E-Book, Englisch, Band 27, 816 Seiten
Mastorakis / Mladenov / Kontargyri Proceedings of the European Computing Conference
2009
ISBN: 978-0-387-84814-3
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Volume 1
E-Book, Englisch, Band 27, 816 Seiten
Reihe: Lecture Notes in Electrical Engineering
ISBN: 978-0-387-84814-3
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry. Engineers and Scientists working on various areas of Systems Theory, Applied Mathematics, Simulation, Numerical and Computational Methods and Parallel Computing present the latest findings, advances, and current trends on a wide range of topics. This proceedings volume will be of interest to students, researchers, and practicing engineers.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents;6
2;Contributors;14
3;Part 1: Neural Networks and Applications;26
3.1;Handwriting Knowledge Based on Parameterization for Writer Identification;27
3.1.1;1.1 Introduction;27
3.1.2;1.2 System Schedule;28
3.1.3;1.3 Database;29
3.1.4;1.4 Image Preprocessing and Segmentation;30
3.1.5;1.5 Feature Extraction;31
3.1.6;1.6 Classification and Results;33
3.1.6.1;1.6.1 Neural Networks;33
3.1.6.2;1.6.2 Experimental Methodology;34
3.1.7;1.7 Conclusions;36
3.1.8;References;36
3.2;Identification Surfaces Family;38
3.2.1;2.1 Introduction;38
3.2.2;2.2 The Algorithm for the Identification of a Geometric Feature Family;40
3.2.3;2.3 The Identification of a Geometric Feature Family Using the Genetic Algorithm;42
3.2.4;2.4 The Identification of a Geometric Feature Family Using the Neural Network;43
3.2.4.1;2.4.1 Database Generation;44
3.2.4.2;2.4.2 Application;45
3.2.5;2.5 Conclusion;47
3.2.6;References;47
3.3;Neuro-Fuzzy Models and Tobacco Control;48
3.3.1;3.1 Introduction;48
3.3.2;3.2 What Is Well Known;49
3.3.2.1;3.2.1 Fuzzy Control Model;50
3.3.2.2;3.2.2 Neural Networks Models;50
3.3.2.3;3.2.3 EVOlving POLicies;51
3.3.3;3.3 The Novelty of the Paper;52
3.3.4;3.4 Conclusion;53
3.3.5;References;53
3.4;PNN for Molecular Level Selection Detection;55
3.4.1;4.1 Introduction;55
3.4.2;4.2 Problem Formulation and Methodology;56
3.4.2.1;4.2.1 Genetic Material;56
3.4.2.2;4.2.2 PNN-Based Methodology;57
3.4.3;4.3 Experimental Results and Conclusions;58
3.4.4;References;59
3.5;Fine-Tune Artificial Neural Networks Automatically;61
3.5.1;5.1 Introduction;61
3.5.2;5.2 The Automatic Tuning of Artificial Neural Networks;62
3.5.3;5.3 Improving the Learning Process of Artificial Neural Networks;63
3.5.4;5.4 Experiments;63
3.5.4.1;5.4.1 Research Data and Experiment Design;63
3.5.4.2;5.4.2 Experimental Results;64
3.5.5;5.5 Conclusion;65
3.5.6;References;65
3.6;A Neurofuzzy Network for Supporting Detection of Diabetic Symptoms;66
3.6.1;6.1 Introduction;66
3.6.2;6.2 Neurofuzzy System;67
3.6.2.1;6.2.1 Nonlinear I/O Mapping;68
3.6.2.2;6.2.2 NN-Based Xmu Evaluation;69
3.6.2.3;6.2.3 Fuzzy Associative Memory;70
3.6.2.4;6.2.4 Neural Thresholding;70
3.6.2.5;6.2.5 NN-Based Segmentation;71
3.6.3;6.3 Numerical Results;71
3.6.4;6.4 Conclusions;73
3.6.5;References;73
3.7;Empirical Assessment of LR- and ANN-Based Fault Prediction Techniques;74
3.7.1;7.1 Introduction;74
3.7.2;7.2 Descriptions of Data and Metric Suite;76
3.7.2.1;7.2.1 Data Set;76
3.7.2.2;7.2.2 Metric Suite;76
3.7.3;7.3 Data Analysis and Research Methodology;77
3.7.3.1;7.3.1 Descriptive Statistics;77
3.7.3.2;7.3.2 Logistic Regression Model;77
3.7.3.3;7.3.3 Artificial Neural Network Model;79
3.7.3.4;7.3.4 Model Evaluation;79
3.7.4;7.4 Analysis Results;80
3.7.4.1;7.4.1 Descriptive Statistics;80
3.7.4.2;7.4.2 Logistic Regression Results;82
3.7.4.3;7.4.3 Artificial Neural Network Results;82
3.7.5;7.5 Model Evaluations;82
3.7.5.1;7.5.1 Comparison of LR and ANN Using ROC Curve;82
3.7.5.2;7.5.2 Leave-More-Out Cross Validations;83
3.7.6;7.6 Conclusions;83
3.7.7;References;84
4;Part 2: Advances in Image Processing;86
4.1;A New Scheme of Image Watermarking;87
4.1.1;8.1 Introduction;87
4.1.2;8.2 Our New Image Watermarking Algorithm;89
4.1.2.1;8.2.1 The Watermarking Embedding Algorithm;89
4.1.2.2;8.2.2 The Public Watermarking Detection Algorithm;91
4.1.2.3;8.2.3 Use of Multi-Resolution Field: The 5/3 Wavelet Decomposition;91
4.1.2.4;8.2.4 Presentation of the Turbo Coder;92
4.1.3;8.3 Perceptual Quality Metrics;93
4.1.4;8.4 Preliminary Results;95
4.1.4.1;8.4.1 Robustness Against Attacks;95
4.1.4.2;8.4.2 Fidelity of Watermarked Images After Attacks;95
4.1.4.2.1;8.4.2.1 Fidelity Against Noise Attacks;96
4.1.4.2.2;8.4.2.2 Fidelity Against JPEG Compression Attacks;96
4.1.4.2.3;8.4.2.3 Fidelity Against Filtering Attacks;97
4.1.5;8.5 Conclusions;98
4.1.6;References;99
4.2;Diffusing Vector Field of Gray-Scale Images for Image Segmentation;101
4.2.1;9.1 Introduction;101
4.2.2;9.2 Diffusing Vector Field of Gray-Scale Images;102
4.2.2.1;9.2.1 The Form of Electrostatic Field Force;102
4.2.2.2;9.2.2 The Repulsion Vector Between Image Points;103
4.2.2.3;9.2.3 The Diffusing Vector Field of Images;103
4.2.3;9.3 Image Segmentation by the Diffusing Vector Field;108
4.2.3.1;9.3.1 The Primitive Area in Images;108
