Advances in Hybrid Information Technology: First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Hybrid Information Technology, ICHIT 2006, held in Jeju Island, Korea, in November 2006.

The 64 revised papers were carefully selected during a second round of reviewing and improvement from 235 reports given at the conference and are presented in extended version in the book. The papers are organized in topical sections on data analysis, modeling, and learning; imaging, speech, and complex data; applications of artificial intelligence; hybrid, smart, and ubiquitous systems; hardware and software engineering; as well as networking and telecommunications.

Author(s): Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-kon Kim, Tai-hoon Kim, Il-seok Ko
Series: Lecture Notes in Artificial Intelligence 4413
Edition: 1
Publisher: Springer
Year: 2007

Language: English
Pages: 681

Front matter......Page 1
The Weighted Classification Problem......Page 11
Adapting ART for Weighted Classification......Page 13
Weighted Selection Criterion......Page 14
Weighted Rule Evaluation Criterion......Page 15
Experimental Results......Page 17
Conclusions and Future Work......Page 19
Introduction......Page 21
Templates in Information Systems......Page 22
Generalized Templates......Page 23
Temporal Templates......Page 24
Tolerance Relations......Page 25
Tolerance Based Templates Generation......Page 26
Conclusions......Page 27
Introduction......Page 30
The Partition Problem......Page 31
The $M$-Relative Reduct Problem......Page 32
Example......Page 33
The Optimal Single Group Partition Problem......Page 35
The Algorithm......Page 36
Algorithm Analysis......Page 38
Conclusions and Further Works......Page 39
Introduction......Page 41
The Process of IDM in Terrorist Network Investigations......Page 42
Social Network Analysis (SNA)......Page 43
Destabilizing Terrorist Networks......Page 45
Conclusion......Page 50
Introduction......Page 52
Data Integration......Page 53
Designing a Suitable Integrated Schema......Page 55
Lazy Types for Coping with Data Heterogeneity......Page 57
Conclusions......Page 59
Algorithm......Page 61
Data Grouping Algorithm by Tangent Curve Clothoid Section......Page 62
Tangent Curve Clothoid Analysis Algorithm......Page 63
Tangent Curve Clothoid Section Beginning Ending Position Estimation Algorithm......Page 64
Acquisition Data......Page 65
Result of the Tangent Curve Clothoid Analysis Algorithm......Page 66
Result of Tangent Curve Clothoid Section Begining Ending Position Estimation Algorithm......Page 67
Residuals Between Observed Values and Estimated Values......Page 69
Conclusion......Page 72
Introduction......Page 73
Related Works......Page 74
Extracting E-Learning Style Using Web Mining......Page 76
A Model for Adaptive Assessment and Feedback......Page 78
Experiment and Discussion......Page 80
Conclusions......Page 82
Introduction......Page 83
Preliminaries to Option Pricing Models......Page 84
Computational Method to Price European Options......Page 85
Empirical Tests......Page 89
Conclusions......Page 91
Introduction......Page 93
Literature Review......Page 94
Experimental Design......Page 95
Data Collection and Overview......Page 96
Modelling......Page 97
Discussion......Page 98
Conclusion and Further Study......Page 100
Introduction......Page 103
Research Trends of ANP......Page 104
Theoretical Consideration of ANP......Page 105
Establishing Network Structure and Evaluation Items......Page 106
Calculation of Weights......Page 107
Analysis of Prioritization Results......Page 110
Conclusions and Further Research......Page 111
Introduction......Page 113
Data Collection and Sites......Page 114
Analysis Using Indicators......Page 116
Correlation Analysis......Page 118
Conclusions and Further Studies......Page 122
Introduction......Page 124
Function Recovery with Stochastic Matrix Methods......Page 125
Stochastic Bernstein Function Recovery......Page 126
Illustrating Data Recovery Using Stochastic Bernstein Approximation......Page 128
Recovery of Noisy Data: Families of Functions......Page 129
Iterative Feature Extraction......Page 131
Applications of the Method: Image Zoom......Page 133
Conclusions......Page 136
Introduction......Page 138
Face Detection Using Multi-color Model......Page 139
Face Tracking and Tilted Face Correction Using Eyes Feature......Page 141
Face Recognition Using Face Feature Vector Function......Page 142
A Face Analysis and Avatar Drawing System......Page 144
Experimental Results......Page 146
Conclusions......Page 147
Introduction......Page 149
Foreground and Background Figure......Page 150
Shadow Region Detection......Page 151
Principal Components Modification......Page 152
Searching Window Area of the Car......Page 154
