Advances in Hybrid Information Technology: First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected PapersMarcin S. Szczuka As information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between di?erent sub-disciplines of IT encourages this interchange for the advancement of IT as a whole. Of particular interest is the hybrid approach or combining ideas from one discipline with those of another to achieve a result that is more signi?cant than the sum of the individual parts. Through this hybrid philosophy, a new or common principle can be discovered which has the propensity to propagate throughout this multifaceted discipline. This volume comprises the selection of extended versions of papers that were presentedintheirshortenedformatthe2006InternationalConferenceonHybrid InformationTechnology(http://www.sersc.org/ICHIT2006/).Sixty-four papers out of the 235 that were published in ICHIT 2006 electronic proceedings were deemed suitable for inclusion in this volume, in a selection that was guided by technical quality and relevance to the balance of topics in hybrid information technology. The conference re?ected a change in the thinking of scientists and practitioners,whonowtendtojointheire?ortswithinmultidisciplinaryprojects. As a consequence, the readers may observe that many papers might conceivably be classi?ed into more than one chapter, given their interdisciplinary scope. The contributions in this monograph are clustered into six chapters: Data Analysis, Modeling, and Learning (11 papers); Imaging, Speech, and Complex Data (11 papers); Applications of Arti?cial Intelligence (11 papers); Hybrid, Smart, and UbiquitousSystems(11papers);HardwareandSoftwareEngineering(9papers); as well as Networking and Telecommunications (11 papers). |
Contents
Taking Class Importance into Account | 1 |
Foundations and Perspectives | 11 |
Reduction Based Symbolic Value Partition | 20 |
Investigative Data Mining for Counterterrorism | 31 |
Data Integration Using Lazy Types | 42 |
Data Generalization Algorithm for the Extraction of Road Horizontal Alignment Design Elements Using the GPSINS Data | 51 |
Personalized ELearning Process Using Effective Assessment and Feedback | 63 |
Optimally Pricing European Options with Real Distributions | 73 |
How to Overcome Main Obstacles to Building a Virtual Telematics Center | 344 |
RealTime Travel Time Estimation Using Automatic Vehicle Identification Data in Hong Kong | 352 |
A ContextAware Elevator Scheduling System for Smart Apartment Buildings | 362 |
A MOMBased Home Automation Platform | 373 |
An Error Sharing Agent for Multimedia Collaboration Environment Running on Pervasive Networks | 385 |
A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment | 395 |
Integration of Artificial Market Simulation and Text Mining for Market Analysis | 404 |
AgentBased Intelligent Decision Support for the Home Healthcare Environment | 414 |
Applying Stated Preference Methods to Investigate Effects of Traffic Information on Route Choice | 83 |
A Study on Determining the Priorities of ITS Services Using Analytic Hierarchy and Network Processes | 93 |
An Introduction of Indicator Variables and Their Application to the Characteristics of Congested Traffic Flow at the Merge Area | 103 |
Image Resize Application of Novel Stochastic Methods of Function Recovery | 114 |
Automatic Face Analysis System Based on Face Recognition and Facial Physiognomy | 128 |
Moving Cast Shadow Elimination Algorithm Using Principal Component Analysis in Vehicle Surveillance Video | 139 |
Automatic MarkerDriven Three Dimensional Watershed Transform for Tumor Volume Measurement | 149 |
A Study on the Medical Image Transmission Service Based on IEEE 802154a | 159 |
Detecting Image Based Spam Email | 168 |
Efficient Fixed Codebook Search Method for ACELP Speech Codecs | 178 |
Conventional Beamformer Using Postfilter for Speech Enhancement | 188 |
Bandwidth Extension of a Narrowband Speech Coder for Music Delivery over IP | 198 |
A UserOriented GIS Search Service Using Ontology in LocationBased Services | 209 |
A Filtered Retrieval Technique for Structural Information | 219 |
An Analysis of a LymphomaLeukaemia Dataset Using Rough Sets and Neural Networks | 229 |
A Frequency Adaptive Packet Wavelet Coder for Still Images Using CNN | 240 |
Reduced RBF Centers Based Multiuser Detection in DSCDMA Systems | 249 |
Approximate Life Cycle Assessment of Product Concepts Using a Hybrid Genetic Algorithm and Neural Network Approach | 258 |
A Solution for Bilevel Network Design Problem Through Nash Genetic Algorithm | 269 |
An Alternative Measure of Public Transport Accessibility Based on Space Syntax | 281 |
Adaptive Routing Algorithm Using Evolution Program for Multiple Shortest Paths in DRGS | 292 |
Particle Swarm Optimization for a MultiUCAV Cooperative Task Scheduling | 302 |
Expert System Using Fuzzy Petri Nets in Computer Forensics | 312 |
MMORPG Map Evaluation Using Pedestrian Agents | 323 |
Focusing on Massively Multiplayer Online RolePlaying Game | 333 |
AwareRium | 425 |
The Situation Dependent Application Areas of EPC Sensor Network in uHealthcare | 437 |
Ubiquitous Healthcare System Using Context Information Based on the DOGF | 447 |
Load Balancing Using Dynamic Replication Scheme for the Distributed Object Group | 458 |
Design and Implementation of a Performance Analysis and Visualization Toolkit for Cluster Environments | 469 |
Enterprise Application Framework for Constructing Secure RFID Application | 480 |
A GDBBased RealTime Tracing Tool for Remote Debugging of SoC Programs | 490 |
A Novel Buffer Cache Scheme Using Java Card Object with High Locality for Efficient Java Card Applications | 500 |
Design and Implementation of the Decompiler for Virtual Machine Code of the C++ Compiler in the Ubiquitous Game Platform | 511 |
Mobile Pharmacology | 522 |
Wireless Control System for Pet Dogs in a Residential Environment | 534 |
Intelligent Embedded RealTime Software Architecture for Dynamic Skill Selection and Identification in Multishaped Robots | 546 |
The Accurate Performance Evaluation of Time Hopping UWB Systems with Pulse Based Polarity | 557 |
Improvement of Adaptive Modulation System with Optimal Turbo Coded VBLAST Technique | 566 |
Header Compression of RTPUDPIP Packets for Real Time HighSpeed IP Networks | 576 |
Repetition Coding Aided TimeDomain Cancellation for InterCarrier Interference Reduction in OFDM Systems | 586 |
On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems | 596 |
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation | 607 |
Design of WLAN Secure System Against Weaknesses of the IEEE 8021x | 617 |
A Sophisticated Base Station Centralized Simple Clustering Protocol for Sensor Networks | 628 |
A Routing Protocol for Wireless Sensor Networks | 638 |
A Cross Layer Approach | 647 |
Analysis of the Characteristics of Rain Attenuation in the 1225GHz Band for Wireless Networking | 659 |
669 | |
Other editions - View all
Common terms and phrases
Adaptive agent algorithm analysis application architecture authentication beamformer Berlin Heidelberg 2007 classification client clothoid cluster head nodes coder communication component compression computer forensics computing context data mining decision delay detection developed devices distribution dynamic EEPROM efficient elevator scheduling system environment evaluation Figure filter function gameplay genetic algorithm healthcare Home Automation ICHIT IEEE implemented input Java Card keyword Korea label paths layer LNAI M.S. Szczuka method MHAP MMORPG mobile module neural network object operation optimal packet paper parameters performance problem proposed protocol provides pulse replacement reader real-time RFID RFID tag robot rough sets routers routing sensor network sensor nodes Server shows signal simulation space syntax Springer-Verlag Berlin Heidelberg structure Table technique tion traffic transmission Turbo Coded UCAV V-BLAST wireless