4.2.3.2;9.3.2 The Diffusing Centers in the Primitive Area;108
4.2.3.3;9.3.3 Primitive Area Extraction by the Area-Expanding Method;110
4.2.3.4;9.3.4 Gray-Scale Image Segmentation Based on the Diffusing Vector Field;113
4.2.4;9.4 Conclusion;114
4.2.5;References;115
4.3;Image Processing via Synchronization in a Self-Organizing Oscillatory Network;116
4.3.1;10.1 Introduction;116
4.3.2;10.2 Main Characteristics of the Oscillatory Network;117
4.3.3;10.3 Network Segmentation Capabilities;119
4.3.3.1;10.3.1 Grey-Level Image Segmentation;119
4.3.3.2;10.3.2 Colored Image Segmentation;121
4.3.4;10.4 Selective Image Segmentation;121
4.3.5;10.5 Conclusion;122
4.3.6;References;123
4.4;Feature Based Color Stereo Matching Algorithm Using Restricted Search;124
4.4.1;11.1 Introduction;124
4.4.2;11.2 Linking Feature Points into Chains;125
4.4.3;11.3 Color Stereo Vision;125
4.4.4;11.4 Proposed Algorithm;126
4.4.4.1;11.4.1 Feature Extraction;126
4.4.4.2;11.4.2 Feature Matching;127
4.4.5;11.5 Important Notes in the New Algorithm;127
4.4.6;11.6 Conclusions;128
4.4.7;References;129
4.5;A Novel Edge-Preserving Lossy Image Coder;131
4.5.1;12.1 Introduction;131
4.5.2;12.2 Proposed Model;132
4.5.2.1;12.2.1 Image Selection and Feature of Interest Definition;132
4.5.2.2;12.2.2 Feature of Interest Map (FOIM) Extraction;132
4.5.2.3;12.2.3 Domain Transform;133
4.5.2.4;12.2.4 Pixel Mapping to Domain Transform;133
4.5.2.5;12.2.5 Image Coding with Modified SPIHT and Arithmetic Coding;133
4.5.2.6;12.2.6 Arithmetic and SPIHT Decoding;134
4.5.3;12.3 Results, Discussion, and Comparisons;136
4.5.4;12.4 Conclusions;137
4.5.5;References;138
5;Part 3: Modeling and Simulation;139
5.1;Equivalent Circuit Extraction for Passive Devices;140
5.1.1;13.1 Introduction;140
5.1.2;13.2 Formulation of the Proposed Method;141
5.1.3;13.3 Computational Results;143
5.1.4;13.4 Conclusions;147
5.1.5;References;147
5.2;Sleep Quality Differences According to a Statistical Continuous Sleep Model;149
5.2.1;14.1 Introduction;149
5.2.2;14.2 Database;150
5.2.3;14.3 Feature Extraction;150
5.2.4;14.4 HMM Sleep Modelling;151
5.2.5;14.5 Experiments and Results;153
5.2.6;14.6 Conclusion;156
5.2.7;References;157
5.3;Simulation Modeling in Support of a European Airspace Study;158
5.3.1;15.1 Introduction;158
5.3.2;15.2 Background on Airspace Study;159
5.3.3;15.3 CRCT;159
5.3.3.1;15.3.1 Traffic Flow and Demand Analysis;160
5.3.3.2;15.3.2 Aircraft Reroute Definition;161
5.3.3.3;15.3.3 Capture of Dynamic Data;162
5.3.3.4;15.3.4 Data Transfer from CRCT to MSim;162
5.3.4;15.4 MSim and the AOC Process Model;163
5.3.5;15.5 Conclusion;166
5.3.6;References;166
5.4;3D Measurement System for Car Deformation Analysis;167
5.4.1;16.1 Introduction;167
5.4.2;16.2 The Basic Concept of the Method;169
5.4.3;16.3 Main Processing Steps;170
5.4.3.1;16.3.1 Camera Calibration;170
5.4.3.2;16.3.2 Estimating the Plane Formed by the Laser Stripe;171
5.4.3.3;16.3.3 Determining the Position and Orientation of the Scanning Device;172
5.4.4;16.4 Structuring and Noise Reduction;174
5.4.5;16.5 Examples;175
5.4.6;16.6 Conclusions;177
5.4.7;References;177
5.5;Adaptive MV ARMA Identification Under the Presence of Noise;179
5.5.1;17.1 Introduction;179
5.5.2;17.2 Problem Reformulation;180
5.5.3;17.3 Examples;184
5.5.3.1;17.3.1 Example 1;184
5.5.3.2;17.3.2 Example 2;186
5.5.3.3;17.3.3 Example 3;188
5.5.4;17.4 Conclusions;189
5.5.5;References;190
5.6;Planck’s Law Simulation Using Particle Systems;192
5.6.1;18.1 Introduction;192
5.6.2;18.2 Black Body Radiation;193
5.6.3;18.3 Particle Systems;193
5.6.4;18.4 The Proposed System;194
5.6.5;18.5 Results;196
5.6.6;18.6 Conclusions;197
5.6.7;References;197
5.7;Simulation Results Using Shock Absorbers with Primary Intelligence-VZN;198
5.7.1;19.1 Introduction;199
5.7.2;19.2 The Matlab/Simulink Simulation;199
5.7.3;19.3 On Roll Theoretical Consideration;203
5.7.4;19.4 Conclusions;209
5.7.5;References;209
5.8;Pattern Generation via Computer;211
5.8.1;20.1 Introduction;211
5.8.2;20.2 Pattern Description;212
5.8.2.1;20.2.1 Pattern as Input/Output Relation;212
5.8.2.2;20.2.2 2-Commutative Linear Representation System;213
5.8.2.3;20.2.3 Realization Procedure;216
5.8.2.4;20.2.4 Partial Realization;216
5.8.3;20.3 Pattern Generation;218
5.8.4;20.4 Conclusion;222
5.8.5;References;222
5.9;3D Reconstruction: Estimating Depth of Hole from 2D Camera Perspectives;224
5.9.1;21.1 Introduction;224
5.9.2;21.2 Contact/Mechanical/Electromechanical Scanners;225
5.9.3;21.3 Non-Contact Scanners;225
5.9.3.1;21.3.1 Time of Flight Scanners;226
5.9.3.2;21.3.2 Laser Triangulation Scanners;227
5.9.3.3;21.3.3 Structured Light;228
5.9.3.4;21.3.4 Stereoscopic Scanners;228
5.9.3.5;21.3.5 Overview of Scanners;229
5.9.4;21.4 CAD Modeling;230
5.9.5;21.5 Our Approach-Perception Based Vision (PBV);230
5.9.6;21.6 Future Work;232
5.9.7;References;232
5.10;Modeling Diversity in Recovery Computer Systems;233
5.10.1;22.1 Introduction;233
5.10.2;22.2 Problem Formulation;234
5.10.3;22.3 Modeling Diversity;236
5.10.4;22.4 A Study of the Effect of Diversity on the Identifiability of Failures in the Systems;240