Experimental Results......Page 155
Conclusion......Page 157
Introduction......Page 159
Three Dimensional Marker-Driven Watershed Transform......Page 160
Volume Measurement of 3D Object Models......Page 162
Volume and Intensity Measurement of SPECT Brain Images......Page 163
Accuracy and Speed of Volume and Intensity Measurement of 3D SPECT Images......Page 165
Conclusions and Discussion......Page 167
Introduction......Page 169
Frequency Trend of IEEE 802.15.4a......Page 170
IEEE 802.15.4a TH UWB-IR System......Page 171
Model of Indoor Multi-path Channel......Page 172
Performance Analysis of System......Page 173
Conclusion......Page 176
Introduction......Page 178
Spam Email and Its Detection......Page 180
Extracting Text from Images by OCR......Page 181
Markov Keyword Models......Page 183
Experimental Results......Page 184
Conclusion and Future Work......Page 186
Introduction......Page 188
Algebraic Codebook Structure......Page 189
Algebraic Codebook Search......Page 190
The Least Important Pulse Replacement Method......Page 191
Global Pulse Replacement Method......Page 192
Proposed Iteration-Free Pulse Replacement Method......Page 193
Experimental Results......Page 195
Conclusion......Page 196
Introduction......Page 198
The Conventional Beamformer......Page 199
Combined Non-adaptive Beamforming and Post Filtering......Page 200
Post-filtering Schemes Using Spectral Subtraction......Page 201
Minimum Mean-Square Error(MMSE) Using a Noncausal, a Priori Signal-to-Noise Ratio(SNR) Estimator......Page 202
Evaluation and Results......Page 203
Performance......Page 204
Conclusion......Page 206
Introduction......Page 208
Proposed BWE Encoder......Page 209
Proposed BWE Decoder......Page 213
Performance Evaluation......Page 215
Conclusion......Page 217
Introduction......Page 219
Personalized and Semantic Location-Based Services......Page 220
System Components......Page 221
Implementation Modules......Page 223
Map Module......Page 224
Ontology Search Module......Page 225
An Example of Ontology-Based Search......Page 226
Conclusion......Page 227
Introduction......Page 229
XML Document and Query Model......Page 230
Related Work......Page 231
Storage Structures......Page 232
Query Processing......Page 233
Performance Evaluation......Page 234
Experimental Results......Page 235
Conclusions......Page 237
Introduction......Page 239
Data Mining......Page 240
Dataset Description......Page 243
Methods......Page 244
Results......Page 245
Conclusion......Page 247
Introduction......Page 250
Cellular Neural Networks......Page 251
Packet Wavelet Representation for Images......Page 253
Simulation Results......Page 255
Conclusion......Page 257
Background......Page 259
RBF Neural Network......Page 260
The Proposed Techniques......Page 261
The Adaptive Training of RBF MUD......Page 262
Center Reduction for Fast Learning......Page 264
Simulation Studies......Page 265
Conclusions......Page 266
Introduction......Page 268
Overview of the Proposed Method......Page 269
Environmental Impact Drivers $(EIDs)$ and Product Attributes......Page 270
A Brief Description of the Proposed Method......Page 271
A Hybrid GA and NN Approach......Page 272
Research Data and Experiments......Page 275
Conclusions......Page 276
Introduction......Page 279
The Bi-level Network Design Problem......Page 281
Representation and Initialization......Page 283
Evaluation......Page 284
Reliability Calculation......Page 285
Experimental Results......Page 286
Conclusion......Page 288
Introduction......Page 291
Hierarchical Network Connectivity in Space Syntax......Page 293
Applying to Public Transport Problem......Page 295
The Case Study......Page 296
Discussion: Modifying the Depth-Based Accessibility......Page 299
Concluding Remarks......Page 300
Introduction......Page 302
Development of ARAEP......Page 303
Evolution Procedure for Case Study......Page 307
Discussions and Conclusions......Page 310
Introduction......Page 312
Multi-UCAV Cooperative Task Scheduling Formulation......Page 313
PSO for Multi-UCAV Cooperative Tasks Scheduling......Page 315
Experiments......Page 317
Conclusion and Future Work......Page 320
Introduction......Page 322
Computer Forensics......Page 323
Computer Forensics Using FPN......Page 324
A Test Intrusion Scenario......Page 326
The Inference Rule of the Scenario......Page 327
The Result Analysis of Inferring......Page 328
Conclusion......Page 331
Introduction......Page 333
Related Work......Page 334
The Social Forces Model......Page 335
Experimental Setup......Page 337
Results......Page 339
Conclusion......Page 341
Introduction......Page 343
The Development of Gameplay Framework......Page 344
Method......Page 346
The Description of GBG......Page 347
Experts' Gameplay Pattern......Page 348
