Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ACIIDS
ACIIDS 2009
Generate Citations
Intelligent Information and Database Systems, Asian Conference on
Apr. 1 2009 to Apr. 3 2009
Dong hoi, Quang binh, Vietnam
ISBN: 978-0-7695-3580-7
Table of Contents
Papers
Keynote speakers
Full-text access may be available. Sign in or learn about subscription options.
pp. xiv
Papers
Conference organization
Freely available from IEEE.
pp. xv
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xi
list-reviewer
Freely available from IEEE.
pp. xviii-xviii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Preface
Freely available from IEEE.
pp. xii-xiii
Papers
International Program Committee
Freely available from IEEE.
pp. xvi-xvii
Papers
Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Adam Grzech
Papers
On Scheduling Problems with an Intelligent Use of the Learning Effect
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Adam Janiak
,
Radoslaw Rudek
,
Wladyslaw Janiak
Papers
A Novel Algorithm for Mining High Utility Itemsets
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-17
by
Bac Le
,
Huy Nguyen
,
Tung Anh Cao
,
Bay Vo
Papers
Argument Based Machine Learning from Examples and Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Martin Možina
,
Claudio Giuliano
,
Ivan Bratko
Papers
A Structural Sampling Technique for Better Decision Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-27
by
Hyontai Sug
Papers
Application of Transfer Regression to TCP Throughput Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
Leszek Borzemski
,
Gabriel Starczewski
Papers
Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-39
by
Katarzyna Musial
,
Krzysztof Juszczyszyn
Papers
Deriving Conceptual Schema from XML Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-45
by
Oviliani Yenty Yuliana
,
Suphamit Chittayasothorn
Papers
Mining Multilevel Association Rules on RFID Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-50
by
Younghee Kim
,
Ungmo Kim
Papers
A Novel Approach to Keyword Extraction for Contextual Advertising
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-56
by
Feng Zhang
,
Guang Qiu
,
Jiajun Bu
,
Mingcheng Qu
,
Chun Chen
Papers
Class Prediction and Pattern Discovery in Microarray Data - Artificial Intelligence and Algebraic Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Andrzej Swierniak
,
Krzysztof Fujarewicz
,
Krzysztof Simek
,
Michal Swierniak
Papers
Applying Classification Problems via a Data Mining Approach Based on a Cerebellar Model Articulation Controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
Jui-Yu Wu
,
Chi-Jie Lu
Papers
Web Page Element Classification Based on Visual Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-72
by
Radek Burget
,
Ivana Rudolfová
Papers
Select-Response Grouping Proof for RFID Tags
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-77
by
Xuefei Leng
,
Yuanhung Lien
,
Keith Mayes
,
Konstantinos Markantonakis
,
Jung-Hui Chiu
Papers
An Approach to Identity Theft Detection Using Social Network Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-81
by
Grzegorz Kolaczek
Papers
Rough Set Based Clustering of the Self Organizing Map
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-85
by
E. Mohebi
,
M. N. N. Sap
Papers
Feature Selection Using Euclidean Distance and Cosine Similarity for Intrusion Detection Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Anirut Suebsing
,
Nualsawat Hiransakolwong
Papers
Visualizing the Financial Situations and Trends via Chance Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-97
by
Tzu-Fu Chiu
,
Chao-Fu Hong
,
Yu-Ting Chiu
Papers
Pulmonary Disease Census Aiding System Based on Medical Image Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
Hai Jin
,
Aobing Sun
,
Qin Zhang
,
Ran Zheng
,
Ruhan He
Papers
Parallel Dimensionality Reduction Transformation for Time-Series Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-108
by
Hoang Chi Thanh
Papers