5.10.5;22.5 Conclusion;241
5.10.6;References;242
5.11;Cell Automata Models for a Reaction-Diffusion System;244
5.11.1;23.1 Introduction;244
5.11.2;23.2 The Reaction-Diffusion Systems;245
5.11.3;23.3 Discrete and Ultra-Discrete Reaction Diffusion Systems Derived from the PPS Equation;246
5.11.3.1;23.3.1 Discretization Procedure;246
5.11.3.2;23.3.2 Ultra-Discretization Procedures;247
5.11.4;23.4 Numerical Simulations and Final Remarks;248
5.11.5;References;249
5.12;3D Reconstruction of Solid Models from 2D Camera Perspectives;250
5.12.1;24.1 Introduction;250
5.12.2;24.2 Our Approach;252
5.12.3;24.3 Comparison Metrics;253
5.12.3.1;24.3.1 Number of Views;253
5.12.3.2;24.3.2 Technique;254
5.12.3.3;24.3.3 Drawing;255
5.12.3.4;24.3.4 Object;255
5.12.3.5;24.3.5 Cross-Sectional Views, Hidden Lines, and Dead-End Holes;255
5.12.3.6;24.3.6 User Interaction;255
5.12.3.7;24.3.7 Vectorization;255
5.12.4;24.4 Comparison of Approaches;255
5.12.4.1;24.4.1 Multiview Approaches;255
5.12.4.1.1;24.4.1.1 Liu et al. [8];256
5.12.4.1.2;24.4.1.2 Cicek and Gulesin [9];256
5.12.4.1.3;24.4.1.3 Dimri and Gurumoorthy [10];256
5.12.4.1.4;24.4.1.4 Lee and Han [14];256
5.12.4.1.5;24.4.1.5 Gong et al. [15];257
5.12.4.2;24.4.2 Single View Approach;257
5.12.4.2.1;24.4.2.1 Cooper [16];257
5.12.4.2.2;24.4.2.2 Martin et al. [17];257
5.12.4.2.3;24.4.2.3 Feng et al. [18];257
5.12.5;24.5 Summary;258
5.12.6;References;258
5.13;DiProNN: VM-Based Distributed Programmable Network Node Architecture;260
5.13.1;25.1 Introduction;260
5.13.2;25.2 DiProNN: Distributed Programmable Network Node;261
5.13.2.1;25.2.1 DiProNN and Virtual Machines;263
5.13.2.2;25.2.2 DiProNN Processing Unit Architecture;263
5.13.2.3;25.2.3 DiProNN Communication Protocol;264
5.13.3;25.3 DiProNN Programming Model;264
5.13.3.1;25.3.1 DiProNN Program Example;266
5.13.3.2;25.3.2 DiProNN Data Flow;266
5.13.4;25.4 Related work;267
5.13.5;25.5 Conclusions and Future work;267
5.13.6;References;268
5.14;A Semantics of Behavioural Concepts for Open Virtual Enterprises;269
5.14.1;26.1 Introduction;269
5.14.2;26.2 Core Behaviour Concepts in the RM-ODP Foundations Part;271
5.14.3;26.3 Meta-Modeling Time and Behavioural Constraints;273
5.14.3.1;26.3.1 Time;273
5.14.3.2;26.3.2 Behavioural Constraints;274
5.14.3.2.1;26.3.2.1 Constraints of Sequentiality;274
5.14.3.2.2;26.3.2.2 Constraints of Concurrency;275
5.14.3.2.3;26.3.2.3 Constraints of Nondeterminism;275
5.14.4;26.4 Behavioural Policies in RM-ODP Enterprise Language;276
5.14.4.1;26.4.1 Obligation;277
5.14.4.2;26.4.2 Permission;278
5.14.4.3;26.4.3 Prohibition;278
5.14.5;26.5 Conclusions;278
5.14.6;References;279
5.15;A Semantics of Community Related Concepts in ODP Enterprise Language;281
5.15.1;27.1 Introduction;281
5.15.2;27.2 Related Works;282
5.15.3;27.3 The RM-ODP;283
5.15.3.1;27.3.1 The RM-ODP Foundations Part;284
5.15.3.2;27.3.2 The RM-ODP Enterprise Language;285
5.15.4;27.4 Syntax Domain;286
5.15.5;27.5 Semantics Domain;288
5.15.6;27.6 Meaning Function;289
5.15.7;27.7 Conclusion;290
5.15.8;References;290
5.16;Modeling of the Speech Process Including Anatomical Structure of the Vocal Tract;292
5.16.1;28.1 Introduction;292
5.16.2;28.2 Selection of Feature Vectors;293
5.16.3;28.3 Model of Vocal Tract;294
5.16.4;28.4 Conclusions;296
5.16.5;References;297
5.17;Carbon Nanotube FET with Asymmetrical Contacts;298
5.17.1;29.1 Introduction;298
5.17.2;29.2 Single Schottky Barrier CNTFET;299
5.17.3;29.3 Simulation Methodology;300
5.17.4;29.4 Results and Discussion;301
5.17.5;29.5 Conclusion;302
5.17.6;References;302
5.18;Optimizing Prosthesis Design by Using Virtual Environments;304
5.18.1;30.1 Introduction;304
5.18.2;30.2 The Virtual Module;306
5.18.3;30.3 The 3D Engine;306
5.18.4;30.4 Virtual Sensors;307
5.18.5;30.5 The Virtual Prosthesis Module;307
5.18.6;30.6 The Synchronization Module;308
5.18.7;30.7 Conclusions;309
5.18.8;References;309
6;Part 4: Multi-Agent Systems;310
6.1;A Maude-Based Tool for Simulating DIMA Model;311
6.1.1;31.1 Introduction;311
6.1.2;31.2 The DIMA Multi-Agents Model;313
6.1.2.1;31.2.1 Example: Auction Application;314
6.1.3;31.3 Rewriting Logic and Maude Language;314
6.1.4;31.4 DIMA-Maude Model;316
6.1.4.1;31.4.1 Modeling of the DIMA Model with Maude;316
6.1.4.2;31.4.2 Simulation of the Example Under Maude;320
6.1.5;31.5 Steps of the DIMA Model Simulator;320
6.1.6;31.6 Technical Aspect of the Simulator;322
6.1.7;31.7 Conclusion and Future Work;322
6.1.8;References;323
6.2;Using Two-Level Morphology to Recognize Derived Agentive Nouns;324
6.2.1;32.1 Introduction;324
6.2.1.1;32.1.1 Two-Level Rules;325
6.2.2;32.2 Two-Level Rules for Morphological Recognition of Derived Agentive Nouns;326
6.2.2.1;32.2.1 Remaining Rules;326
6.2.2.2;32.2.2 The Lexicon;330
6.2.2.3;32.2.3 Results and Examples;330
6.2.3;32.3 Conclusions;332
6.2.4;References;332
6.3;Towards an Agent Framework to Support Distributed Problem Solving;334
6.3.1;33.1 Introduction;334
6.3.2;33.2 Agent Standardization;335
6.3.3;33.3 Implementation Details;336
6.3.3.1;33.3.1 ACENET;336
