:
Tai-Hoon Kim, Laurence Tianruo Yang, Jong Hyuk Park, Alan Chin-Chen Chang, Thanos Vasilakos, Yan Zha
:
Advances in Computational Science and Engineering Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
:
Springer-Verlag
:
9783642102387
:
1
:
CHF 53.10
:
:
269
:
DRM
:
PC/MAC/eReader/Tablet
:
PDF
This volume constitutes the selected and extended papers of workshops and symposia of the International Conference, on Advances in Computational Science and Engineering, FGCN2008, held in Sanya, Hainan Island, China in December 2008. The volume contains the workshops on peer-to-peer computing for information search (P2PSearch 2008), on wireless ad hoc, mesh and sensor networks (WAMSNet-08), on sensor networks and applications (SNA 2008), on wireless communications for intelligent transportation systems (WITS-08), on network assurance (NA 2008) , on communication& network technology management 2008 (CNM 2008), on forensics for future generation communication environments (F2GC-08), as well as on silver technology for aging society (STAS2008), together with the symposia on the 3rd international symposium on smart home (SH'08), on database theory and application (DTA-08), on u- and e- service, science and technology (UNESST-08), on control and automation (CA-08) , on grid and distributed computing (GDC-08), as well as on signal processing, image processing and pattern recognition (SIP 2008).
Preface 5 Organization 7 Table of Contents 10 A Heuristic Approach for Designing Regional Language Based Raw–Text Extractor and Unicode Font–Mapping Tool 12 Introduction 12 Related Works 13 Our Work 13 Main ( ) 14 Process (Inputfolderpath, Outputfolderpath) 14 Recursivetraverse (Filepath) 15 Webpageverifier (Filepath) 15 Rawtextextractor (Webpage) 15 Fontmapper (String) 16 Search (Proprietaryfontvalue) 16 Result and Discussion 17 Complexity Analysis of the Stated Algorithm 17 Test Results 17 Conclusion 22 References 23 Aspect-Oriented Formal Specification for Real-Time Systems 24 Introduction 24 Aspect-Oriented Formal Specification 25 Case Studies 28 Aspect-Oriented Formal Specification of Multimedia Stream 28 Aspect Oriented Formal Specification of ABP 31 Integration of Informal Specification and Formal Specification by Aspect- Oriented Approach 34 Conclusion and Future Research 40 References 41 The Advanced of Fuzzy Vault Using Password 44 Introduction 44 Related work 45 Fuzzy Logic 45 Fuzzy Vault Scheme 45 Fingerprint 46 Fuzzy Vault Scheme for Fingerprint 46 Hardening Fingerprint Fuzzy Vault Using Password 47 Vulnerability Analysis of Hardening Fuzzy Vault Using Password 49 Adversarial Model 49 The Problem of K. Nandakumar's Scheme 51 The Attacks Scenario 51 Proposed Scheme 52 Conclusion 54 References 54 An Enhanced EDD QoS Scheduler for IEEE 802.11e WLAN 56 Introduction 56 Related Work 58 IEEE 802.11e HCCA Protocol 58 Reference Scheduler 59 SETT-EDD Scheduler 60 ARROW Scheduler 62 Proposed Scheduling Algorithm 63 TXOP Allocation 63 SI Allocation 64 Performance Evaluation of the Proposed Algorithm 65 Simulation Scenarios 66 Analysis of the Simulation Results 66 Conclusion 69 References 70 Recognition of Loneliness of the Elderly People in Ubiquitous Computing Environment 71 Introduction 71 Related Work 72 Scenario for the Loneliness Inference System 73 Definition of Lonely Cases 74 Case 1.1 75 Case 1.2 78 Case 2 79 Inference 81 System Architecture 81 Conclusions 82 References 83 Voronoi-assisted Parallel Bidirectional Heuristic Search 84 Introduction 84 Our Proposal 87 Performance Evaluation 88 Conclusion 94 References 94 Artificial K-Lines and Applications 96 Introduction 96 Our Proposal 97 AKL Applications 99 Application 1: Robot and Assembly Line Example 99 Application 2: Machine Learning 102 Comparison with Neural Networks 107 Conclusion 107 References 108 Spike Sorting Method Based on Two-Stage Radial Basis Function Networks 109 Introduction 109 Two-Stage Radius Basis Function Network 110 Training Stage of RBF Networks 111 Testing Stage of RBF Networks 112 Data Source 113 Obtain Raw Signals and Add White Noise 113 Spike Detection 114 Spike Sorting 114 Experiment Results 114 Conclusion 115 References 116 The Establishment of $in vitro$ Model of Primary Rat Brain Microvas