Table of Contents

 

AP Catalog Number

AP-PROC-CS-09CN005

ISBN

978-952-5726-07-7 (Print)

978-952-5726-08-4 (CD-ROM)

Proceedings published by

Copyright @ 2009 ACADEMY PUBLISHER All rights reserved

View : 1-50 | 51-100 | 101-122 | Back to top

View : 1-50 | 51-100 | 101-122

Front Matter

i-xii

PDF

An Ingenious Data Hiding Scheme for Color Retinal Image

C. C. Chang, Z. H. Wang, and Z. X. Yin

1

Abstract | PDF

Key Frame Extraction from MPEG Video Stream

Guozhu Liu and Junming Zhao

7

Abstract | PDF

An Algorithm for Mining Maximum Frequent Itemsets Using Data-sets Condensing and Intersection Pruning

Shui Wang, Ying Zhan, and Le Wang

12

Abstract | PDF

Research Survey on Integrated Software Engineering Environment Based on Product Line

Jianli Dong

16

Abstract | PDF

SimHash-based Effective and Efficient Detecting of Near-Duplicate Short Messages

Bingfeng Pi, Shunkai Fu, Weilei Wang, and Song Han

20

Abstract | PDF

The Matrix Reduct Algorithm of Incomplete Decision Table

Wenjun Liu and Zhuo Long

26

Abstract | PDF

Efficiently Methods for Embedded Frequent Subtree Mining on Biological Data

Wei Liu, Ling Chen, and Lan Zheng

30

Abstract | PDF

Active Worm Propagation Modeling in Unstructured P2P Networks

Xiaosong Zhang, Ting Chen, Jiong Zheng, and Hua Li

35

Abstract | PDF

Method of the Object-oriented Program Exact Testing

Xiaolan Wang, Yanshuai Zhang, and Hong He

39

Abstract | PDF

Aggregated Binary Relations and Rough Approximations

Liping An and Lingyun Tong

45

Abstract | PDF

The Research of Direct Routing Technology Implementing the Load Balancing

Yan Gao, Zhibin Zhang, and Weifeng Du

49

Abstract | PDF

Fault Tree Based Architectural Analysis for E-Business Systems

Wang Chu and Yanli Feng

52

Abstract | PDF

Detailed Soot Source Terms Modeling in Turbulent Reacting Flow

Yongfeng Liu, Youtong Zhang, Hongsen Tian, and Lianda Liu

58

Abstract | PDF

Strong Barrier Coverage for Intrusion Detection in Wireless Sensor Network

Jianbo Li, Shang Jiang, and Zhenkuan Pan

62

Abstract | PDF

A PSO Algorithm Based on Biologe Population Multiplication (PMPSO)

Lei Yin and Xiaoxiang Liu

66

Abstract | PDF

Optimal Operation of Hydropower Station by Using an Improved DE Algorithm

Lei Yin and Xiaoxiang Liu

71

Abstract | PDF

Combination of Cloud Model and Rough Set to Find Knowledge in IDSS for Intelligent Disaster Emergency Decision

Hongli Wang

75

Abstract | PDF

Research into Models of Intelligence - type Multimedia Teaching Software Focusing on Thinking

Lan Wang

80

Abstract | PDF

The Research of Intelligent Tutoring System Based on the Cognition and Emotion

Lan Wang

84

Abstract | PDF

Model Based Security Policy Assessment for E-Business Environment

Wang Chu and Yanli Feng

88

Abstract | PDF

Application Research of Embedded Web Technology in Traffic Monitoring System

Rui Li and XiangQiang Xiao

94

Abstract | PDF

Rapid Detection of Heavy Metal Contents in Fruits by Laser Induced Breakdown Spectroscopy

Mingyin Yao, Muhua Liu, Lin Huang, and Jinhui Zhao

98

Abstract | PDF

A Kind of Low Complexity LDPC Decoder

Hang Jiang, Chun Xu, Qin Zhong, and Guifeng Zhong

102

Abstract | PDF

Exploring Architecture-Based Software Reliability Allocation Using a Dynamic Programming Algorithm