6.3.3.2;33.3.2 Grid-Like Distributed Architecture;338
6.3.4;33.4 Matrix Multiplication over ACENET;338
6.3.5;33.5 Conclusion and Discussion;339
6.3.6;References;340
6.4;Building Moderately Open Multi-Agent Systems: The HABA Process;341
6.4.1;34.1 Introduction;341
6.4.2;34.2 Background;342
6.4.2.1;34.2.1 Related Work;342
6.4.2.2;34.2.2 An Application to Seismic Monitoring;342
6.4.3;34.3 Moderately Open Multi-Agent Systems;342
6.4.3.1;34.3.1 Multi-Agent System Architecture;343
6.4.3.2;34.3.2 The HABA Development Framework for Moderately Open Multi-Agent Systems;343
6.4.4;34.4 The HABA.DM Methodology for Agent-Oriented Analysis and Design;344
6.4.4.1;34.4.1 The Analysis Stage;344
6.4.4.2;34.4.2 The Design Stage;345
6.4.5;34.5 Programming Environment;346
6.4.5.1;34.5.1 Programming in HABA.PL;346
6.4.5.2;34.5.2 Creating and Running a MAS;347
6.4.5.3;34.5.3 The HABA.PM Project Manager;348
6.4.6;34.6 Conclusions;348
6.4.7;References;349
7;Part 5: Educational Software and E-Learning Systems;350
7.1;Using Mathematics for Data Traffic Modeling Within an E-Learning Platform;351
7.1.1;35.1 Introduction;351
7.1.2;35.2 Methods and Materials;352
7.1.3;35.3 Proposed Analysis Process;353
7.1.4;35.4 Results;353
7.1.5;35.5 Conclusions;358
7.1.6;References;358
7.2;Developing Statistics Learning at a Distance Using Formal Discussions;360
7.2.1;36.1 Introduction;360
7.2.2;36.2 The Hybrid Course;361
7.2.2.1;36.2.1 Course Modules;361
7.2.2.2;36.2.2 Collaborative Learning;362
7.2.3;36.3 Method;364
7.2.3.1;36.3.1 Sample;364
7.2.3.2;36.3.2 Student Performance and Evaluation;364
7.2.4;36.4 Summary and Concluding Remarks;365
7.2.5;References;366
7.3;Distance Teaching in the Technology Course in Senior High School;368
7.3.1;37.1 Introduction;368
7.3.2;37.2 Literature Review;369
7.3.2.1;37.2.1 Team Teaching;369
7.3.2.2;37.2.2 Distance Education;370
7.3.3;37.3 Research Method;371
7.3.3.1;37.3.1 Research Subjects;371
7.3.3.2;37.3.2 Method of the Study;372
7.3.3.3;37.3.3 Research Tools;372
7.3.3.4;37.3.4 Data Collection, Processing and Analysis;373
7.3.4;37.4 Curriculum Design;373
7.3.4.1;37.4.1 The Title of the Class;373
7.3.4.2;37.4.2 Purpose of the Curriculum;373
7.3.4.3;37.4.3 Goal of Teaching;373
7.3.4.4;37.4.4 Location and Place;373
7.3.4.5;37.4.5 The Plan of Curriculum;374
7.3.4.5.1;37.4.5.1 Teaching Equipment;374
7.3.4.5.1.1;Hardware;374
7.3.4.5.1.2;Software;374
7.3.4.5.2;37.4.5.2 Contracted Lesson Plan;374
7.3.5;37.5 Findings and Discussion;377
7.3.5.1;37.5.1 The Questionnaire on Learning Effectiveness;377
7.3.5.2;37.5.2 Interview with Participating Teachers;378
7.3.6;37.6 Conclusion and Suggestions;380
7.3.6.1;37.6.1 Conclusion;380
7.3.6.2;37.6.2 Suggestions;381
7.3.7;References;381
7.4;Electronic Exams for the 21st Century;383
7.4.1;38.1 Introduction;383
7.4.2;38.2 Electronic Documents;385
7.4.3;38.3 Need for New Types of E-Tests;386
7.4.4;38.4 Towards a New Generation of E-Tests;386
7.4.4.1;38.4.1 New Possibilities;387
7.4.4.2;38.4.2 Facilitating e-Assessment;388
7.4.5;38.5 Teaching Telematics via Telematics;389
7.4.6;38.6 Conclusion;389
7.4.7;References;389
7.5;Effects of the Orff Music Teaching Method on Creative Thinking Abilities;391
7.5.1;39.1 Introduction;391
7.5.2;39.2 Purpose of the Study;392
7.5.2.1;39.2.1 Content;392
7.5.2.2;39.2.2 Characteristics;392
7.5.3;39.3 Activities of the Orff Music Teaching Method;392
7.5.3.1;39.3.1 Language of Rhythm;392
7.5.3.2;39.3.2 Singing;392
7.5.3.3;39.3.3 Performing;393
7.5.4;39.4 Research Method;393
7.5.4.1;39.4.1 Sampling;393
7.5.4.2;39.4.2 Research Tools;393
7.5.5;39.5 Results Analysis;394
7.5.5.1;39.5.1 Influence of the Orff Music Teaching Method on Children’s Creative Thinking;394
7.5.5.2;39.5.2 Influence of the Orff Music Teaching Method on Children’s Fluency in Their Creative Thinking;395
7.5.5.3;39.5.3 Influence of the Orff Music Teaching Method on Children’s Flexibility in Their Creative Thinking;396
7.5.5.4;39.5.4 Influence of the Orff Music Teaching Method on Children’s Originality in Their Creative Thinking;396
7.5.6;39.6 Conclusion and Suggestions;397
7.5.7;References;398
7.6;Knowledge Application for Preparing Engineering High School Teachers;399
7.6.1;40.1 Introduction;399
7.6.2;40.2 Literature Reviews;400
7.6.2.1;40.2.1 The Applications of Knowledge;400
7.6.2.2;40.2.2 Knowledge Technologies;401
7.6.3;40.3 Research Methods;401
7.6.3.1;40.3.1 Modified Delphi Technique;402
7.6.3.2;40.3.2 The Development of the Questionnaire;402
7.6.3.3;40.3.3 Knowledge Application Platform;402
7.6.4;40.4 Results;403
7.6.4.1;40.4.1 Investigation Results Analysis for the 1st Round and the 2nd Round Using the Modified Delphi Technique;403
7.6.4.2;40.4.2 The Construction of a Knowledge Application Platform;404
7.6.4.3;40.4.3 The Results of the Questionnaire;404
7.6.5;40.5 Discussion;405
7.6.6;40.6 Conclusion;406
7.6.7;References;406
7.7;Collaborative Online Network and Cultural Exchange Project;408
7.7.1;41.1 Introduction;408
7.7.2;41.2 Background of the Project;409
7.7.2.1;41.2.1 Content;410
7.7.2.2;41.2.2 Characteristics;410
