By Topic

Intelligent Systems Design and Applications, 2008. ISDA '08. Eighth International Conference on

Date 26-28 Nov. 2008

Go

Filter Results

Displaying Results 1 - 25 of 129
  • [Front cover - Vol 3]

    Publication Year: 2008 , Page(s): C1
    Request Permissions | PDF file iconPDF (886 KB)  
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2008 , Page(s): i
    Request Permissions | PDF file iconPDF (17 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2008 , Page(s): iii
    Request Permissions | PDF file iconPDF (90 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2008 , Page(s): iv
    Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2008 , Page(s): v - xiii
    Request Permissions | PDF file iconPDF (128 KB)  
    Freely Available from IEEE
  • Preface - Volume 3

    Publication Year: 2008 , Page(s): xiv
    Request Permissions | PDF file iconPDF (61 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committees - Volume 3

    Publication Year: 2008 , Page(s): xv - xx
    Request Permissions | PDF file iconPDF (85 KB)  
    Freely Available from IEEE
  • Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem

    Publication Year: 2008 , Page(s): 3 - 5
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    Nowadays, digital signature schemes are widely used in electronic commerce. Thus, various digital signature schemes are proposed to make the electronic transactions more convenient. In 2007, Chung et al. proposed an ID-based digital signature scheme on elliptic curve cryptosystem (ECC). They claimed that their scheme is secure because it is based upon the difficulty of elliptic curve discrete loga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction

    Publication Year: 2008 , Page(s): 6 - 10
    Request Permissions | Click to expandAbstract | PDF file iconPDF (333 KB) |  | HTML iconHTML  

    Mobile agent technology is going to play an important role in the future electronic commerce due to the characteristics of mobility and autonomy of the agents. Therefore, security issues should be solved before we use this new technology. However, privacy protection of customers is seldom considered. In this paper, we focus on the privacy protection of customers. Moreover, we improve our scheme mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fair-Use DRM System Based on Web Service

    Publication Year: 2008 , Page(s): 11 - 16
    Request Permissions | Click to expandAbstract | PDF file iconPDF (510 KB) |  | HTML iconHTML  

    The National Institute of Standards and Technology give the following definition: "Digital rights management is a system of information technology components and services along with corresponding law, policies and business models which strives to distribute and control intellectual property and its right." However, most existing DRM systems are designed for powerful protection. The portability of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Proxy Signature in ECDSA

    Publication Year: 2008 , Page(s): 17 - 22
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (175 KB) |  | HTML iconHTML  

    DSA and ECDSA are two standard signatures, which have been fully discussed and well accepted. However, they both lack functionality of proxy signature. On the other hand, most of the proxy signature schemes, which have been proposed prior to this date, are seldom based on standard signatures. Consequently, most proxy signature schemes have been considered infeasible due to obvious security weaknes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lock-Based Protocol for XML Metadata Knowledge Bases

    Publication Year: 2008 , Page(s): 23 - 28
    Request Permissions | Click to expandAbstract | PDF file iconPDF (166 KB) |  | HTML iconHTML  

    Enhancing transactional performance for XML metadata knowledge bases (XMKBs) is crucial, as XML is widely used to describe metadata in knowledge bases for data integration. In XMKBs, XML elements, attributes, and texts illustrate knowledge entities' types and contents, while the parent/child and ID/IDREF(s) relationships state the associations among knowledge entities. XML documents in XMKBs exhib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key-Dependent Compressed Domain Audio Hashing

    Publication Year: 2008 , Page(s): 29 - 32
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (245 KB) |  | HTML iconHTML  

    Perceptual audio hashing has been applied in audio content identification, retrieval and indexing for its accuracy and perceptual robustness. Security issue becomes important when perceptual hashing is applied in audio content authentication. A key-dependent compressed domain perceptual audio hashing algorithm for audio content authentication is proposed. A randomization scheme controlled by a ran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LMSS: A Location-Based Multimedia Service System Using Wireless Networks

    Publication Year: 2008 , Page(s): 33 - 38
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1152 KB) |  | HTML iconHTML  

    With the development of pervasive computing, location information remains a crucial component of context-aware. The ability to provide multimedia service according to users' locations would be attractive for intelligent tourism, shopping guide, etc. In this paper, we present a prototype system for location-based multimedia service as a guideline to design such application systems. Based on this pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency Spectrum Prediction Method Based on EMD and SVR

    Publication Year: 2008 , Page(s): 39 - 44
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    Support vector regression (SVR) is now a well-established method for non-stationary series forecasting, because of its good generalization ability and guaranteeing global minima. However, only using SVR hardly get satisfied accuracy for complicated frequency spectrum prediction in frequency monitor system (FMS) of high frequency radar. Empirical mode decomposition (EMD) is perfectly suitable for n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Synchronous Drive System in Gantry-Moving Milling Machine Based on Dynamic Compensation and Fuzzy Control

