9th Joint International Conference on Information Sciences (JCIS-06)

+ Advanced search
342 articles

A Study on Imputing Censored Observations for Exponential Distribution Based on Random Censoring

Kuo-Ching Chiou
Censoring models are frequently employed in reliability analysis to reduce experimental time. There are three censoring model: type-I, type-II and random censoring. In this study, we focus on the right-random censoring model. In the previous literature, an imputation of the censored observation is considered...

String Filtering of a Large String Collection on Mobile Devices using a Neural Network

Heng Ma, Chia-Cheng Liu
String matching of a large string collection on mobile devices has been a difficult problem because of the memory space and computing speed constraints. We propose a method to efficiently determine whether a query string exists in the large string collection. The proposed method, based on a string encoder...

Low-Cost RFID Identification Variation

Yao-Yuan Liu, Koong Lin, Tzu-Chang Yeh, Chad Lin
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because...

A Simple Approach to Stereo Matching and Its Application in Developing a Travel Aid for the Blind

Mu-Chun Su, Yi-Zeng Hsieh, Yu-Xiang Zhao
In this paper, we present an idea of using stereo matching to develop a travel aid for the blind. In this approach, images are segmented into several non-overlapping homogeneous regions using a color segmentation algorithm. For each homogeneous region, a rectangular window, which is large enough to cover...

The Logic of Uncertainty with Irrational Agents

Boris Kovalerchuk, Germano Resconi
Modern axiomatic uncertainty theories (fuzzy logic, probability theory and others) provide a calculus for manipulating with probabilities, membership functions, and degrees of belief when the initial values such as probabilities of elementary events are already given. These theories do not include a...

A Hybrid System with Petri Net and Fuzzy Theory

Rong-Hou Wu, Yang-Han Lee, Yih-Guang Jan, Hsien-Wei Tseng, Ming-Hsueh Chuang, Jheng-Yao Lin
In this paper, we issue a hybrid system, which is integrated with the fuzzy system and Petri net models. We exploit the characteristics, imprecise or ambiguous information, of fuzzy theory to map the algorithm of crisp inputs and outputs, furthermore, model problems, product a nonlinear function, and...

Urban Traffic Intersection Incident Prediction Using AI Algorithm

Yaguang Kong, Huakui Chen
Automatic incident detection and characterization is urgently require in the development of advanced technologies used for reducing non-recurrent traffic congestion on urban traffic. This paper presents a new method using data mining to identify automatically freeway incidents. As a component of a real-time...

90-nm Wideband Optical Amplifier Including an Semiconductor Optical Amplifier and a DCF-based Raman Fiber Amplifier with Gain Clamping and Dispersion Compensation

Chia-Hsiung Chang, Hermann Lin
We have experimentally demonstrated the gain-clamped wideband optical amplifier using a DCF-based Raman amplifier and an semiconductor optical amplifier for 90-nm wide bandwidth amplification with good gain flatness (of 3 dB) as well as dispersion compensation of 10Gb/s DWDM signals over 100-km SMF link....

A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks

Chien Lung Wang, Tzung-Pei Hong, Gwoboa Horng, Wen-Hung Wang
In this paper, we propose a distributed, reliable and low-power-consumed key-renewal scheme for wireless sensor networks. The proposed scheme is divided into parts: the server part and the sensor-node part. The server will produce an appropriate key-generation function (KGF) for key renewal on sensor...

Difficulty of cooperation in iterated multi-Prisoner's Dilemma situation-Experimental evidence-

Kazuhito Ogawa, Tetsuya Kawamura, Tatsuya Kikutani, Sobei H. Oda
Using the laboratory experiment and simple multi–Prisoner’s dilemma model, this paper explores the effect of the change in the number of contacts and in the contact (payoff) structure, and then the characteristics of the strategy that leads players to reach mutual cooperation. When the number of contacts...

The Prediction for Index Futures Returns and the Relational Analysis of Spillover Effect

Ling-ming Kung, Shang-Wu Yu
This paper adopts the grey prediction methods, to investigate the return and volatility of major index futures among American and Eurasian markets. The grey relational theory and GM(1,N) model are further used to observe the volatility spillover effect and find the main influence factor in the volatility...

The Distinctiveness of Individuals: Using Knowledge Structures To Represent Research Focuses; The Field of Stem Cell Research

Jonathan Feinstein
Building on the framework presented in The Nature of Creative Development (Stanford U. Press, 2006), I describe an approach for representing researchers' focuses of research activity in a field; the approach is based on use of a knowledge representation framework. Application is made to the field of...

