2005 Subject Index
文字方塊: 2005 Subject Index
JISEJISEJISE

  

 

 

 

 

 

ALGORITHMS

A Parallel Particle Swarm Optimization Algorithm with Communication Strategies

Jui-Fang Chang, Shu-Chuan Chu, John F. Roddick and Jeng-Shyang Pan

………………………………………………..………………….… Vol. 21, No. 4, pp. 819-828

An Efficient k-Means Clustering Algorithm using Simple Partitioning

Ming-Chuan Hung, Jungpin Wu, Jin-Hua Chang and Don-Lin Yang...Vol. 21, No. 6, pp. 1157-1177

Hybrid BPNN-Weighted Grey-CLSP Forecasting

Bao Rong Chang………………………………………………….…Vol. 21, No. 1, pp. 209-221

Some Optimal Parallel Algorithms on Interval and Circular-arc Graphs

F. R. Hsu, M. K. Shan, H. S. Chao and R. C. T. Lee………..….. .......Vol. 21, No. 3, pp. 627-642

 

ARTIFICIAL INTELLIGENCE

Economic Dispatch using a Genetic Algorithm: Application to Western Algeria’s

Electrical Power Network

R. Ouiddir, M. Rahli and L. Abdelhakem-Koridak……………….....… Vol. 21, No. 3, pp. 659-668

Measuring Fuzziness in Rough Sets

Hsuan-Shih Lee…………………………………………………….. Vol. 21, No. 6, pp. 1227-1245

 

CHINESE INFORMATION PROCESSING

A Non-Training Approach to Generating High Semantic Titles for Chinese Documents

Gai-Tai Huang and Hsiu-Hsen Yao………….…………………….….Vol. 21, No. 1, pp. 223-233

 

COMPUTER AND EDUCATION

Comparison of the Multi Layer Perceptron and the Nearest Neighbor Classifier for

Handwritten Numeral Recognition

K. Roy, C. Chaudhuri, M. Kundu and D. K. Basu……………………Vol. 21, No. 6, pp. 1247-1259

Nested State-Transition Graph Data Sequencing Model with Hierarchical Taxonomy

through Radix Coding

Jia-Sheng Heh, Shein-Yun Cheng and Chang-Kai Hsu………….….Vol. 21, No. 3, pp. 579-605

 

COMPUTER APPLICATIONS

An Efficient Content Based Image Retrieval System using the Mesh-of-Trees Architecture

Wei-Min Jeng and Jen-Hao Hsiao…..……….…………………….… Vol. 21, No. 4, pp. 797-808

 

COMPUTER GRAPHICS AND VIRTUAL REALITY

A Simple and Efficient Triangle Strip Filtering Algorithm

Byung-Uck Kim, Kyoung-Wha Kim, Woo-Chan Park, Sung-Bong Yang and Tack-Dong Han

………………………………………………………………….. .... Vol. 21, No. 6, pp. 1277-1288

 

COMPUTER-COMMUNICATION NETWORK

A Novel Approach to the Fixed Channel Assignment Problem

Rei-Heng Cheng, Chang Wu Yu and Tung-Kuang Wu…………......  Vol. 21, No. 1, pp. 39-58

A Novel GPS-Based Quorum Hybrid Routing Algorithm (GPS-QHRA) for Cellular-Based

Ad Hoc Wireless Networks

I-Shyan Hwang, Chih-Kang Chien and Chiung-Ying Wang……….... Vol. 21, No. 1, pp. 1-21

A Prioritized Resource Reservation Scheme with QoS-Violation Assessment

Rong-Tsung Sheu and Jean-Lien………………………..………..….Vol. 21, No. 1, pp. 23-37

Algorithms for Static and Dynamic Group Multicast Routing Under Bandwidth Constraints

Kun-Cheng Tsai and Chyouhwa Chen………………..…………..... Vol. 21, No. 3, pp. 495-527

Blueline: A Distributed Bluetooth Scatternet Formation and Routing Algorithm

Ruay-Shiung Chang and Ming-Te Chou……………………..….......Vol. 21, No. 3, pp. 479-494

Combining Precomputation and On-Demand Routing for Multicast QoS Routing

Chih-Jen Tseng and Chyouhwa Chen………………………........... Vol. 21, No. 1, pp. 209-221

Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network

Su-Chiu Yang and Li-Ming Tseng………………………...……....... Vol. 21, No. 3, pp. 571-578

Executable Test Sequence for the Protocol Data Portion Based on Two Criteria

Wen-Huei Chen…………………………………………………….. Vol. 21, No. 3, pp. 529-545

Improving 802.11 Wireless TCP Performance with Adaptive Reed-Solomon Codes:

An Experimental Study

Jung-Shian Li and Ming-Wang Guo………………………………… Vol. 21, No. 6, pp. 1201-1211

On Preventing Type Flaw Attacks on Security Protocols with a Simplified Tagging Scheme

Yafen Li, Wuu Yang and Ching-Wei Huang……………….……….. Vol. 21, No. 1, pp. 59-84

 