Intermediate Players' Gameplay Pattern......Page 350
Novices' Gameplay Pattern......Page 351
Conclusion and Discussion......Page 352
Introduction......Page 354
Conceptual Framework and Architecture of the Virtual Center......Page 355
Operational Issues......Page 357
Technical Issues......Page 359
Conclusion......Page 360
Introduction......Page 362
Framework of RTIS......Page 364
Data Filtering Algorithm......Page 365
On-Line Updating Procedure......Page 366
A Case Study......Page 367
Conclusions......Page 370
References......Page 371
Introduction......Page 372
Related Works......Page 373
Limitations of Conventional Elevator Scheduling Systems......Page 374
The Context-Aware Elevator Scheduling System (CESS)......Page 376
Performance Evaluation......Page 379
Conclusion......Page 380
Introduction......Page 383
MHAP Design Goals......Page 384
Layered Architecture......Page 385
MHAP Message......Page 386
Message Flow and Topic Naming......Page 387
Other MHAP Services......Page 388
Environment......Page 389
Deployment Architecture......Page 390
Benefit......Page 391
Related Work and Comparison......Page 392
Future Work......Page 393
Introduction......Page 395
Pervasive Networks......Page 396
Multimedia Collaboration Environment......Page 397
Fault Tolerance Agent......Page 399
Simulation Results......Page 401
Conclusions......Page 402
Introduction......Page 405
Related Works......Page 406
HIMSF Design......Page 407
Protocol of the HIMSF......Page 409
Prototype Implementation of the HIMSF......Page 410
Conclusion......Page 412
Introduction......Page 414
Extraction of Information from the Real World......Page 415
Step 1: Perception......Page 418
Step 2: Prediction......Page 419
Step 5: Adaptation......Page 420
Decision of the Best Action Option......Page 421
Conclusion......Page 423
Introduction......Page 424
Intelligent Decision Support System......Page 425
Homecare Monitoring Systems......Page 426
Software Agent as Proxy......Page 427
Recognizing Chronic Conditions from Symptom Patterns......Page 429
Experimental Evaluation......Page 432
Conclusions......Page 433
Introduction......Page 435
Design Concept......Page 436
Sensing and Information Presentation Function......Page 437
Position Sensing Unit......Page 440
Awareness Illumination Unit......Page 441
Support System for Identifying and Noticing Dangers......Page 443
Conclusion......Page 445
Introduction......Page 447
Introduction to u-Healthcare Service......Page 448
Introduction to EPC Sensor Network......Page 449
Situation Dependency in EPC Sensor Network......Page 450
The Situation Dependent Application Areas of EPC Sensor Network in u-Healthcare......Page 451
Analysis of Situation Information of Objects in u-Healthcare......Page 452
Analysis of Subject Situation in u-Healthcare......Page 453
The Situation Dependent Application Areas of EPC Sensor Network in u-Healthcare......Page 454
Conclusion......Page 455
Introduction......Page 457
Distributed Object Group Framework (DOGF)......Page 458
DOGF: A Ubiquitous Healthcare Framework......Page 459
Healthcare Supporting Service......Page 460
Implementing Environment of Healthcare Service......Page 463
Execution Results of the Healthcare Context Information Service......Page 465
Conclusions and Future Works......Page 466
Introduction......Page 468
Related Works......Page 469
Architecture of Load Balancing the Distributed Object Groups......Page 470
CORBA Specification Tools......Page 471
Load Balancing Components......Page 472
Dynamic Replication Scheme......Page 473
Performance Analysis......Page 475
Result......Page 476
Conclusion......Page 477
Design and Implementation of a Performance Analysis and Visualization Toolkit for Cluster Environments......Page 479
Background and Motivation......Page 480
DP*Graph Representation......Page 481
Proposed Toolkit Architecture......Page 482
Experiments and Preliminary Results......Page 483
Timing Graph Representation......Page 484
SPICE3 (Parallel Version of SPICE Instrumented with OpenMP)......Page 485
Conclusions and Future Work......Page 487
Introduction......Page 490
CBD (Component-Based Development)......Page 491
Enterprise Application Framework......Page 492
Architecture of EAF......Page 493
Security Model......Page 494
Design of Security Manager......Page 495
Characteristics of EAF Security Model......Page 496
Implementation Environment......Page 497
Conclusion and the Further Work......Page 498
Introduction......Page 500
Background......Page 501
A Real-Time Tracing Tool......Page 502
Tool Design......Page 503
Tool Implementation......Page 504
Tool Experimentation......Page 506
Conclusion......Page 508
Introduction......Page 510
Java Card Memory System......Page 511
Java Card Installer......Page 512