Emergence of Overconfidence Investors in Financial Markets

Hiroshi Takahashi, Takao Terano
This research utilizes the Agent-Based Model to clarify microscopic and macroscopic links between investor behavior and price fluctuations in the financial market. This analysis places focus on the role that investors’ overconfidence plays in the financial market. As a result of this analysis, it has...

Image Up-Sampling Using Discrete Wavelet Transform

Ping-Sing Tsai, Tinku Acharya
Image up-sampling is found to be a very effective technique useful in today’s digital image processing applications or rendering devices. In image up-sampling, an image is enhanced from a lower resolution to a higher resolution with the degree of enhancement depending upon application requirements. It...

Axiomatization of fuzzy attribute logic over complete residuated lattices

Radim Belohlavek, Vilem Vychodil
The paper deals with fuzzy attribute logic (FAL) and shows its completeness over all complete residuated lattices. FAL is a calculus for reasoning with if-then rules describing particular attribute dependencies in object-attribute data. Completeness is proved in two versions: classical-style completeness...

Pavelka-style fuzzy logic for attribute implications

Radim Belohlavek, Vilem Vychodil
We present Pavelka-style fuzzy logic for reasoning about attribute implications, i.e. formulas $A\Rightarrow B$. Fuzzy attribute implications allow for two different interpretations, namely, in data tables with graded (fuzzy) attributes and in data tables over domains with similarity relations. The axioms...

On Tensions and Causes for School Dropouts åÁV An Induced Linked Fuzzy Relational Mapping (ILFRM) Analysis

Joseph Arul, Nathan Pathi, Thirusangu K, Mary John
The teachers and the school authorities often call the parents in connection with a child’s ‘performance’ in school. The children have to face the wrath of both the parents and the teachers. This tension slowly builds up and the child decides to quit the school forever. This paper analyzes the causes...

Locating Matching Rules by Mining Software Change Log

Ming-Shi Wang, Jung-te Weng
A software system maintenance activity is typically performed under an environment of lacking knowledge about how to process it. This scarcity of knowledge may be caused by various factors, such as the large size and complexity of the systems, high staff turnover, poor documentation and long-term system...

Excess Noise Factor of a-Si:H/a-SiC:H Separated Absorption and Multiplication Region Superlattice-like Avalanche Photodiodes (SAM-SAPDs)

Neng-Fu Shih, Huei -Ching Huang, Chung-Yuan Kung, Chun-Chih Chiu, Hong Jyh-Wong
In this paper, an a-Si:H/a-SiC:H separated absorption and multiplication region superlattice avalanche photodiode (SAM-SAPD) is fabricated successfully by using combined effect of band edge discontinuity and build-in potential in p-n junction. We discuss the relationships among excess noise factor (Fe),...

Fabrication and characterization of two-dimensional photonic crystal using holographic lithography technology

Kuo-Chang Lo, Mei-Li Hsieh, Yi-Sheng Lan
We propose and demonstrate a holographic system using three beams to generate periodic patterns for fabricating photonic crystals. By properly adjusting the incident angle and intensity of three laser beams, the period and structure of interference pattern can be modified. Computer simulation results...

Analysis of dispersion properties of elliptic air hole photonic crystal fiber

Yuh-Sien Sun, Chau Yuan-Fong, Tsai Din-Ping
The two dimensional with a triangular-lattice cross sectional pattern of elliptic air holes photonic crystal fiber (PCF) is investigated in detail by use of plan wave expansion (PWE) method. Using PWE method, the dependence of dispersion on structure parameters is calculated. We compared the dispersion...

A Fuzzy Multiobjective Programming Approach for Vendor Selection in Iron & Steel Enterprise

Yuan Chen, Zhi-Ping Fan, Jun Lv, Jian-Yu Wang
The purpose of this paper is to study vendor selection problem with multi-vendor and multi-item in iron & steel industry. Firstly, the native fuzziness, derived from some uncertainty information, of some parameters in decision-making objectives is analyzed. After that, a fuzzy multiobjective programming...

Hidden structure visualization adaptive to human's prior understanding

Yoshiharu Maeno, Ohsawa Yukio
This paper addresses hidden structure visualization adaptive to human’s prior understanding. The degree of understanding is parameterized by temperature used in the human-interactive annealing process along with stable deterministic crystallization algorithm. This adaptive nature is demonstrated with...

