chih-Wei Lee, Cheng-Kun Kuo
This paper proposes a modified copula approach to defining correlation dependence used for pricing credit derivatives. For both single-name and multiname products, how default correlations react to common shocks should be appropriately measured. The copula approach is an effective method for this purpose....
Proceedings Article
End-to-End QoS Provisioning by Flow Label in IPv6
Chuan-Neng Lin, Pei-Chen Tseng, Wen-Shyang Hwang
IPv6 as IP next generation is the successor to IPv4. IPv6 not only solves the shortcomings problem of IPv4 address, but also benefits the QoS especially during network congestion. Flow label field in IPv6 packet header provides an efficient way for packet marking, flow identification, and flow state...
Proceedings Article
Annuity Planning and Consumption-Investment Choices in Retirement Planning
Zhisheng Li, Aparna Gupta
Annuities can be effective tools in managing longevity risk in retirement planning. This paper develops a framework that merges annuity purchase decisions with consumption-investment selections in retirement planning. After introducing a pricing model and a benefit payment model for an annuity, we construct...
Proceedings Article
SBT-QL: A Stock Time Series Query Language based on Specialized Binary Tree Representation
Tak-chung Fu, Fu-lai Chung, Robert Luk, Man-yee Au, Chak-man Ng
Stock time series query is one of the fundamental components in technical analysis. Technical analysts would like to query either a whole time series or a segment of a time series in different resolutions for long-term or short-term investigations. Moreover, unnecessary data points should be filtered...
Proceedings Article
A Personal Financial Planning Model Based on Fuzzy Multiple Goal Programming Method
Chieh-Yow ChiangLin
Traditional financial planning procedures began from taking into account the planner’s initial financial situation, his/her financial goals, and expectations for the future, etc. and then calculating the future cash flows for different time periods under variant scenarios. If the planning result cannot...
Proceedings Article
Snapshot Lifecycle Management
Ching-Hung Lin, Wey Shou-Jen, Tsai Tsung-Lin, Wang Jun-Yao, Hwang Wen-Shyang
This paper sets forth “Snapshot Lifecycle Management”, an innovative way to manage snapshot data rather than using Information Lifecycle Management. There are two major problems occurs in snapshot management by ILM: “inappropriate migration” and “redundancy”. SLM manages snapshot data elaborately according...
Proceedings Article
Comparison between Crisp and Fuzzy Stock-Screening Models
Chieh-Yow ChiangLin
Academic researchers and practitioners have proposed various stock-screening models that always contain more than one stock selecting rule and corresponding parameters. However, the criteria in traditional screening models employ crisp norms, which are unreasonable in reality. This paper proposes the...
Proceedings Article
An Ontology-based Methodology for Communicating Negotiation Agents over Internet
Azucena Montes, Maricela Bravo, José Velázquez
In this article we describe a new methodology to facilitate communications between heterogeneous negotiation agents; in particular we present an ontology solution which allows the publication and sharing of communication primitives over Internet. Traditional negotiation systems exchange messages based...
Proceedings Article
An (3, 3)-Visual Secret Sharing Scheme for Hiding Three Secret Data
Pei-Fang Tsai, Ming-Shi Wang
Visual cryptography is one kind of image encrypting. It is different from traditional cryptography, because it does not need complex computation to decrypt. In current technology, most of visual cryptography are embedded a secret using two shares is limited. This paper proposes a new approach of (3,...
Proceedings Article
A Greedy Approach for Multi-Symbol SMS Message Segmentation
Liang-Chyau Sheu, Heng Ma
In this paper, we propose an algorithm to split a lengthy message to several shorter messages to accomodate the specification adopted by most telecommunication companities. We also open an issue that there may exist better algorithms to solve this problem.
Proceedings Article
Using Ant Colony Optimization to Solve Train Timetabling Problem of Mass Rapid Transit
Jen-yu Huang
The purpose of this research is to using ant colony optimization (ACO) to develop a heuristic algorithm to solve the train timetabling problem. This algorithm takes into consideration the trains scheduling in the transit period between peak period and off-peak period, the conflict resolving and the balance...
Proceedings Article
Design of Bulletin Board System for Online Chance Discovery Process
Yasufumi Takama, Yuta Seo, Yoshihiro Iwase
A bulletin board system (BBS) equipped with Key-Graph is proposed for supporting online chance dis-covery process. While conventional meeting for chance discovery with KeyGraph requires participants to meet in a meeting room, the paper aims to expand the discussion space over the Internet. In order to...