EEPROM Writing Based on New Buffer Cache Scheme......Page 513
Java Card Installer with Resolution in RAM......Page 515
The Proposed Buffer Cache Scheme with a High Locality......Page 516
Evaluation of Our Approach......Page 518
References......Page 519
Introduction......Page 521
Decompiler......Page 522
EVM (Embedded Virtual Machine)......Page 523
An Outline of the Decompiler......Page 524
SIL-to-C++ Decompiler......Page 525
Experimental Results and Analysis......Page 527
Conclusion......Page 529
Introduction......Page 532
Related Work......Page 533
Mobility of Pharmaceutical Information......Page 534
ATC......Page 535
Information Structures......Page 536
Client/Server Architectures......Page 540
Towards Platform and Device Independency......Page 541
Conclusions......Page 542
Introduction......Page 544
Problem Analysis......Page 545
Overall Structure of the Pet Dog Control System......Page 547
Technical Details of Wireless Module......Page 548
Design and Implementation of Control Devices......Page 549
Test Environment......Page 551
Experimental Test Using Pet Dog......Page 552
Conclusion......Page 554
Introduction......Page 556
Requirements Analysis......Page 557
Modular and Reusable Behavior Modeling......Page 558
Reusable Module Based Hardware Reconfiguration......Page 559
Layered Architecture for Behavior-Based Reasoning......Page 560
Behavior Reasoning Manager......Page 561
Implementation......Page 562
Integrated CLIPS Environment......Page 563
Testing and Results......Page 564
Conclusion......Page 565
Introduction......Page 567
System Model......Page 568
Analysis of the MAI......Page 570
Probability of Bit Error Calculation......Page 571
Conclusion......Page 574
Introduction......Page 576
The Structure and the Characteristics of an AMC Scheme......Page 577
The Structure and the Characteristics of a V-BLAST Scheme......Page 578
The Structure and the Characteristics of Turbo Coded V-BLAST System with Iterative Decoding......Page 579
The Adaptive Modulation System with Conventional Turbo Coded V-BLAST Technique......Page 580
The Adaptive Modulation System with Optimal Turbo Coded V-BLAST Technique......Page 581
Performance of the Adaptive Modulation Systems with Several Turbo Coded V-BLAST Techniques......Page 582
Conclusion......Page 584
Introduction......Page 586
A New Proposed Compression Scheme......Page 587
SN Compression Method......Page 588
TS Compression Method......Page 589
Simulation Model......Page 591
Simulation Results in Case of Video Streaming......Page 593
Conclusion......Page 594
Introduction......Page 596
OFDM Systems in Time-Varying Multipath Channels......Page 597
Conventional Time-Domain Cancellation......Page 599
Repetition Coding Aided Time-Domain Cancellation......Page 600
Simulation Results......Page 602
Conclusion......Page 604
Introduction......Page 606
Related Work......Page 607
Hidden Terminal Problem......Page 608
Transmission Scheduling Algorithm......Page 610
Reader Join......Page 611
Reader Leave......Page 612
Performance Evaluation and Simulation Results......Page 613
Conclusions......Page 615
Introduction......Page 617
Security and Privacy Requirements in RFID Systems......Page 618
Proposed Technical Solution......Page 619
Initial Set-Up Process......Page 620
Authentication Process......Page 621
Security and Efficiency Analysis......Page 622
Efficiency Analysis......Page 623
Conclusion......Page 625
Introduction......Page 627
Spoofing Attack......Page 628
Security Against Denial of Service Attack......Page 630
Protection Against Spoofing Attack......Page 631
Security Assessment of the Proposed Mechanism......Page 633
Conclusion......Page 636
Introduction......Page 638
Related Works......Page 639
A Proposed Base Station Centralised Protocol......Page 640
Cluster Construction Phase......Page 641
Performance Evaluation......Page 643
Conclusions......Page 646
Introduction......Page 648
Related Work......Page 649
Tree-Based Routing......Page 650
Plus-Tree Construction......Page 652
Link Failure......Page 653
Performance Evaluation......Page 655
Conclusion......Page 656
Introduction......Page 657
Related Works......Page 658
System Model and Assumptions......Page 659
Minimize Overall Transmission Power......Page 660
Maximize Utility......Page 661
Energy Link Cost......Page 663
Routing Discovery......Page 664
Numerical Analysis......Page 665
Conclusion and Future Works......Page 667
Introduction......Page 669
Rain Attenuation 1 Minute Rain Rate Measurements......Page 670
Comparison of Correlation of Predicted and Measured Rain Attenuation......Page 671
Effect of Slant Path Length Adjustment Factor......Page 673
Effect of Rain Height......Page 675
Conclusions......Page 677
Back matter......Page 679