DATABASE MANAGEMENT

Efficient Update Method for Indexing Locations of Moving Objects

Dongseop Kwon, Sangjun Lee and Sukho Lee……………….. …...Vol. 21, No. 3, pp. 643-658

Fast Discovery of Sequential Patterns through Memory Indexing and Database Partitioning

Ming-Yen Lin and Suh-Yin Lee……………………………………... Vol. 21, No. 1, pp. 109-128

XML View Materialization with Deferred Incremental Refresh: the Case of a Restricted

Class of Views

Dae Hyun Hwang and Hyunchul Kang………………………………Vol. 21, No. 6, pp. 1083-1119

 

DISTRIBUTED AND PARALLEL COMPUTING

A Lazy Update Strategy for Minimizing Signaling Cost using the Forwarding Pointer in Mobile IP

Myung-Kyu Yi, Ui-Sung Song and Chong-Sun Hwang….…..……... Vol. 21, No. 2, pp. 259-286

An Integrated Approach to Efficiently Providing Fault Tolerance for Mobile Multicast

Jenn-Wei Lin……………………………………………………….. Vol. 21, No. 1, pp. 153-179

GAA: A New Optimization Technique for Task Matching and Scheduling in HCSs

Po-Jen Chuang, Chia-Hsin Wei and Yu-Shian Chiu…………………Vol. 21, No. 2, pp. 287-308

More Properties of Communication-Induced Checkpointing Protocols with Rollback- 

Dependency Trackability

Jichiang Tsai, Sy-Yen Kuo and Yi-Min Wang……………….………Vol. 21, No. 2, pp. 239-257

Parallel Volume Rendering with Sparse Data Structures

Jenshiuh Liu………………………………………………………... Vol. 21, No. 2, pp. 327-339

Scheduling Precedence Constrained Parallel Tasks on Multiprocessors using the

Harmonic System Partitioning Scheme

Keqin Li………………………………………………………..….... Vol. 21, No. 2, pp. 309-326

 

E-LEARNING

A Chinese Interactive Feedback System for an e-Learning Website

Jui-Fa Chen, Wei-Chuan Lin, Chih-Yu Jian and Ching-Chung Hung  ..Vol. 21, No. 5, pp. 929-957

A Content Management Scheme in SCORM Compliant Learning Object Repository

Jun-Ming Su, Shian-Shyong Tseng, Ching-Yao Wang, Ying-Chieh Lei, Yu-Chang Sung

and Wen-Nung Tsai….…………………..………………………....  Vol. 21, No. 5, pp. 1053-1075

A Service-Oriented Approach for the Pervasive Learning Grid

Ching-Jung Liao, Fang-Chuan Ou Yang and Kevin Chihcheng Hsu.. Vol. 21, No. 5, pp. 959-971

An e-Learning Platform Based on Grid Architecture

Chao-Tung Yang and Hsin-Chuan Ho………..……………..……...  Vol. 21, No. 5, pp. 911-928

An Enhanced LTSA Model Providing Contextual Knowledge for Intelligent e-Learning Systems

Hyunjong Choe and Taeyoung Kim…………………………..….....  Vol. 21, No. 5, pp. 849-858

An Intelligent Semantic Agent for e-Learning Message Communication

Ying-Hong Wang, Wen-Nan Wang and Chih-Hao Lin……………....Vol. 21, No. 5, pp. 1031-1051

An Ontological Model for SCORM-Compliant Authoring Tools

Jin-Tan David Yang, Wen-Chih Chen, Chun-Yen Tsai and Mei-Sheng Chao

……………………………………………………………………... Vol. 21, No. 5, pp. 891-909

Assessment Based on Linkage Patterns in Concept Maps

Chen-Chung Liu, Ping-Hsing Don and Chun-Ming Tsai…….………. Vol. 21, No. 5, pp. 873-890

Collaborative Note Taking using PDAs

Gurminder Singh, Laurent Denoue and Arijit Das…………………... Vol. 21, No. 5, pp. 835-848

Courseware Development using Influence Diagrams Supporting e-Learning Specifications

Nigel H. Lin, Wen-Chih Chang, Timothy K. Shih and Huan-Chao Keh

……………………………………………………………………………..Vol. 21, No. 5, pp. 985-1005

Remote Access to Landfill Slope Design Application

Yih-Ping Huang……………………..……………………………..... Vol. 21, No. 5, pp. 859-872

The Analysis of Learning Records and Learning Effect in Blended e-Learning

Downming Yeh, Chun-Hsiung Lee and Pei-Chen Sun……………... Vol. 21, No. 5, pp. 973-984

The Design and Implementation of a Diagnostic Test System Based on the Enhanced S-P Model

Deng-Jyi Chen, Ah-Fur Lai and I-Chang Liu………………………... Vol. 21, No. 5, pp. 1007-1030

 

IMAGE PROCESSING AND COMPUTER VISION

A Fast Method for Textural Analysis of DCT-Based Image

Yu-Len Huang…………………………………………………........ Vol. 21, No. 1, pp. 181-194

Landmark-Oriented Visual navigation of an Unmanned Vehicle along Corridors

Chin-Shyurng Fahn and Rwei-Liang Chen………………….……....Vol. 21, No. 2, pp. 379-413

Real-Time Vehicle Tracking on a Highway

Wei-Lieh-Hsu, Hsiao-Rong Tyan, Yu-Ming Liang, Bor-Shenn Jeng and Kuo-Chin Fan

………..……………………………….………………………….…Vol. 21, No. 4, pp. 733-752

 