Proceedings Article
Blind Wavelet-based Image Watermarking Based on HVS and Neural Networks
Hung-Hsu Tsai, Chi-Chih Liu, Kuo-Chun Wang
This work proposes a Blind Wavelet-based Image Watermarking (BWIW) technique, based on the human visible system (HVS) model and neural networks, for image copyright protection. A characteristic of the HVS, the Just Noticeable Difference (JND) profile, is employed in the watermark embedding so that the...
Proceedings Article
State-Based Synchronization Protocol in Sensor Networks
Shang-Chih Hsu, Wei Yen
Some applications of the sensor network require precise time synchronization among local clocks of the sensors. Due to the limited resource in the sensor network, it is not trivial to maintain the said synchronization. In this paper, we propose a novel method, referred to as the state-based synchronization...
Proceedings Article
A Heterogeneous Dependency Graph as Intermediate Representation for Instruction Set Customization
Kang Zhao, Bian Jinian, Dong Sheqin
A heterogeneous dependency graph (HDG) defined as the intermediate representation for instruction set automated customization is presented in this paper. The main motivation of this model is to constructs a unified internal specification that bridges the gap from the application benchmarks to the instruction...
Proceedings Article
A Hybrid Mining Approach for Optimizing Returns Policies in e Retailing
Chien-Chih Yu, Cheng-Su Wang
This paper aims at proposing a hybrid mining approach for e-retailers to analyze returns patterns from both the customer and product perspectives, classify customers and products by returns ratios, and then adopt proper returns policies and marketing strategies to the identified classes for reducing...
Proceedings Article
Orientation filtering : a Novel Matching Method
Lucile Martin, Christophe Leroux, Edwige Pissaloux
This paper presents a statistical method to match feature points from stereo pairs of images. The proposed method is evaluated in terms of effectiveness, robustness and computational speed. The evaluation was performed on several pairs of real stereo images of natural scenes taken onboard an unmanned...
Proceedings Article
Calibration Method Accuracy Evaluation via depth reconstruction
Lucile Martin, Christophe Leroux, Edwige Pissaloux
This paper presents a fast method to evaluate the accuracy of a calibration method of a stereovision rig built with commercially available cameras. The method allows by retro projection to quantify very precisely errors in terms of depth reconstruction. The proposed method has been evaluated on the depth...
Proceedings Article
A Realistic Personnel Selection Tool Based on Fuzzy Data Mining Method
Wei-Shen Tai, Chung-Chian Hsu
Recruitment is an important issue of human resource management (HRM). The main purpose of recruitment is to obtain talent from internal and external of organization. However, excellent talent maybe will be missed at the pre-screening process under lack of complete information for managers to judge. In...
Proceedings Article
PRATYUG-"The total security system"
Sivaraman Sriram, Chandan Nadadur
“The innocent are always the first to suffer”. This is an often used proverb. In our quest to make them strong we have devised a total hack proof system for the communication process. In our mission the hackers are not the hunters but the prey. So we introduce a new security system called the bio scanning...
Proceedings Article
Information Asymmetry at Merge and Acquisition - An Investigation on Firms in the Electric Industry
Chi-Yun Hua, Wen-Chih LEE, Yao Min-Li, Chin Wei-Ming
The prior studies are focus on the association between merge and acquisition (M&A) announcement and stockholders’ wealth. There are few studies examining the change in the level of information asymmetry at M&A announcement. Our study, therefore, goes to fill out the aspect. This paper empirically investigates...
Proceedings Article
Query-Based Learning Decision Tree and its Applications in Data Mining
Rayi Chang, Chia-Yen Lo, Wen-De Su, Jen-Chieh Wang
Decision tree is one of the most significant classification methods applied in data mining. By its graphic output, users could have an easy way to interpret the decision flow and the mining outcome. However, decision tree is known to be time consuming. It will spend a high computation cost when mining...
Proceedings Article
Case Mining from Raw Data for Case Library Construction
Chien-Chang Hsu, Ye-Hong Huang
Case-based reasoning systems usually use prior experiences and examples to solve problems. The successfulness of the systems depends on the completeness of case library. It may generate contradictory solutions or increase adaptation cost if the case library contains irrelevant and disordered cases. This...
Proceedings Article
Consumer Network and Market Dynamics
Satoshi Itoh, Yasuyuki Murakami, Takashi Iba
This paper suggests that the interaction between consumers has an impact on market structure, in addition to each consumer’s own behavior. In this paper, we replicate the artificial market model proposed by Onozaki and Yanagita, and extend it by adding the network of consumers in order to show that the...