7.7.3;41.3 Discussions of Web-Enhanced Project-Based Learning;411
7.7.3.1;41.3.1 PBL;411
7.7.3.2;41.3.2 Discussing Project-Based Learning with Constructivism;411
7.7.3.3;41.3.3 Internet Courses and Problem-Based Learning;411
7.7.4;41.4 Contents;412
7.7.4.1;41.4.1 Members of This Project;413
7.7.4.2;41.4.2 Expected Benefits;413
7.7.5;41.5 Collaborative Online Network and Cultural Exchange Project-Especially Excellent Works;413
7.7.5.1;41.5.1 Project Title;413
7.7.5.2;41.5.2 School Name;413
7.7.5.3;41.5.3 Course Field: Integrative Activities;413
7.7.5.3.1;41.5.3.1 Attendants;413
7.7.5.3.2;41.5.3.2 Project Website;413
7.7.5.4;41.5.4 Summer;413
7.7.5.5;41.5.5 Curriculum and Innovative Teaching;414
7.7.6;41.6 Conclusion and Analysis;414
7.7.6.1;41.6.1 WHY (Why We Insist on Proceeding with Educational Communication by ICT);417
7.7.6.2;41.6.2 What, When, Who, Where, How (What are We Doing? When We Do It? Whom Do We Do It With? Where We Do it? How We Do It?);417
7.7.7;References;418
7.8;A Study of the Project on Mobile Devices in Education;419
7.8.1;42.1 Introduction;419
7.8.2;42.2 Definitions and Conditions;420
7.8.2.1;42.2.1 Content;420
7.8.2.2;42.2.2 Conditions;420
7.8.3;42.3 Types and Characteristics;421
7.8.4;42.4 PHS Applications in Education;421
7.8.4.1;42.4.1 Administrative Applications;422
7.8.4.2;42.4.2 Communication and Collaboration Applications;422
7.8.4.3;42.4.3 Teaching and Learning Applications;422
7.8.5;42.5 Study Method;422
7.8.5.1;42.5.1 Procedure;422
7.8.5.2;42.5.2 Subject Background;423
7.8.5.3;42.5.3 Interviewer’s Background;423
7.8.5.4;42.5.4 Interview Data;423
7.8.5.5;42.5.5 Analysis of Data;424
7.8.5.6;42.5.6 Formulas;424
7.8.6;42.6 Conclusion and Suggestions;427
7.8.7;References;428
7.9;The Solutions of Mobile Technology for Primary School;429
7.9.1;43.1 Introduction;429
7.9.2;43.2 The Meaning of Mobile Technology;430
7.9.2.1;43.2.1 The Connotations of Mobile Technology;430
7.9.2.2;43.2.2 Characteristics of Mobile Technology;431
7.9.3;43.3 The Connotations of Mobile Technology Integrate into the Science and Technology Curriculum for Primary School;433
7.9.3.1;43.3.1 Our Country’s Future National Elementary School Nature and Life Science and Technology Curriculum Mobile Technology Connotation;433
7.9.3.1.1;43.3.1.1 Content;433
7.9.3.1.2;43.3.1.2 Procedure;434
7.9.3.1.3;43.3.1.3 System Vein;434
7.9.3.1.4;43.3.1.4 Progress;434
7.9.3.1.5;43.3.1.5 Making Uniform;434
7.9.3.1.6;43.3.1.6 Document;434
7.9.3.2;43.3.2 The Teaching Strategies for Mobile Technology Integrate into Science and Technology Curriculum;435
7.9.3.2.1;43.3.2.1 Teaching of Strategy Dissemination;435
7.9.3.2.2;43.3.2.2 Teaching of Strategy Facilitation;435
7.9.3.2.3;43.3.2.3 Teaching of Strategy Inside Collaboration;435
7.9.3.2.4;43.3.2.4 Teaching of Strategy Outside Collaboration;435
7.9.3.2.5;43.3.2.5 Teaching of Strategy Apprenticeship;436
7.9.3.2.6;43.3.2.6 The Teaching Strategy Generative Development;436
7.9.4;43.4 The Solutions of Mobile Technology Integrate into Science and Technology Curriculum for Primary School;436
7.9.4.1;43.4.1 Student Stratification Plane;436
7.9.4.2;43.4.2 Teacher Stratification Plane;437
7.9.4.3;43.4.3 Administrative Stratification Plane;438
7.9.5;43.5 Conclusion;439
7.9.6;References;440
7.10;A Study of Verifying Knowledge Reuse Path Using SEM;441
7.10.1;44.1 Purpose;441
7.10.2;44.2 Literature Review;442
7.10.2.1;44.2.1 Process and Transfer;442
7.10.2.2;44.2.2 Structural Equation Modeling;443
7.10.3;44.3 Methodology;444
7.10.3.1;44.3.1 Theory Model;444
7.10.3.2;44.3.2 Subjects;444
7.10.3.3;44.3.3 Instrument;445
7.10.4;44.4 Findings;445
7.10.4.1;44.4.1 The Model-Fitting Process;446
7.10.5;44.5 Conclusions;449
7.10.6;References;449
7.11;A Web-Based System for Distance Learning of Programming;450
7.11.1;45.1 Introduction;450
7.11.2;45.2 The WAPE System;451
7.11.3;45.3 The CLASS Subsystem;452
7.11.4;45.4 The PRACTICE Subsystem;453
7.11.5;45.5 Knowledge Model;454
7.11.6;45.6 Student Model;455
7.11.7;45.7 Bayesian Network;456
7.11.8;45.8 Testing;457
7.11.9;45.9 Conclusion;458
7.11.10;References;459
7.12;New Software for the Study of the Classic Surfaces from Differential Geometry;460
7.12.1;46.1 Introduction;460
7.12.2;46.2 Computer-Based Training as a Didactic Method;461
7.12.3;46.3 Application Present;462
7.12.3.1;46.3.1 Theoretical Presentation of Classic Surfaces;463
7.12.3.2;46.3.2 Examples;464
7.12.4;46.4 Conclusion;468
7.12.5;References;469
7.13;Data Requirements for Detecting Student Learning Style in an AEHS;470
7.13.1;47.1 Introduction;470
7.13.2;47.2 The Unified Learning Style Model Approach;471
7.13.3;47.3 Data Requirements for Detecting Learning Preferences;472
7.13.4;47.4 Conclusions;474
7.13.5;References;474
7.14;Ontology-Based Feedback E-Learning System for Mobile Computing;476
7.14.1;48.1 Virtual Courses;476
7.14.2;48.2 Semantic Feedbacks;478
7.14.3;48.3 Ontologisms;483
7.14.4;48.4 Mobile Computing Prototype;484
7.14.5;48.5 Conclusion;485
7.14.6;References;485
8;Part 6: Information Communication Technologies;486