Two-Stage License Plate Detection Using Gentle Adaboost and SIFT-SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-114
by
Wing Teng Ho
,
Hao Wooi Lim
,
Yong Haur Tay
Papers
Rotational Invariant Wood Species Recognition through Wood Species Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Jing Yi Tou
,
Yong Haur Tay
,
Phooi Yee Lau
Papers
From Checking Integrity Constraints to Temporal Abstraction for Clinical Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-126
by
Pham Van Chung
,
Duong Tuan Anh
Papers
Comparison of Different Recommendation Methods for an e-Commerce Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-131
by
Janusz Sobecki
,
Krzysztof Piwowar
Papers
Enhanced Content-Based Filtering Using Diverse Collaborative Prediction for Movie Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-137
by
Mohammed Nazim uddin
,
Jenu Shrestha
,
Geun-Sik Jo
Papers
Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural Scene
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-143
by
Anh-Nga Lai
,
KeonHee Park
,
Manoj Kumar
,
GueeSang Lee
Papers
Natural Language Watermarking by Morpheme Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-149
by
Mi-Young Kim
Papers
Improved Letter Weighting Feature Selection on Arabic Script Language Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-154
by
Choon-Ching Ng
,
Ali Selamat
Papers
Toward a Framework for Evaluating Heterogeneous Architecture Styles
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-160
by
Shahrouz Moaven
,
Ali Kamandi
,
Jafar Habibi
,
Hamed Ahmadi
Papers
An Information Extraction Approach to English-Vietnamese Weather Bulletins Machine Translation
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-166
by
Son Bao Pham
,
Giang Binh Tran
,
Dang Duc Pham
,
Kien Chi Phung
,
Kien Trung Nguyen
Papers
A Similar Music Retrieval Scheme Based on Musical Mood Variation
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-172
by
Sanghoon Jun
,
Byeong-jun Han
,
Eenjun Hwang
Papers
A Data Management System for Distributed Real-Time Emissions and Air Pollutants Monitoring System
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-178
by
Junghee Kim
,
You Lin Jin
,
Sang Boem Lim
,
Karpjoo Jeong
,
Jeong Hun Woo
,
Eun Yi Kim
Papers
Agent-Based Generation of Personal Thesaurus
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-182
by
Grzegorz Popek
,
Radoslaw P. Katarzyniak
Papers
Representing the Meaning of Symbols in Autonomous Agents
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-189
by
Wojciech Lorkiewicz
,
Radoslaw P. Katarzyniak
Papers
Checking the Consistency between UCM and PSM Using a Graph-Based Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-195
by
Ninh-Thuan Truong
,
Thi-Mai-Thuong Tran
,
Van-Khanh To
,
Viet-Ha Nguyen
Papers
Processing Exact Results for Sliding Window Joins over Time-Sequence, Streaming Data Using a Disk Archive
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-201
by
Abhirup Chakraborty
,
Ajit Singh
Quantitative Analysis of the Error Propagation Phenomenon in Distributed Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-207
by
Dariusz Krol
,
Grzegorz Kukla
Papers
Baseline-Oriented Modeling: An MDA Approach Based on Software Product Lines for the Expert Systems Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-213
by
María Eugenia Cabello
,
Isidro Ramos
,
Abel Gómez
,
Rogelio Limón
Papers
Extensions to the Relational Paths Based Learning Approach RPBL
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-219
by
Zhiqiang Gao
,
Zhizheng Zhang
,
Zhisheng Huang
Papers
Security Policy Integration Method for Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-225
by
Trong Hieu Tran
,
Ngoc Thanh Nguyen
Papers
A Fuzzy Classifier with Directed Initialization Adaptive Learning of Norm Inducing Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-231
by
Leehter Yao
,
Kuei-Sung Weng
,
Ren-Wei Chang
Papers
Fuzzy Classification of Incomplete Data with Adaptive Volume