Proceedings Article
Development of a Patent Matching System Using a Hybrid Approach
SuHoun Liu, Hsiu-Li Liao, Chou-Chih Hsieh
There were many researches about applying various data mining or text mining tools to patent analysis, and there were many scholars and experts have verified the accuracy and the feasibility of those tools. However, since mining tools always tried to analyze the content using some mathematic methodology,...
Proceedings Article
Combing Extended Kalman Filters and Support Vector Machines for Online Option Price Forecasting
Shian-chang Huang
This study combines extended Kalman filters (EKFs) and support vector machines (SVMs) to implement a fast online predictor for option prices. The EKF is used to infer latent variables and makes a prediction based on the Black-Scholes formula, while the SVM is employed to capture the nonlinear residuals...
Proceedings Article
A fuzzy logic method for solving three-tier FMCDM problems
Chien-Chang Chou
The purpose of this paper is to propose a ranking method for solving fuzzy multiple criteria decision making (FMCDM) problems. The representation of multiplication operation on fuzzy numbers is useful for the decision makers to rank all alternatives and choose the best one under the fuzzy multiple criteria...
Proceedings Article
A Personal Ubiquitous Distributed Knowledge Pool System
Chen Tsung Hung, Liu Shyh-Chang, Wang Peng-Shiang, Wan Peng-Shiang
Recently, owing to the fast-developing of the Internet technology, the popularity of the digital devices and the enhancement of the people’s computer ability, therefore the demand of ubiquitous personal knowledge services has gradually been mature. People can use these services to collect information,...
Proceedings Article
Cost Saving Strategies for Bank Operations
Ann Shawing Yang
Recent financial liberalization in Taiwan has caused local banks to face major structural changes. This paper examines the cost structure of 36 local banks in Taiwan using the translog cost function and attempts to identify suitable operating strategies for cost reduction and performance improvements....
Proceedings Article
A knowledge-based decision support system for government vendor selection and bidding
Wei-Kang Wang, Wu Wen, Wen-Bin Chang, Hao-Chen Huang
In this paper, we present a new framework for knowledge-based decision support systems for government vendor selection and bidding. The system integrates a database, rule base and model base as a tool for managers in the decision-making problems via the Internet. The procurement procedures for and architecture...
Proceedings Article
A Financial Decision Supporting System Based on Fuzzy Candlestick Patterns
Chiung-Hon Lee, Alan Liu
A financial decision supporting system based on the fuzzy candlestick pattern is proposed and developed. We model Japanese candlestick patterns by using fuzzy linguistic variables. Japanese candlestick theory is an empirical model of investment decision. The theory assumes that the trend of financial...
Proceedings Article
Multiple Regime Models and Exchange Rate Forecasting
CHUNCHIH CHEN
We extend the basic random walk Markov-Switching model in two ways and evaluate the out-of-sample forecasting performance on the Japanese yen during 1995-2004. First, we estimate both a two- and also a three-regime Markov switching models. Second, we add four exogenous variables as suggested in the monetary...
Proceedings Article
A High-Efficient and Cost-Effective LCD Signal Processor
Tze-Yun Sung
This paper investigates the system of LCD monitor and TV signal processor. It is shown that the processor provides scalar, brightness and contrast adjuster, Gamma correction and dithering. The algorithms are discussed and implemented by Verilog hardware description language. The key hard codes are displayed....
Proceedings Article
MASS DETECTION AND CLASSIFICATION IN BREAST ULTRASOUND IMAGES USING FUZZY SVM
Xiangjun Shi, Heng_Da Cheng, Liming Hu
Breast cancer is the leading cause of death of women in United States. Currently the effective method for early detection and screening of breast cancers is X-ray mammography. But the high rate of false positives in mammography causes a large number of unnecessary biopsies. Sonography is an important...
Proceedings Article
Role of Corner Detection in Capturing Shape Outlines
Asif Masood, Shaiq Haq
In this paper, a role of corner detection in outline capturing system is studied/discussed, which is normally used as phase 1 of capturing. Three outline capturing techniques are studied, one without involving any corner detection and two with most suited corner detectors. One common curve approximation...
Proceedings Article
A New Method for the Registration of Mammograms
Yih-Chih Chiou, Cheng-Yu Lin, Yu-Teng Liang
Mammogram registration is a critical step in automatic detection of breast cancer. Much research has been devoted to registering mammograms using either feature-matching or similarity measure. However, few studies have been done on combining these two methods. In this research, a hybrid mammogram registration...