8.1;Potentiality of Information Technology Systems;487
8.1.1;49.1 Introduction;487
8.1.2;49.2 Cyclical Nature of Information and Communication Systems;488
8.1.3;49.3 Nature of Information in a Modern Organization and Its Interaction with Communication Systems;489
8.1.4;49.4 Range of Information System and Communication System Aspects;489
8.1.5;49.5 Types of Information Systems and Communication System Aspects;490
8.1.6;49.6 Availability Needed by the Information System and Communication System Elements;491
8.1.7;49.7 Sources of Information Systems and Communication Systems;491
8.1.8;49.8 Strategies for Management;492
8.1.8.1;49.8.1 Design and Polices;492
8.1.8.2;49.8.2 Equipment Selection and Repairing;493
8.1.8.3;49.8.3 System Monitoring and Improvement;494
8.1.9;49.9 Conclusions;494
8.1.10;References;495
8.2;A Review of Techniques to Counter Spam and Spit;496
8.2.1;50.1 Introduction;496
8.2.2;50.2 Unsolicited Messages in Electronic Mail (Spam);497
8.2.2.1;50.2.1 Electronic Mail;497
8.2.2.1.1;50.2.1.1 SMTP (Simple Mail Transfer Protocol);498
8.2.2.1.2;50.2.1.2 MIME (Multipurpose Internet Mail Extensions);498
8.2.2.1.3;50.2.1.3 S/MIME (Secure/Multipurpose Internet Mail Extensions);498
8.2.2.1.4;50.2.1.4 POP (Post Office Protocol) and IMAP (Internet Message Access Protocol);498
8.2.2.2;50.2.2 SPAM;498
8.2.3;50.3 Techniques to Counter Spam;499
8.2.3.1;50.3.1 Techniques to Prevent Spam;499
8.2.3.2;50.3.2 Techniques to Detect Spam;500
8.2.3.3;50.3.3 Techniques to React to Spam;501
8.2.4;50.4 Techniques to Counter Unsolicited Calls in Internet Telephony (Spit);502
8.2.4.1;50.4.1 Spit Definition;502
8.2.4.2;50.4.2 Techniques to Counter Spit;502
8.2.5;50.5 Similarities and Differences Between Spam and Spit;504
8.2.5.1;50.5.1 Similarities;504
8.2.5.2;50.5.2 Differences;504
8.2.6;50.6 Conclusions;505
8.2.7;References;505
8.3;Sequential Algorithms for Max-Min Fair Bandwidth Allocation;506
8.3.1;51.1 Introduction;506
8.3.2;51.2 Cumulated Ordered Outcomes;509
8.3.3;51.3 Shortfalls to Ordered Targets;512
8.3.4;51.4 Computational Experiments;514
8.3.5;51.5 Conclusion;516
8.3.6;References;516
8.4;A Temporal Variation in Indoor Environment;518
8.4.1;52.1 Introduction;518
8.4.2;52.2 Effect of Body Shadowing;519
8.4.2.1;52.2.1 Statistical Distribution;519
8.4.2.2;52.2.2 Amplitude Correlation;520
8.4.2.3;52.2.3 Level Crossing Rate and Duration of Fading;520
8.4.3;52.3 Adopted Model of the Human Body;520
8.4.4;52.4 Simulation of Temporal Variations of Signal;521
8.4.4.1;52.4.1 Simulating Setting;521
8.4.4.2;52.4.2 Analysis of Narrow Band Channel;522
8.4.4.2.1;52.4.2.1 The Temporal Variation of the Signal Envelope;522
8.4.4.2.2;52.4.2.2 Level Crossing Rate;523
8.4.4.3;52.4.3 Analysis of Wide Band Channel;524
8.4.4.3.1;52.4.3.1 Impulse Response of the Channel;524
8.4.5;52.5 Solution to the Unavailability of the Channel;525
8.4.6;52.6 Conclusion;526
8.4.7;References;526
8.5;Workflow Management for Cross-Media Publishing;528
8.5.1;53.1 Introduction;528
8.5.2;53.2 Cross-Media Publishing;529
8.5.3;53.3 Paper Edition;530
8.5.4;53.4 Cross-Media Publishing;532
8.5.5;53.5 Publishing Speed and Rhythm;532
8.5.6;53.6 Conclusions;535
8.5.7;References;536
8.6;A Bayesian Approach to Improve the Performance of P2P Networks;537
8.6.1;54.1 Introduction;537
8.6.2;54.2 Related Work;538
8.6.3;54.3 Solution Overview;539
8.6.4;54.4 The Profiles;541
8.6.4.1;54.4.1 Constructing the Semantic Profile for Each Node;541
8.6.4.2;54.4.2 Constructing and Maintaining the Profiles for the Connections of the Nodes;541
8.6.4.3;54.4.3 The Reply Profile;543
8.6.4.4;54.4.4 The Query Profile;544
8.6.5;54.5 Protocol Extension;545
8.6.6;54.6 Results;545
8.6.7;54.7 Conclusion;547
8.6.8;References;547
8.7;Deploying BitTorrent in Mobile Environments;548
8.7.1;55.1 Introduction;548
8.7.2;55.2 P2P File-Sharing Over Mobile Networks;549
8.7.2.1;55.2.1 Gnutella;550
8.7.2.2;55.2.2 BitTorrent;550
8.7.3;55.3 The Proposed Architecture;551
8.7.3.1;55.3.1 The Mobile Peer-to-Peer Node;553
8.7.3.2;55.3.2 The Multi-Tracker Extension;553
8.7.3.3;55.3.3 Proxy;554
8.7.4;55.4 BitTorrent for Symbian-Based Smartphones: A Case Study;557
8.7.5;55.5 Results and Conclusions;557
8.7.6;References;558
8.8;Numerical Simulation for the Hopf Bifurcation in TCP Systems;559
8.8.1;56.1 Introduction;559
8.8.2;56.2 Local Stability and Existence of Hopf Bifurcation;561
8.8.3;56.3 Direction and Stability of Bifurcating Periodic Solutions;562
8.8.4;56.4 A Numerical Example Illustrated by Computer Simulations;563
8.8.5;56.5 Conclusion;566
8.8.6;References;566
8.9;Communications by Vector Manifolds;567
8.9.1;57.1 Introduction;567
8.9.2;57.2 Topological Description of the Electromagnetic Field;568
8.9.3;57.3 Signaling by Vector Manifolds;570
8.9.3.1;57.3.1 Quasi-TEM Modal Signaling;571
8.9.3.2;57.3.2 Signaling by Nonseparable Field Impulses;572
8.9.4;57.4 Hardware: Theory and Circuitry;572
8.9.5;57.5 Conclusions;572
8.9.6;References;573
8.10;A Computation Study in Mesh Networks by Scheduling Problems;574
8.10.1;58.1 Introduction;574
8.10.2;58.2 Problem Formulation;575