Hui Guan, Tingmei Wang, and Weiru Chen

106

Abstract | PDF

Performance Analysis of IP over Hierarchical WDM Ring Networks

JihHsin Ho

110

Abstract | PDF

Three-Tier Security Model for E-Business: Building Trust and Security for Internet Banking Services

Yu Lasheng and MUKWENDE Placide

114

Abstract | PDF

Entry Optimization Computation Using Simplex Algorithm Reference Trajectory Programming

Zongzhun Zheng, Yongji Wang, Fuqiang Xie, and Chuanfeng Li

120

Abstract | PDF

Gait Recognition Based on PCA and LDA

Qiong Cheng, Bo Fu, and Hui Chen

124

Abstract | PDF

Make Palm Print Matching Mobile

Fang Li, Maylor K.H. Leung, and Cheng Shao Chian

128

Abstract | PDF

Agent Based Distributed Intrusion Detection System (ABDIDS)

Yu Lasheng and MUTIMUKWE Chantal

134

Abstract | PDF

Formal Description and Analysis of Malware Detection Algorithm AMCM

Ying Zeng, Fenlin Liu, Xiangyang Luo, and Chunfang Yang

139

Abstract | PDF

On-line Modeling Method of Rolling Mill Based Least-squares Regression Analysis

Zhou Wan, Xiaodong Wang, Xin Xiong, and Jiande Wu

143

Abstract | PDF

Based on Exponential Smoothing Model of the Mill Self-learning Optimization Control

Xin Xiong, Xiaodong Wang, Zhou Wan, and Jiande Wu

147

Abstract | PDF

A Practical GPU Based KNN Algorithm

Quansheng Kuang and Lei Zhao

151

Abstract | PDF

The Empirical Study of Relationship between Enterprise Strategy and E-commerce

Yuantao Jiang and Siqin Yu

156

Abstract | PDF

The Design of Developed BP Arithmetic and Its Application in the License Plate Recognition

Meng Sun, Wenzheng Li, and Haisheng Li

162

Abstract | PDF

A Scheme of Rational Secret Sharing against Cheating

Yongquan Cai and Huili Shi

166

Abstract | PDF

Effective Bandwidth Management Using Ajax Technology for E-Learning

Gaudence Uwamahoro and Zuping Zhang

170

Abstract | PDF

E-Commerce Trust Model Based on Perceived Risk

Ruizhong Du, Xiaoxue Ma, and Zixian Wang

175

Abstract | PDF

Implementation of the Authorization Management with RBAC in the Usage Control Model

Hui Cai and Peiwu Li

179

Abstract | PDF

Research on E-Learning System and Its Supporting Products:A Review Base on Knowledge Management

Zaiwen Wang, Yang Zhao, and Yanping Liu

183

Abstract | PDF

A Part-of-speeach Tag Sequence Text Zero-watermarking

Lu He, LingYu Zhang, GuangPing Ma, DingYi Fang, and XiaoLin Gui

187

Abstract | PDF

A Symmetric Image Encryption Scheme Based on Composite Chaotic Dispersed Dynamics System

Zhenzhen Lv, Lei Zhang, and Jiansheng Guo

191

Abstract | PDF

An Overview on Game Cheating and Its Counter-measures

Xiao Lan, Yichun Zhang, and Pin Xu

195

Abstract | PDF

Type II Composed Fuzzy Measure of L-measur and Delta-measure

HsiangChuan Liu, Derbang Wu, WeiSung Chen, HsienChang Tsai, YuDu Jheng, and TianWei Sheu

201

Abstract | PDF

Research on Distributed Geo-Computing Oriented Self-organized P2P Network

Xicheng Tan and Fang Huang

205

Abstract | PDF

On Software Development for Electric Power Steering System Based On uCOS-II

Bing Zhou and Fengmei Hou

209

Abstract | PDF

A New Family of Cayley Graph Interconnection Networks Based on Wreath Product

Zhen Zhang and Xiaoming Wang

213

Abstract | PDF

Optimizing Polynomial Window Functions by Enhanced Differential Evolution

Dongli Jia, Guoxin Zheng, Yazhou Zhu, and Li Zhang

218

Abstract | PDF

Gender Recognition with Face Images Based on PARCONE Model

Changqin Huang, Wei Pan, and Shu Lin

222

Abstract | PDF