Proceedings Article
An Object-Relational Data Warehouse Modelig for Complex Data
Wen-Yang Lin, Chin-Ang Wu, Chuan-Chun Wu
This paper proposed an object relational data warehouse modeling for complex data. This model can be viewed as an extension of relational star schema that incorporates the features of object-oriented data model. In this model, non-additive complex data such as video, audio, graphics and text can be shown...
Proceedings Article
How To Find The Useful Information For The Referential Integrity Problem
Chia-Chih Hsu, Nigel Shadbolt
The solution for the referential integrity problem is mainly addressed into what the useful information is. Thus, in contrast with the usual heuristics extracted from the problem domain, the novel approach of our research is to formally model the way to explain what the useful information is. We find...
Proceedings Article
Constructing Hierarchical Topic Knowledge Window for Chinese News Browsing and Retrieval
Sheng-Fu Chang
This paper proposes an event-based hierarchical knowledge structure for Chinese news display. We apply Hierarchical Topic Detection and Tracking technique to group news reports into clusters. Considering the extensibility of events, the knowledge structure is designed with robustness to merge similar...
Proceedings Article
Protein-Protein Interaction Document Mining
Shing Doong, Shu-Fen Hong
Protein-protein interactions (PPI) are very important to the understanding of metabolic pathway. Many digital publications are available today; some of them discuss PPI and some of them do not. If machine learning techniques can be used to detect those PPI documents automatically, it would save researchers...
Proceedings Article
A comparative study of matrix inversion by recursive algorithms through single and double bordering
Bhavanam Rami Reddy, Ramabhadra Prof. I. Ramabhadra Sarma
In this paper we have derived single and double bordering methods for computation of the inverse of a matrix. The performance of these methods is compared with some existing methods . We conclude the following: For a general nonsingular matrix, both single and double bordering methods are superior to...
Proceedings Article
Service Oriented Federated Identity System Framework
Min Wu, Xiaoqiang Liu, Yongsheng Ding, Jiaxun Chen
The rapid evolution of network and distributed computing, such as Service Oriented Architecture (SOA), is increasing the challenge of securely controlling access to enterprise IT resources. As gaining access to distributed resources becomes increasingly vital, the ability to make sure that the right...
Proceedings Article
Application of Fuzzy Multiple Attribute Decision Marking method to Evaluate Customer Satisfaction
Min-Chang Lee
Proceedings Article
USIS: A Unified Framework for Secured Information System Lifecycle
Bei-Tseng Chu, Huiming Yu, Audrey Dance
Information security ≠ information system + security features such as access control and intrusion detection. Security considerations must be an integral part of the entire lifecycle of the information system. This paper presents a framework to systematically classify all security considerations throughout...
Proceedings Article
How to design optimistic operations for peer-to-peer replication
Hyun-Gul Roh, Jin-Soo Kim, Joon-Won Lee
As collaboration over the Internet becomes an everyday affair, it is increasingly important to provide high quality of interactivity. Distributed applications can replicate collaborative objects at every site for the purpose of achieving high interactivity. Replication, however, has a fatal weakness...
Proceedings Article
Probabilistic Financial Decision Support Framework
Chiu-Che Tseng
The challenge of the business decision support domain is that a large amount of diverse information can be potentially relevant to a decision, and that, frequently, the decisions have to be made in a timely manner. This presents the potential for better decision support, but poses the challenge of building...
Proceedings Article
Computational Experiments on Algorithms for Haplotype Inference Problems by Pure Parsimony
I-Lin Wang, Hui-E Yang
To analyze the function of DNA, researchers have to obtain each haplotype, the genetic constitution of an individual chromosome, of an individual for analysis. Due to the significant efforts required in collecting haplotypes, genotypes, which are the descriptions of one conflated pair of haplotypes,...
Proceedings Article
A Conceptual Framework for Collaboration Systems
Chao-Chin Yeh, Huei-Huang Chen
Due to the high complication of collaboration system, this thesis proposes a conceptual framework for collaboration system as a reference architecture for the collaboration systems. In the mean time, this thesis illustrates the functionalities of a collaboration system, the problems it resolved, and...
Proceedings Article
Optimal Energy Consumption for Wireless Sensor Networks
Hung-Chin Jang, Hon-Chung Lee, Jun-Xiang Huang
Due to congenital restriction of sensors, it is always a crucial issue on how to utilize limited energy effectively. We first put forward a network topology construction method, based on energy saving, including the way of forming a cluster and selecting middle heads and cluster heads. We then employed...