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-237
by
Leehter Yao
,
Kuei-Sung Weng
,
Ren-Wei Chang
Papers
Stability Analysis of Fuzzy Control for Nonlinear Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-242
by
Po-Chen Chen
,
Ken Yeh
,
Cheng-Wu Chen
,
Shu-Hao Lin
Papers
Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-248
by
Ken Yeh
,
Cheng-Wu Chen
,
Shu-Hao Lin
,
Chen-Yuan Chen
Papers
Application to GA-Based Fuzzy Control for Nonlinear Systems with Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-252
by
Po-Chen Chen
,
Ken Yeh
,
Cheng-Wu Chen
,
Chen-Yuan Chen
Papers
Exploration of Soft Computing Models for the Valuation of Residential Premises Using the KEEL Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Tadeusz Lasota
,
Ewa Pronobis
,
Bogdan Trawinski
,
Krzysztof Trawinski
Papers
Using AI Approach to Solve an Integrated Three-Echelon Supply Chain Model with Strategic Alliances
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Jonas C. P. Yu
,
Y. S. Lin
,
K. J. Wang
,
H. M. Wee
Papers
Informed Simulated Annealing for Optimizing Dorm Room Assignments
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Nguyen Thanh Trung
,
Tran Ngoc Tuan
,
Duong Tuan Anh
Papers
Knowledge Discovery Using a New Interpretable Simulated Annealing Based Fuzzy Classification System
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Hamid Mohamadia
,
Jafar Habibib
,
Shahrouz Moavena
Papers
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-282
by
K. Saleem
,
N. Fisal
,
M. S. Abdullah
,
A. B. Zulkarmwan
,
S. Hafizah
,
S. Kamilah
Papers
New Multi-parent Recombination in Genetic Algorithm for Solving Bounded Diameter Minimum Spanning Tree Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-288
by
Huynh Thi Thanh Binh
,
Nguyen Duc Nghia
Papers
A Novel Multi-objective Affinity Set Classification System: An Investigation of Delayed Diagnosis Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Chih-Hung Wu
,
Wei-Ting Li
,
Chin-Chia Hsu
,
Chi-Hua Li
,
I-Ching Fang
,
Chia-Hsiang Wu
Papers
Hybrid Genetic-Based Support Vector Regression with Feng Shui Theory for Appraising Real Estate Price
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-300
by
Chih-Hung Wu
,
Chi-Hua Li
,
I-Ching Fang
,
Chin-Chia Hsu
,
Wei-Ting Lin
,
Chia-Hsiang Wu
Papers
Learning Membership Functions in Takagi-Sugeno Fuzzy Systems by Genetic Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-306
by
Tzung-Pei Hong
,
Wei-Tee Lin
,
Chun-Hao Chen
,
Chen-Sen Ouyang
Papers
Supervising an Unsupervised Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-312
by
The Duy Bui
,
Duy Khuong Nguyen
,
Tien Dat Ngo
Papers
Implicit Camera Calibration Using MultiLayer Perceptron Type Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Dong-Min Woo
,
Dong-Chul Park
Papers
ICA-Based Signal Reconstruction Scheme with Neural Network in Time Series Forecasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-323
by
Chi-Jie Lu
,
Jui-Yu Wu
,
Tian-Shyug Lee
Papers
Black Box Modeling of Steam Distillation Essential Oil Extraction System Using NNARX Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-329
by
Mohd Hezri Fazalul Rahiman
,
Mohd Nasir Taib
,
Yusof Md Salleh
Papers
A Weighted Evolving Fuzzy Neural Network for Electricity Demand Forecasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-335
by
Pei-Chann Chang
,
Chin-Yuan Fan
,
Jih-Chang Hsieh
Papers
Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-Base
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-340
by
Ying-Chun Guo
,
Dong-Xiao Niu
Papers
Management of Wireless Local Area Networks by Artificial Neural Networks with Principal Components Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-345
by
Ping-Feng Pai
,
Ying-Chieh Chang
,
Yu-Pin Hu
Papers
Learning Radial Basis Function Model with Matching Score Quality for Person Authentication in Multimodal Biometrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Hyunsoek Choi
,
Miyoung Shin
Papers