 

INFORMATION SYSTEM AND APPLICATIONS

Data Scheduling in Multiple Channel/Multiple Receiver Environments for Processing Data

Requests with Timing Constraints

Gualing Lee, Yi-Ning Pan and Arbee L. P. Chen………………….... Vol. 21, No. 6, pp. 1179-1199

 

LOGIC DESIGN

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions

Shih-Hsu Huang and Jian-Yuan Lai……….………………………... Vol. 21, No. 3, pp. 607-626

 

MATHEMATICS OF COMPUTING

A Fast Base-K Logarithm with Redundant Representation

Che Wun Chiou and Ted C. Yang………………………………….. Vol. 21, No. 2, pp. 429-437

 

NEURAL NETWORKS AND FUZZY SETS

Fuzzy Inventory with Backorder Defuzzification by Signed Distance Method

Jershan Chiang, Jing-Shing Yao and Huey-Ming Lee………….……Vol. 21, No. 4, pp. 673-694

Geometrical Perspective on Learning Behavior

Cheng-Yuan Liou, Jau-Chi Huang and Yen-Ting Kuo………..…….  Vol. 21, No. 4, pp. 721-732

Machine Learning with Automatic Feature Selection for Multi-class Protein Fold Classification

Cheng-Yuan Liou, Jau-Chi Huang and Yen-Ting Kuo………….……Vol. 21, No. 4, pp. 711-720

The Design of an SCFNN Based Nonlinear Channel Equalizer

Wan-De Weng, Rui-Chang Lin and Chung-Ta Hsueh…………….…Vol. 21, No. 4, pp. 695-709

The Optimal Solution of the Transportation Problem with Fuzzy Demand and Fuzzy Product

Jershan Chiang……………………………………………………...Vol. 21, No. 2, pp. 439-451

 

PATTERN RECOGNITION

A Face and Speech Biometric Verification System using a Simple Bayesian Structure

Andrew B. J. Teoh, S. A. Samad and A. Hussain……………………Vol. 21, No. 6, pp. 1121-1137

A New Classification Approach using Discriminant Functions

Askin Demirkol, Zafer Demir and Erol Emre……………………..…....Vol. 21, No. 4, pp. 819-828

Hand Written Character Feature Extraction using Non-Linear Feedforward Neural Networks

A. Jalil, I. M. Qureshi, T. A. Cheema and A. Naveed……..……. ........Vol. 21, No. 2, pp. 453-473

 

SECURITY AND PROTECTION

A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks

Kyung-Hyune Rhee, Young-Ho Park and Gene Tsudik………….......Vol. 21, No. 2, pp. 415-428

Designing Authentication Protocols for Third Generation Mobile Communication Systems

Shu-Min Cheng, ShiuhPyng Shieh, Wen-Her Yang, Fu-Yuan Lee and Jia-Her Yang

……………………………………………………………………... Vol. 21, No. 2, pp. 361-378

MAC Based Lightweight Protocols for Strong Authentication and Key Exchange

Denis Trcek………….………………………………………………Vol. 21, No. 4, pp. 753-765

Watermarking MPEG-4 2D Mesh Animation with Time-Series Analysis

Shih-Hsuan Yang, Chin-Kuen Liang and Chin-Yun Hsieh………….. Vol. 21, No. 2, pp. 341-359

 

 

SIGNAL AND SPEECH PROCESSING

Contextual Hidden Markov Tree Model for Signal Denoising

Ming-Yu Shih and Din-Chang Tseng………………………….. ........Vol. 21, No. 6, pp. 1261-1275

 

SIMULATION AND MODELING

Fuzzy Hysteresis Control and Parameter Optimization of a Shunt Active Power Filter

B. Mazari and F. Mekri………………………………………….. ....  Vol. 21, No. 6, pp. 1139-1156

 

SOFTWARE ENGINEERING

A Petri-Net Based Modeling Approach to Concurrent Software Engineering Tasks

Jau-Ji Shen, S. Wesley Changchien and Tao-Yuan Lin…..……….. Vol. 21, No. 4, pp. 767-795

Software Testing Methodology with the Control Flow Analysis

Wen-Chang Pai, Chi-Ming Chung, Ching-Tang Hsieh, Chun-Chia Wang and Ying-Hong Wang

….………………………………………………………………….. Vol. 21, No. 6, pp. 1213-1226

 

THEORY OF COMPUTATION

Dynamic Reconfiguration of Complete Binary Trees in Faulty Hypercubes

Chui-Cheng Chen…………………………………………..............Vol. 21, No. 1, pp. 195-207

Reachability and Firing Sequences of Homogeneous Synchronized Choice Petri Nets

Daniel Y. Chao………………………………………………….. .... Vol. 21, No. 1, pp. 129-152