A Quick Self-Adaptive Background Updating Algorithm Based on Moving Region

Bo Qin, Chuangde Zhang, Zhenghua Fang, Wei Li
Background subtraction is a common way of real-time motion detection. Owing to lacking the right approach to update the background, it was confined in certain aspects. In this paper, we will present a quick self-adaptive background updating algorithm based on moving region, and use label method to de-noise...

SBT-QL: A Stock Time Series Query Language based on Specialized Binary Tree Representation

Tak-chung Fu, Fu-lai Chung, Robert Luk, Man-yee Au, Chak-man Ng
Stock time series query is one of the fundamental components in technical analysis. Technical analysts would like to query either a whole time series or a segment of a time series in different resolutions for long-term or short-term investigations. Moreover, unnecessary data points should be filtered...

Snapshot Lifecycle Management

Ching-Hung Lin, Wey Shou-Jen, Tsai Tsung-Lin, Wang Jun-Yao, Hwang Wen-Shyang
This paper sets forth “Snapshot Lifecycle Management”, an innovative way to manage snapshot data rather than using Information Lifecycle Management. There are two major problems occurs in snapshot management by ILM: “inappropriate migration” and “redundancy”. SLM manages snapshot data elaborately according...

Comparison between Crisp and Fuzzy Stock-Screening Models

Chieh-Yow ChiangLin
Academic researchers and practitioners have proposed various stock-screening models that always contain more than one stock selecting rule and corresponding parameters. However, the criteria in traditional screening models employ crisp norms, which are unreasonable in reality. This paper proposes the...

An Ontology-based Methodology for Communicating Negotiation Agents over Internet

Azucena Montes, Maricela Bravo, José Velázquez
In this article we describe a new methodology to facilitate communications between heterogeneous negotiation agents; in particular we present an ontology solution which allows the publication and sharing of communication primitives over Internet. Traditional negotiation systems exchange messages based...

Building a Concept Hierarchy by Hierarchical Clustering with Join/Merge Decision

Huang-Cheng Kuo, Tsung-Han Tsai, Huang Jen-Peng
Concept hierarchies are important for generalization in many data mining applications. We propose a method to automatically build a concept hierarchy from a provided distance matrix. The method is a modification of traditional agglomerative hierarchical clustering algorithm. When two closest clusters...

A Knowledge Discovery Approach to Supporting Crime Prevention

Sheng-Tun Li, Fu-Ching Tsai, Shu-Ching Kuo, Yi-Chung Cheng
The main objective of this study is developing a linguistic cluster model in order to meet the public security index requirement and extract crime rule in time series. In contrast to the current studies in crime theory which mostly rely on traditional behavior science, we turned to a hybrid approach...

Integrating Competition Strategy to QFD for Technical Design

Yai Hsiung, Pao-Yuan Chang
Quality Function Deployment (QFD) is an approach to translate customer requirements into technical requirements for a product or service. The traditional QFD provides a fundamental analysis, but it is still inconvenient when decision making in technical design should address business objection. The competition...

A Fuzzy Rule-based Bargaining Model for Online Group Purchasing

Ping-Wen Chen, Yung-Ming Li, Ting-Kai Hwang
Online group purchasing or collective purchasing is the activity in which people who desire to buy the same merchandises join together so that they can negotiate with sellers for a better price through Internet. This paper utilizes fuzzy logic to develop a bargaining model for such activities. The model...

Applying fuzzy multi-criteria decision method to evaluate key capabilities of Taiwan motion picture companies

Yaw-Chu Chen, Kuei-Lun Chang
The purpose of this paper is to provide an algorithm for the motion picture companies to evaluate the key capabilities from firm viewpoint under fuzzy environment. The fundamental concepts we have adopted include the eigenvector method, fuzzy Delphi method, fuzzy set theory, and multi-criteria decision...

Identifying Steady State Relationships in a Multidirectional System: A Multivariate Cointegration Analysis

Chandika Gunasinghe
This paper aims at identifying steady state relations (cointegrated relationships) in a system that contains multidirectional nexuses for a hypothetical economic structure. The study discusses various econometric tools needed to identify long run cointegration vectors and employs these tools to derive...

Using Data Mining to Study Upstream and Downstream Causal Relationship in Stock Market

Don-Lin Yang, Y.L. Hsieh, Jungpin Wu
To understand the causal relationship of stock market is always a top priority for investors. Most investors use some fundamental knowledge and basic analysis techniques to analyze or predict the trends. However, there are always some other factors beyond our control or unexpected events that might affect...