8.10.3;58.3 Problem Solution;576
8.10.4;58.4 Experimental Analysis;579
8.10.4.1;58.4.1 A Typical Example;579
8.10.5;58.5 Conclusions;580
8.10.6;References;580
8.11;Serially Concatenated RS Codes with ST Turbo Codes Over Ring;581
8.11.1;59.1 Introduction;581
8.11.2;59.2 System Description;582
8.11.3;59.3 Simulation Model;585
8.11.4;59.4 Results;586
8.11.5;59.5 Conclusions;589
8.11.6;References;589
8.12;Network Performance Monitoring and Utilization Measurement;590
8.12.1;60.1 Introduction;590
8.12.2;60.2 Network Performance Evaluation;591
8.12.3;60.3 Testing Platform;591
8.12.4;60.4 Experimental Results and Analysis;592
8.12.4.1;60.4.1 Experimental Setup;592
8.12.4.2;60.4.2 Experimental Results;592
8.12.5;60.5 Conclusion;595
8.12.6;References;595
8.13;Blind Adaptive Multiuser Detection Based on Affine Projection Algorithm;596
8.13.1;61.1 Introduction;596
8.13.2;61.2 Proposed Blind Adaptive Multiuser Detector Using Single Antenna;597
8.13.3;61.3 Proposed Blind Adaptive Multiuser Detector Using Antenna Array;599
8.13.4;61.4 Simulation Results;600
8.13.4.1;61.4.1 Case 1;601
8.13.4.2;61.4.2 Case 2;601
8.13.4.3;61.4.3 Case 3;601
8.13.4.4;61.4.4 Case 4;603
8.13.5;61.5 Conclusions;605
8.13.6;References;605
8.14;Multiple Base Station Positioning for Sensor Applications;607
8.14.1;62.1 Introduction;607
8.14.2;62.2 Base Station Placement Approaches;608
8.14.2.1;62.2.1 Placement of N-Base Stations;609
8.14.3;62.3 System Model;609
8.14.3.1;62.3.1 Deployment of the Sensor Nodes;610
8.14.3.2;62.3.2 Finding the Location Information;610
8.14.3.3;62.3.3 Collecting Location Information;610
8.14.3.4;62.3.4 Determination of the Best Locations for K Base Stations;611
8.14.3.5;62.3.5 Routing;611
8.14.3.6;62.3.6 Sensor Node Energy Model;612
8.14.3.7;62.3.7 Lifetime Estimation;612
8.14.4;62.4 K-Means Local+;613
8.14.4.1;62.4.1 K-Means Clustering;613
8.14.4.2;62.4.2 Establishment of the Routing;614
8.14.4.3;62.4.3 Positioning of the Base Station;614
8.14.5;62.5 Computational Results;614
8.14.6;62.6 Conclusion;616
8.14.7;References;616
8.15;Considerations for the Design of a General Purpose Wireless Sensor Node;618
8.15.1;63.1 Introduction;618
8.15.2;63.2 Previous Work;619
8.15.3;63.3 System Design Constraints;619
8.15.3.1;63.3.1 Processor Module;620
8.15.3.1.1;63.3.1.1 Power Saving;620
8.15.3.1.2;63.3.1.2 Clock Scaling;620
8.15.3.1.3;63.3.1.3 Instruction Set;621
8.15.3.1.4;63.3.1.4 I/O Ports/Operation;621
8.15.3.2;63.3.2 RF Transceiver Module;622
8.15.3.2.1;63.3.2.1 Power Consumption;622
8.15.3.2.2;63.3.2.2 Ease of Use;622
8.15.3.3;63.3.3 Memory Module;623
8.15.3.4;63.3.4 Sensor Board Module;623
8.15.3.5;63.3.5 Power Management Module;623
8.15.4;63.4 Our Design;624
8.15.4.1;63.4.1 Processor Module;624
8.15.4.1.1;63.4.1.1 Power Saving;624
8.15.4.1.2;63.4.1.2 Clock Scaling;625
8.15.4.1.3;63.4.1.3 Instruction Set;625
8.15.4.1.4;63.4.1.4 I/O Ports/Operation;626
8.15.4.2;63.4.2 RF Transceiver Module;626
8.15.4.3;63.4.3 Memory Module;627
8.15.4.4;63.4.4 Sensor Board Module;627
8.15.4.5;63.4.5 Power Management Module;628
8.15.5;63.5 Conclusion;628
8.15.6;References;629
8.16;Performance Comparison and Improvement of Wireless Network Protocols;630
8.16.1;64.1 Introduction;630
8.16.2;64.2 Description of Protocols;631
8.16.3;64.3 The Simulation Network Model;633
8.16.4;64.4 Performance Results;633
8.16.5;64.5 Conclusion;635
8.16.6;References;637
8.17;Modeling the Erroneous Behaviour of a Sequential Memory Component with Streams;638
8.17.1;65.1 Introduction;638
8.17.2;65.2 Regular Behaviour;639
8.17.2.1;65.2.1 Interface;640
8.17.2.2;65.2.2 Service Domain;640
8.17.2.3;65.2.3 Regular Behaviour;640
8.17.2.4;65.2.4 Implementation;641
8.17.3;65.3 Irregular Behaviour;642
8.17.3.1;65.3.1 Erroneous Input Histories;642
8.17.3.2;65.3.2 Classification;642
8.17.4;65.4 Fault Sensitive Memory Component;643
8.17.4.1;65.4.1 Input/Output Behaviour;643
8.17.4.2;65.4.2 Implementation;643
8.17.5;65.5 Fault Tolerant Memory Component;644
8.17.5.1;65.5.1 Input/Output Behaviour;644
8.17.5.1.1;65.5.1.1 Implementation;644
8.17.6;65.6 Robust Memory Component;645
8.17.6.1;65.6.1 Input/Output Behaviour;645
8.17.6.2;65.6.2 Implementation;645
8.17.7;65.7 Fault Correcting Memory Component;646
8.17.7.1;65.7.1 Input/Output Behaviour;646
8.17.7.2;65.7.2 Implementation;646
8.17.8;65.8 Conclusion;647
8.17.9;References;648
8.18;FPGA Implementation of PPM I-UWB Baseband Transceiver;649
8.18.1;66.1 Introduction;649
8.18.2;66.2 Ultra-Wideband Versus Narrowband;650
8.18.3;66.3 Pulse Position Modem Architecture;652
8.18.3.1;66.3.1 PPM Signal Structure;652
8.18.3.2;66.3.2 PPM Modulator;653
8.18.3.3;66.3.3 PPM Demodulator;654
8.18.4;66.4 PPM I-UWB Software and Hardware Simulation;654
8.18.4.1;66.4.1 Matlab Algorithm and Simulation Results;654
8.18.4.2;66.4.2 VHDL Algorithm and Simulation Results;655
8.18.5;66.5 PPM I-UWB Hardware Synthesis and Verification;657
8.18.5.1;66.5.1 VHDL Synthesis Results;657
8.18.5.2;66.5.2 Xilinx ChipScope Verification Results;658
8.18.5.3;66.5.3 LCD Verification Results;659
8.18.6;66.6 Conclusions;659
8.18.7;References;659