Proceedings Article
OSSP: Overlay Streaming Service Platform
Tein-Yaw Chung, Huai-Lei Fu, Chih-Chen Wang, Yung-Mu Chen
Overlay network had received great attention in recent years. Overlay network usually used the peer-to-peer(P2P) networking paradigm for enabling end systems to share their resources. Recent researches had proposed many interesting applications on overlay network such as files sharing and multimedia...
Proceedings Article
Multiple Dynamic Quality Systems Using Hybrid Neuro-Ants Technique
Hsu-Hwa Chang, Chih-Hsien Chen, Ching-Shih Tsou
Robust parameter design has been successfully applied to a variety of engineering problems for enhancing the robustness of the system; however, it cannot deal with multiple dynamic quality systems. Although several other approaches have been presented to resolve this problem, they are unable to efficiently...
Proceedings Article
A study of some easily parallellizable automata
Sylvie Hamel
A vector algorithm is an algorithm that applies a bounded number of vector operations to an input vector, regardless of the length of the input. The allowable operations are usually restricted to bit-wise operations available in processors, including shifts and binary addition with carry. This paper...
Proceedings Article
An Elegant Deadline Calculation for SCED
Lain-Chyr Hwang, Chia-Hsu Kuo, San-Yuan Wang
The future multimedia Internet needs mechanisms to provide QoS (Quality of Service) for users. Service curve (SC) is an effective description of QoS and SCED (service curve based earliest deadline first policy) is an efficient scheduling algorithm to guarantee SCs specified by users. Deadline calculation...
Proceedings Article
Unconditionally secure cryptosystem based on quantum cryptography
Yu Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer Shyong Chen
Most cryptographic works these days have employed mathematical concepts to design cryptosystems and algorithms. Therefore, mathematical concepts have become critical in the designing of cryptosystems, and are generally used to analyze cryptosystems and protocols, supporting the allegation that the intended...
Proceedings Article
Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem
Yu Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
This study presents an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the properties of elliptic curve cryptosystem and ring signature. While the signers are endowed with anonymity through the technique of ring signature, the elliptic curve cryptosystem achieves...
Proceedings Article
Semantic entailment of attribute-dependency formulas and their non-redundant bases
Radim Belohlavek, Vilem Vychodil
AD-formulas are simple formulas representing particular dependencies in data tables. We study AD-formulas from the logical point of view. In particular, we present results regarding the relationship of AD-formulas to attribute implications, models and entailment of AD-formulas, non-redundant bases, and...
Proceedings Article
Fuzzy Collaborative Filtering for Web Page Prediction
Chein-Shung Hwang, Yu-Pin Chen
Web page prediction is a popular personalized service on the Web and has attracted much research attention. One of the most successful and widely used approaches is collaborative filtering. Traditional collaborative filtering requires explicit user participation for providing his/her interest to the...
Proceedings Article
An Efficient CORDIC-Based Vector Interpolator in Power-Aware 3-D Graphics Rendering
Tze-Yun Sung
High performance architectures for the data intensive and latency restrained applications can be achieved by maximizing both parallelism and pipelining. In this paper, the CORDIC based hardware primitives of 3-D rotation with high throughput 3-D vector interpolation are presented. The proposed architecture...
Proceedings Article
An ILP Approach to the Simultaneous Application of Operation Scheduling and Power Management
Shih-Hsu Huang, Chun-Hua Cheng, Chung-Hsin Chiang, Chia-Ming Chang
At the behavioral level, large power saving is possible by shutting down unused operations, which is commonly referred to as power management. However, on the other hand, operation scheduling has a significant impact on the potential for power saving via power management. In this paper, we present an...
Proceedings Article
Distributed Algorithms to Solve the FOP Issues on the Weighted Convex-Split Networks
Shin-Jer Yang, Tzu-Chi Guo
This paper discusses the Flow-Orientation Problem (FOP), which assigns orientations of all links of an undirected network to obtain a directed network for meeting some flow optimization measurements. First, we describe the background and define three related FOP issues: MDFOP, MDSFOP, and MDDFOP. We...
Proceedings Article
Uncoercible Anonymous Electronic Voting
Chun-I Fan, Wei-Zhe Sun
In this thesis, we have proposed an anonymous electronic voting scheme with uncoercibility, and we make use of two especial mechanisms called multiple receipts and dual randomization instead of the previous receipt-freeness to achieve the uncoercibility property. Moreover, we also adopt blind signatures...