High-Efficient Architectures for 2-D Lifting-Based Forward and Inverse Discrete Wavelet Transform

Tze-Yun Sung
In this paper, high-efficient lifting-based architectures for the 5/3 discrete wavelet transform (DWT) are proposed. The proposed parallel and pipelined architecture consists of a horizontal filter (HF) and a vertical filter (VF). The system delays of the proposed architectures are reduced. Filter coefficients...

Discovering Hidden Blue Ocean Strategy with KeyGraph Machine

Fang-Cheng Hsu, Han_Yuan Lee, Tzong-Heng Chi
Researchers usually focused on using unstructured documents as input documents of KeyGraph. But the unstructured documents might results in unclear keywords and meaningless keywords. Although traditional document preprocessing could dismiss some of the problems, generating complex and unreadable KeyGraph...

A Novel Tour Construction Heuristic for Traveling Salesman Problem Using LFF Principle

Sheqin Dong, Fan Guo, Jun Yuan, Rensheng Wang, Xianlong Hong
Less Flexibility First(LFF) principle is inspired and developed by enhancing some rule-of-thumb guidelines resulting from the generation-long work experience of human professionals in ancient days. In this paper, we generalize this principle to the classical Traveling Salesman Problem and propose a tour...

Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys

Yafen Chang, Chin-Chen Chang
In 2004, Abe et al. proposed a novel threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme. They claimed that their scheme allows the base signature schemes to be based on sigma-protocols, including Schnorr’s signature scheme,...

An Effective Prefetching Technique for Location-Based Services with PPM

Chih-Cheng Lien, Chien-Chih Wang
Location-Based Services (LBS) are available on hand-held devices and become a field of active research since the recent advances in wireless communication and mobile environment. Due to the constraints of bandwidth of network, space of storage and energy of battery in the mobile client, slow information...

Oncogenes and Subtypes of Diffuse Large B-Cell Lymphoma Discoveries from Microarray Database

Ching-Hao Lai, Jun-Dong Chang, Meng-Hsiun Tsai
This paper presents an effective analysis scheme for Diffuse Large B-Cell Lymphoma (DLBCL) microarray datasets. Analysis of variable (ANOVA) is a well known statistics tools. It is useful to get the oncogenes to distinguish the normal and cancerous tissues. But, it can not further obtain the sub-types...

Reversible Palette Image Steganography Based on De-clustering and Predictive Coding

Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang
Steganographic technology acts as the important role which defends information security in the network. The information could be hidden in multimedia object. Even if transmitted in an unsafe channel, the information is invisible by human visual system to maintain security. This paper presents a reversible...

Fuzzy Collaborative Filtering for Web Page Prediction

Chein-Shung Hwang, Yu-Pin Chen
Web page prediction is a popular personalized service on the Web and has attracted much research attention. One of the most successful and widely used approaches is collaborative filtering. Traditional collaborative filtering requires explicit user participation for providing his/her interest to the...

Unconditionally secure cryptosystem based on quantum cryptography

Yu Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer Shyong Chen
Most cryptographic works these days have employed mathematical concepts to design cryptosystems and algorithms. Therefore, mathematical concepts have become critical in the designing of cryptosystems, and are generally used to analyze cryptosystems and protocols, supporting the allegation that the intended...

A study of some easily parallellizable automata

Sylvie Hamel
A vector algorithm is an algorithm that applies a bounded number of vector operations to an input vector, regardless of the length of the input. The allowable operations are usually restricted to bit-wise operations available in processors, including shifts and binary addition with carry. This paper...

Computational Experiments on Algorithms for Haplotype Inference Problems by Pure Parsimony

I-Lin Wang, Hui-E Yang
To analyze the function of DNA, researchers have to obtain each haplotype, the genetic constitution of an individual chromosome, of an individual for analysis. Due to the significant efforts required in collecting haplotypes, genotypes, which are the descriptions of one conflated pair of haplotypes,...

Probabilistic Financial Decision Support Framework

Chiu-Che Tseng
The challenge of the business decision support domain is that a large amount of diverse information can be potentially relevant to a decision, and that, frequently, the decisions have to be made in a timely manner. This presents the potential for better decision support, but poses the challenge of building...

Service Oriented Federated Identity System Framework

Min Wu, Xiaoqiang Liu, Yongsheng Ding, Jiaxun Chen
The rapid evolution of network and distributed computing, such as Service Oriented Architecture (SOA), is increasing the challenge of securely controlling access to enterprise IT resources. As gaining access to distributed resources becomes increasingly vital, the ability to make sure that the right...