    Publication Year: 2008 , Page(s): 45 - 48
    Request Permissions | Click to expandAbstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    The problem of the synchronous drive for gantry-moving milling machines is researched in the paper. Two same linear motors are used as drive mechanisms of synchronous feed. The dynamic compensated method is adopted, effectively limiting the falling of the system's performance which is produced by the changing of the equivalent inertia. At the same time, puting the fuzzy PID controller in the veloc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Self-Adaptive Search Capability Particle Swarm Optimization

    Publication Year: 2008 , Page(s): 49 - 53
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (768 KB) |  | HTML iconHTML  

    A new particle swarm optimization characterized by sensation is presented to improve the limited capability of regular particle swarm optimization in exploiting history experience (iwPSO). It guides individuals to behave reasonably with the capability of self-adaptation in activities of self-cognition according to the sensation model. Considering the complexity of a swarm intelligent system at the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of Permutations Based Upon Factorial Numbers

    Publication Year: 2008 , Page(s): 57 - 61
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (266 KB) |  | HTML iconHTML  

    In this paper, a new class of factorial calculus systems is proposed. Based upon the latter, simpler algorithms and electronic systems aiming at permutations generation, are developed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving Bilevel Toll Assignment Problem by Penalty Function Algorithm

    Publication Year: 2008 , Page(s): 62 - 66
    Request Permissions | Click to expandAbstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    The paper develops an inexact penalty function method to solve a bi-level multi-commodity optimal tolls problem. After reducing the original problem to a single-level one by solving an auxiliary linear or quadratic programming problem, the said mathematical program's objective function is penalized and treated as an unconstrained minimization problem. Convergence of the proposed algorithm is also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inexact Newton Algorithm to Solve Nonlinear Complementarity Problems

    Publication Year: 2008 , Page(s): 67 - 71
    Request Permissions | Click to expandAbstract | PDF file iconPDF (131 KB) |  | HTML iconHTML  

    The paper describes a version of the inexact Newton algorithm to solve nonlinear complementarity problems (NCP). New classes of NCP are specified for which the inexact Newton method globally converges at the superlinear rate. Moreover, an inner step accuracy control technique is developed and applied to the inexact Newton method to optimize the total computational cost. Finally, two forms of imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Liberalization of Mexican Electricity Market: Various Modeling Approaches with Numerical Simulation Results

    Publication Year: 2008 , Page(s): 72 - 76
    Request Permissions | Click to expandAbstract | PDF file iconPDF (212 KB) |  | HTML iconHTML  

    In this paper, we propose and analyze numerical experiments based upon the oligopolistic model of Mexican electricity market. Presently, the Mexican electricity market is presented by state regulated monopoly, so that a competition market is not yet established. Nevertheless, around 25% of the electricity is being produced by private firms. If they get the ability to offer it to the customers dire... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Temporal Model and Query Language for FTER Databases

    Publication Year: 2008 , Page(s): 77 - 82
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    In this paper, we propose a temporal extension to an extended ERT model and extend database temporal models to handle the fuzzy numbers. The concept of lifespan for entities and relationships is incorporated in the FTER model. We specify a fuzzy temporal query and update temporal language which is an extension from the TQuel language. The concepts of fuzzy temporal expressions, fuzzy temporal sele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Support Vector Machine with Fuzzy Hyper-Plane and Its Application to Evaluate Credit Risk

    Publication Year: 2008 , Page(s): 83 - 88
    Request Permissions | Click to expandAbstract | PDF file iconPDF (161 KB)  

    Due to recent financial crises and regulatory concerns, financial intermediaries' credit risk assessment is an area of renewed interest in both the academic world and business community. Because in credit scoring areas we usually cannot label on customer as absolutely good who is sure to repay in time, or absolutely bad who will default certainly, in this paper, we apply a fuzzy membership to each... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA-Realization of Adaptive Fuzzy Controller for the Linear X-Y Table

    Publication Year: 2008 , Page(s): 89 - 94
    Request Permissions | Click to expandAbstract | PDF file iconPDF (666 KB) |  | HTML iconHTML  

    This study presents an adaptive fuzzy controller for linear X-Y table based on FPGA (Field Programmable Gate Array) technology. The linear X-Y table is driven by two PMLSMs (Permanent Magnet Linear Synchronous Motors). Firstly, a mathematic modeled for PMLSM drive is defined. Secondly, to increase the performance of the PMLSM drive system, an AFC (Adaptive Fuzzy Controller) constructed by a fuzzy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Self-Organizing Map Applying the "Survival of the Fittest Type" Learning Algorithm

    Publication Year: 2008 , Page(s): 95 - 100
    Request Permissions | Click to expandAbstract | PDF file iconPDF (158 KB) |  | HTML iconHTML  

    The self-organizing map that Kohonen has proposed maps high-dimensional vector data to low-dimensional space by phase conservation. And, it generates the feature map that visually catches the similarity among data. In addition, the reference vector where the unit in a competitive layer of SOM is achieved can interpolate an intermediate vector of the input vector data. In the pattern recognition of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.