Proceedings Article
Reliable Transmission of Multimedia Streaming In Cluster-Based Ad Hoc Networks
Meng-Yen Hsieh, Yueh-Min Huang, You-Sheng Liu
Cluster-based routes help data transmission in ad hoc networks. Mobile users are organized into a cluster for requiring common multimedia service. However, node mobility does not guarantee multimedia transmission. This study presents a measure of cluster-based route’s stability based on a prediction...
Proceedings Article
Robust image hiding method
Yung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu
Image hiding is hiding a secret image embedding to a cover image. This paper intends to propose an image hiding method. First, a secret image is compressed by BST. Meanwhile, dividing the compressed data into different ranks depends on the significance. Then, the cover image is transformed into frequency...
Proceedings Article
Reversible Palette Image Steganography Based on De-clustering and Predictive Coding
Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang
Steganographic technology acts as the important role which defends information security in the network. The information could be hidden in multimedia object. Even if transmitted in an unsafe channel, the information is invisible by human visual system to maintain security. This paper presents a reversible...
Proceedings Article
A DCT-based Recoverable Image Authentication
Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu
In this paper, a scheme that has tamper proofing and recovery abilities is proposed. With the specific DCT frequency coefficients taken as the characteristic values, which are embedded into the least significant bits of the image pixels, it is used to provide proof of image integrity. If the image is...
Proceedings Article
Oncogenes and Subtypes of Diffuse Large B-Cell Lymphoma Discoveries from Microarray Database
Ching-Hao Lai, Jun-Dong Chang, Meng-Hsiun Tsai
This paper presents an effective analysis scheme for Diffuse Large B-Cell Lymphoma (DLBCL) microarray datasets. Analysis of variable (ANOVA) is a well known statistics tools. It is useful to get the oncogenes to distinguish the normal and cancerous tissues. But, it can not further obtain the sub-types...
Proceedings Article
A new cryptographic key assignment scheme using a one-way hash function
Hui-Feng Huang
Proceedings Article
A new efficient authentication scheme for Session Initiation Protocol
Hui-Feng Huang
Proceedings Article
An Effective Prefetching Technique for Location-Based Services with PPM
Chih-Cheng Lien, Chien-Chih Wang
Location-Based Services (LBS) are available on hand-held devices and become a field of active research since the recent advances in wireless communication and mobile environment. Due to the constraints of bandwidth of network, space of storage and energy of battery in the mobile client, slow information...
Proceedings Article
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys
Yafen Chang, Chin-Chen Chang
In 2004, Abe et al. proposed a novel threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme. They claimed that their scheme allows the base signature schemes to be based on sigma-protocols, including Schnorr’s signature scheme,...
Proceedings Article
A secure and efficient scheme for authenticating remote users using smart card
Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang
In 2002, Chien, Jan, and Tseng proposed an e±cient and practical solution to remote authentication using smart card. However, in 2004, Hsu pointed out Chien, Jan, Tseng's scheme has a secure flaw that is vulnerable to parallel session attack. Therefore, in this paper, we improve Chien, Jan, Tseng's scheme...
Proceedings Article
Adaptive P2P caching for video broadcasting over wireless Ad Hoc network
You-sheng Liu, Yueh-Min Huang, Meng-Yen Hsieh
With the advance of science and technology, wireless networks are becoming a significant part of today’s access networks. Ad hoc networks are wireless mobile networks without an infrastructure. Recently more and more multimedia services are applied to ad hoc networks. Because of the problem of the mobility,...
Proceedings Article
By Adjusting Keyword Frequency and Separating Keyword into Different Layers to Improve Readability of KeyGraph in Decision Making
Fang-Cheng Hsu, Yen-Chih Wang
Providing qualified documents are expected helpful for KeyGraph to translate the documents an appropriate and easy read KeyGraph diagram. And further, to discover worthy chances for decision making. We proposed 2 preprocessing strategies for assuring appropriate quality of documents, especially for decision...
Proceedings Article
The Connected p-Center Problem with Extension
William Chung-Kung Yen, Chien-Tsai Chen
Let G(V, E, W) be a graph n vertices and m edges, where each edge e is associated with a positive distance W(e). The traditional p-Center problem is to locate some kind of facilities at p vertices of G to minimize the maximum distance between any vertex and its nearest facility. This paper proposes a...
Proceedings Article
Floorplanning by A Revised 3-D Corner Block List with sub-C+-tree
Sheqin Dong, Rensheng Wang, Fan Guo, Jun Yuan, Xianlong Hong
In this paper we present a 3-D floorplan representation based on the methodologies of Corner Block List (CBL). Our model is an extension and generalization of the original 2-D CBL and inherits its most crucial advantages including: linear time operations and evaluations, relatively small solution space...