8.19;WSN-Based Audio Surveillance Systems;661
8.19.1;67.1 Introduction;661
8.19.2;67.2 System Architecture;662
8.19.3;67.3 Design Issues: Audio Source Coding Algorithms;664
8.19.4;67.4 Implementation Issues: RFD, FFD, and GW Software;664
8.19.5;67.5 Validation;665
8.19.6;67.6 Conclusion and Future Work;666
8.19.7;References;666
8.20;Smart Antenna Design Using Multi-Objective Genetic Algorithms;668
8.20.1;68.1 Introduction;668
8.20.2;68.2 Formulation of the Antenna Array Pattern;669
8.20.3;68.3 Numerical Results;671
8.20.4;68.4 Conclusions;672
8.20.5;References;673
9;Part 7: Computer Applications in Modern Medicine;674
9.1;Intention to Adopt the E-Health Services System in a Bureau of Health;675
9.1.1;69.1 Introduction;675
9.1.2;69.2 Literature Review;676
9.1.2.1;69.2.1 E-Health System in Taiwan;676
9.1.2.2;69.2.2 Theory of Reasoned Action;677
9.1.2.3;69.2.3 Theory of Planned Behavior;677
9.1.3;69.3 Methods;678
9.1.4;69.4 Results;680
9.1.4.1;69.4.1 Determinants;680
9.1.4.2;69.4.2 Relative Importance of Determinants;681
9.1.5;69.5 Discussion and Conclusion;682
9.1.5.1;69.5.1 Multiple Factors of Using Behavior;682
9.1.5.2;69.5.2 Volition of Participants;682
9.1.5.3;69.5.3 The Implication for Strategic Planning;683
9.1.6;References;683
9.2;Visualization and Clustering of DNA Sequences;685
9.2.1;70.1 Visualization of DNA Sequences;685
9.2.2;70.2 A Visualization Algorithm;688
9.2.2.1;70.2.1 1D Graphical Representation of DNA Sequences;688
9.2.2.2;70.2.2 2D Representation of Encoded DNA Sequences by Base-Curves;689
9.2.3;70.3 Examination of Similarities Among Encoded DNA Sequences;691
9.2.4;70.4 Conclusion;694
9.2.5;References;694
9.3;E-Health Service in Taiwan-The Role of Organizational Innovativeness;695
9.3.1;71.1 Introduction;695
9.3.2;71.2 Literature Review;696
9.3.2.1;71.2.1 Compatibility;696
9.3.2.2;71.2.2 Personal Innovativeness;696
9.3.2.3;71.2.3 Organizational Innovativeness;697
9.3.3;71.3 Method;698
9.3.4;71.4 Results;699
9.3.5;71.5 Discussion and Conclusion;703
9.3.6;References;703
9.4;Analysis of Heart Sounds with Wavelet Entropy;705
9.4.1;72.1 Introduction;705
9.4.2;72.2 Materials and Methods;706
9.4.2.1;72.2.1 Data Acquisition;707
9.4.2.2;72.2.2 Data Analysis;707
9.4.2.3;72.2.3 Wavelet Entropy;707
9.4.3;72.3 Results;708
9.4.4;72.4 Discussion and Conclusion;710
9.4.5;References;711
9.5;Detection of Mitral Regurgitation and Normal Heart Sounds;713
9.5.1;73.1 Introduction;713
9.5.2;73.2 Materials and Method;714
9.5.2.1;73.2.1 Data Acquisition;715
9.5.2.2;73.2.2 Data Analysis;715
9.5.3;73.3 Results;716
9.5.4;73.4 Discussion and Conclusion;717
9.5.5;References;719
9.6;Wavelet Entropy Detection of Heart Sounds;721
9.6.1;74.1 Introduction;721
9.6.2;74.2 Materials and Methods;722
9.6.2.1;74.2.1 Data Acquisition;723
9.6.2.2;74.2.2 Data Analysis;723
9.6.2.3;74.2.3 Wavelet Entropy;723
9.6.3;74.3 Results;724
9.6.4;74.4 Discussion and Conclusion;725
9.6.5;References;727
9.7;Continuous Wavelet Transform Analysis of Heart Sounds;729
9.7.1;75.1 Introduction;729
9.7.2;75.2 Materials and Method;730
9.7.2.1;75.2.1 Data Acquisition;731
9.7.2.2;75.2.2 Data Analysis;731
9.7.3;75.3 Results;732
9.7.4;75.4 Conclusion;733
9.7.5;References;735
9.8;Limitations of Lung Segmentation Techniques;737
9.8.1;76.1 Introduction;737
9.8.1.1;76.1.1 Lung Cancer;738
9.8.1.2;76.1.2 Medical Image Segmentation;739
9.8.1.3;76.1.3 Segmentation Techniques;739
9.8.1.3.1;76.1.3.1 Threshold Techniques;740
9.8.1.3.2;76.1.3.2 Edge-Based Methods;740
9.8.1.3.3;76.1.3.3 Region-Based Methods;740
9.8.1.3.4;76.1.3.4 Connectivity-Preserving Relaxation Methods;740
9.8.2;76.2 Literature Survey;740
9.8.3;76.3 Implementation;742
9.8.3.1;76.3.1 Scheme-I (Thresholding + Morphology);742
9.8.3.2;76.3.2 Scheme-II (Thresholding + Ball Algorithm);743
9.8.4;76.4 Results;746
9.8.4.1;76.4.1 Limitations of Scheme-I;746
9.8.4.2;76.4.2 Limitations of Scheme-II;748
9.8.5;76.5 Discussion;749
9.8.6;References;749
9.9;Segmentation of Anatomical Structures Using Volume Definition Tools;751
9.9.1;77.1 Introduction;752
9.9.2;77.2 Manual Volume Definition;752
9.9.2.1;77.2.1 Linear Interpolation;753
9.9.2.2;77.2.2 Orthogonal Contour Interpolation;754
9.9.3;77.3 Volume Interpolation From Non-Parallel Contours;756
9.9.4;77.4 Conclusions;760
9.9.5;References;761
9.10;Shape Analysis of Heart Rate Lorenz Plots;762
9.10.1;78.1 Introduction;762
9.10.2;78.2 Methods;763
9.10.3;78.3 Image Processing;763
9.10.4;78.4 Results;766
9.10.5;78.5 Discussion;767
9.10.6;References;767
9.11;Human Readable Rule Induction in Medical Data Mining;769
9.11.1;79.1 Introduction;769
9.11.2;79.2 The Medical Data Sets;770
9.11.3;79.3 Rule Induction Algorithms;771
9.11.3.1;79.3.1 WEKA Classifier Algorithms;771
9.11.3.2;79.3.2 Rule and Decision Tree Induction Algorithms Summary;772
9.11.4;79.4 Experimental Setup;773
9.11.4.1;79.4.1 Summary of Experimental Results;773
9.11.4.2;79.4.2 The Tradeoffs Between Readability and Accuracy;777
9.11.5;79.5 Discussion;778
9.11.6;79.6 Conclusions;779
9.11.7;References;779
10;Author Index;781
11;Subject Index;784