An Agent-Based Workflow System for Assisting in IC Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Guo-Ming Fang
,
Jim-Min Lin
,
Zeng-Wei Hong
,
De-Sheng Chen
Papers
Towards Collaborative Spam Filtering Based on Collective Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Jason J. Jung
Papers
Dynamic Packet Balancing Agent in MANETs Based on AOMDV
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-367
by
Chen Ni
,
Hyeoncheol Zin
,
Bokman Lee
,
Dosam Hwang
,
Chonggun Kim
Papers
Exploring the Use of Social Communications Technologies in Tasks and Its Performance in Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-373
by
Chulmo Koo
,
Jason J. Jung
,
Daeyong Lee
Papers
RAKER: Resource-Aware Knowledge Extraction aRchitecture on Mobile Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Yue-Shan Chang
,
Pei-Chun Shih
,
Tong-Ying Juang
Papers
A Highly Robust Method for Face Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-385
by
Rerkchai Fooprateepsiri
,
Surakran Duangphasuk
How to Maximize User Satisfaction Degree in Multi-service IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-476
by
Huy Anh Nguyen
,
Tam Van Nguyen
,
Deokjai Choi
Papers
Real-Time Human Recognition by Their Walk
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-391
by
Anh Viet Nguyen
,
Eung-Joo Lee
Papers
Student Modelling Based on Ontologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-397
by
Alejandro Peña Ayala
Papers
Controllability and Minimum Energy Control Problem of Infinite Dimensional Fractional Discrete-Time Systems with Delays
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-403
by
Jerzy Klamka
[Publisher's information]
Freely available from IEEE.
pp. 486-486
Papers
Adaptive Control Scheme for a Process with Incorrect Adjustment
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-409
by
Chung-Ming Yang
,
Su-Fen Yang
Papers
Optimal Production Decisions for Deteriorating Items with Investment on Production Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-413
by
Ping-Hui Hsu
,
Hui-Ming Teng
,
Hui Ming Wee
Papers
Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
David Lai
,
Zhongwei Zhang
Papers
A New Model to Short-Term Power Load Forecasting Combining Chaotic Time Series and SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Dongxiao Niu
,
Yongli Wang
Papers
ABC Supporting QoS Unicast Routing Scheme with Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-429
by
Xing-Wei Wang
,
Hai-Quan Yang
,
Min Huang
,
Lei Guo
Papers
Comparison of Data-Searching Algorithms for a Real-Time Information-Delivery System
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-435
by
Takayuki Shizuno
,
Tsutomu Kitamura
,
Toshiya Okabe
,
Hideaki Tani
Papers
A Proposal of Relaying Data in Aeronautical Communication for Oceanic Flight Routes Employing Mobile Ad-Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-441
by
Ho Dac Tu
,
Shigeru Shimamoto
Papers
Self Actor-Actor Connectivity Restoration in Wireless Sensor and Actor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Azadeh Zamanifar
,
Mohsen Sharifi
,
Omid Kashefi
Papers
A Lightweight Application-Layer Signaling Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-452
by
Tsutomu Kitamura
,
Takayuki Shizuno
,
Toshiya Okabe
,
Hideaki Tani
Papers
CCBR: Chaining Case Based Reasoning in Context-Aware Smart Home
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-458
by
Tam Van Nguyen
,
Yi Chang Woo
,
Deokjai Choi
Papers
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-464
by
Zhongwei Zhang
,
Hong Zhou
,
Jason Gao
Papers
Using Rough Set and Support Vector Machine for Network Intrusion Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-470
by
Rung-Ching Chen
,
Kai-Fan Cheng
,
Ying-Hao Chen
,
Chia-Fen Hsieh
Papers
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-482
by
Zbigniew Golebiewski
,
Michal Koza
,
Marek Klonowski
,
Miroslaw Kutylowski
Papers
Author Index
Freely available from IEEE.
pp. 483-485
Showing 96 out of 96