Proceedings Article
A Novel Tour Construction Heuristic for Traveling Salesman Problem Using LFF Principle
Sheqin Dong, Fan Guo, Jun Yuan, Rensheng Wang, Xianlong Hong
Less Flexibility First(LFF) principle is inspired and developed by enhancing some rule-of-thumb guidelines resulting from the generation-long work experience of human professionals in ancient days. In this paper, we generalize this principle to the classical Traveling Salesman Problem and propose a tour...
Proceedings Article
Stochastic Local Search Using the Search Space Smoothing Meta-Heuristic:A Case Study
Sheqin Dong, Fan Guo, Jun Yuan, Rensheng Wang, Xianlong Hong
In this paper, two smoothing effects are firstly pointed out by analysis and by experiment on Traveling Salesman Problem(TSP) instances. We design a novel algorithm which runs stochastic local search under the SSS framework. The function determining the accepting probability of uphill moves is designed...
Proceedings Article
A Computation-Aware Scheme for Motion Estimation in H.264
Jin-Jang Leou, Fu-Chieh Chuang
In this study, a computation-aware scheme for motion estimation (ME) in H.264 is proposed. The objective of the proposed scheme is to properly distribute the available ME computations of the H.264 encoder. Here, the temporal motion vector prediction technique is used to get the predicted motion vector...
Proceedings Article
The Globally Bi-3*-Connected Property of the Brother Trees
Tung-Yang Ho, Po-Chun Kuo, Lih-Hsing Hsu
Assume that n is any positive integer. The brother tree BT(n)is an interesting family of 3-regular planar bipartite graphs recently proposed by Kao and Hsu. In any BT(n), we prove that there exist three internally-disjoint spanning paths joining x and y whenever x and y belong to different partite sets....
Proceedings Article
The maximum interval graphs on distance hereditary graphs
Sheng-Lung Peng, Ton Kloks, Chuan-Min Lee
In this paper we propose a linear-time algorithm to solve the problem of finding an induced interval graph with a maximum number of vertices in a distance hereditary graph.
Proceedings Article
Discovering Hidden Blue Ocean Strategy with KeyGraph Machine
Fang-Cheng Hsu, Han_Yuan Lee, Tzong-Heng Chi
Researchers usually focused on using unstructured documents as input documents of KeyGraph. But the unstructured documents might results in unclear keywords and meaningless keywords. Although traditional document preprocessing could dismiss some of the problems, generating complex and unreadable KeyGraph...
Proceedings Article
A High-Efficient Line-Based Architecture for 2-D Lifting-Based DWT Using 9/7 Wavelet Filters
Tze-Yun Sung
In this paper, a high-efficient lined-based architecture for the 9/7 discrete wavelet transform (DWT) based on lifting scheme is proposed. The proposed parallel and pipelined architecture consists of a horizontal filter (HF) and a vertical filter (VF). The critical path of the proposed architecture is...
Proceedings Article
An Efficient Object Tracking Algorithm in Wireless Sensor Networks
Cheng-Ta Lee, Frank Yeong-Sung Lin, Yean-Fu Wen
In this paper, we develop a heuristic algorithm to construct an efficient object tracking in wireless sensor networks (WSNs). Such wireless sensor network has to be designed to achieve efficient object tracking for given arbitrary topology of wireless sensor networks. We consider the two-way object moving...
Proceedings Article
A Database Watermarking Technique for Temper Detection
Meng-Hsiun Tsai, Hsiao-Yun Tseng, Chen-Ying Lai
People pay much attention to the technology of data mining recently and more and more research institutions begin to buy the databases to analyze. If it doesn’t concern customer’s secrets the enterprises would also like to sell their data warehouse to do the research. Therefore, it becomes an important...
Proceedings Article
Adaptive Error Control for Scalable Video Streaming over Wireless Internet
Jen-Wen Ding, Wei-Jen Chen, Chu-Fu Wang
With the wide deployment of broadband wireless networks around the world, there is a growing interest in wireless personalized video streaming. However, the bit error rate (BER) of wireless networks is much higher than that of wired networks. The high BER, unfortunately, will significantly degrade the...
Proceedings Article
On the Two-Equal-Disjoint Path Cover Problem of Crossed Cubes
Pao-Lien Lai, Hong-Chun Hsu
Embedding of paths have attracted much attention in the parallel processing. Many-to-many communication is one of the most central issues in various interconnection networks. A graph $G$ is globally two-equal-disjoint path coverable if for any two distinct pairs of vertices $(u, v)$ and $(w, x)$ of $G$,...
Proceedings Article
An Architecture and Programming Framework for Dynamic Reconfigurable Computing Systems
Qiang Wu, Wei Xie, Wei Wang
Dynamic reconfigurable computing (DRC) system is becoming increasingly attractive with its potential to combine high performance and rich functionality. But problems exist in practical application of DRC, such as that designers need to know the architectural and physical details of reconfigurable device....
Proceedings Article
The Process of the Effective Pricing Strategy Using PRISM
Katsutoshi Yada, Kosuke Ohno
The purpose of this paper is to propose a system and process for maximizing store profits to discover the optimal price pattern among various items based on a purchase prediction models. This system, called PRISM, involves the use of data mining techniques to handle a large amount of customer purchase...
Proceedings Article
Multi-Layer Allocated Learning Based Neural Network for Resource Allocation Optimization
Po-Chang Ko, Ping-Chen Lin, Jan-An You, Yu-Jen Tien
The investor’s asset allocation choice deeply depends on the trade-off between risk and return. The well-known mean variance method requires predetermined risk and expected return to calculate optimal investment weights of portfolio. The artificial neural network (ANN) with nonlinear capability is proven...
Proceedings Article
High-Efficient Architectures for 2-D Lifting-Based Forward and Inverse Discrete Wavelet Transform
Tze-Yun Sung
In this paper, high-efficient lifting-based architectures for the 5/3 discrete wavelet transform (DWT) are proposed. The proposed parallel and pipelined architecture consists of a horizontal filter (HF) and a vertical filter (VF). The system delays of the proposed architectures are reduced. Filter coefficients...
Proceedings Article
A Novel Feature Selection for Gene Expression Data
Cheng-Hong Yang, Li-Yeh Chuang, Chung-Jui Tu, Hsueh-Wei Chang
The feature selection process can be considered a problem of global combinatorial optimization in machine learning, which reduces the number of features, removes irrelevant, noisy and redundant data, and results in an acceptable classification accuracy. Therefore, a good feature selection method based...
Proceedings Article
Face Detection in Non-uniform Illumination Conditions by Using Color and Triangle-based Approach
Chiunhsiun Lin
This investigation develops an efficient face detection scheme that can detect multiple faces in color images with complex environments and non-uniform illumination conditions. The proposed scheme comprises two stages. The first stage adopts YES color and triangle-based segmentation to search potential...
Proceedings Article
A Framework for the Description of Spatiotemporal Relationships
Peiquan Jin, Lihua Yue
Spatiotemporal data model, which is the basis of spatiotemporal information management, deals with the representation and manipulation of spatiotemporal data. So far many spatiotemporal data models have been proposed, but most of them concentrated on the representation of spatiotemporal objects and few...
Proceedings Article
A Cross-Layer Control Based on Fuzzy Automata for Ad-Hoc WLAN QoS
Chao-Lieh Chen, Hsin-Long Yang, Yao-De Huang
This paper proposes a new interface model for crosslayer designs using generalized fuzzy automata (GFA) and fuzzy control. When using the proposed model, an upper layer is reduced to an adaptive and cognitive controller and the lower layers act as hierarchical plants. In this paper, we utilize the model...
Proceedings Article
Constructing Knowledge Maps of A Manager's Managerial Logic by A Text Mining Approach
Jen-Ying Shih, Yu-Jung Chang
The objective of this research is to represent the managerial logic of Mr. Yung-Ching Wang, the Chairman of Formosa Plastics Group (also known as the “God of Business” in Taiwan) through the construction of knowledge maps using a text-mining approach, including automatic key phrase extraction, term identification,...
Proceedings Article
Leveraging Ontology-Based Traditional Chinese MedicineKnowledge System: Using Formal Concept Analysis
Kwoting Fang, Chingwei Chang, Yenping Chi
The main purpose of this paper is to show the use of FCA to support the building of ontology-based Traditional Chinese Medicine with herbal medicine serving as an example. This knowledge-sharing platform may make expert’s knowledge clearer, may connect with average people, and may provide patients with...
Proceedings Article
An Algorithm For Identifying The Recurring
Xiaobai Li, Honglei Qin, Rongling Lang
The problem of detecting the given subsystems in complex circuits is now an important problem in the computer aided design of VLSI. The algorithm for solving the problem of detecting recurring subsystems is presented in this paper. The algorithm is structure independent, namely any circuit which can...