The Community for Technology Leaders
Computer and Information Science, ACIS International Conference on (2007)
Melbourne, Australia
July 11, 2007 to July 13, 2007
ISBN: 0-7695-2841-4
TABLE OF CONTENTS
Introduction
Keynote Address
Session 1A: Computer Science and Information Science

2D Barcode and Augmented Reality Supported English Learning System (Abstract)

Tsung-Yu Liu , National Taipei University of Technology, Taiwan
Yu-Ling Chu , Taipei Municipal Chengyuan High School, Taiwan
Tan-Hsu Tan , National Taipei University of Technology, Taiwan
pp. 5-10

Answering English Queries in Automatically Transcribed Arabic Speech (Abstract)

S. M. M. Tahaghoghi , RMIT University, Australia
Falk Scholer , RMIT University, Australia
Abdusalam F. A. Nwesri , RMIT University, Australia
pp. 11-16

User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? (Abstract)

Luke Bellamy , Deakin University, Australia
Damien Hutchinson , Deakin University, Australia
Jason Wells , Deakin University, Australia
pp. 29-36
Session 1B: Computer Architecture and VLSI

An Integrated Technique for Video Watermarking (Abstract)

Bo-Zhi Yang , National Chiai University, Taiwan
Chien-Chuan Ko , National Chiai University, Taiwan
pp. 37-42

Chip Design of LPC-cepstrum for Speech Recognition (Abstract)

Zhen-Wei Zhu , National Chi Nan University, Taiwan
Gin-Der Wu , National Chi Nan University, Taiwan
pp. 43-47

Combining Local and Global History Hashing in Perceptron Branch Prediction (Abstract)

Anthony S. S. Fong , City University of Hong Kong, Hong Kong
C. Y. Ho , City University of Hong Kong, Hong Kong
pp. 54-59
Session 1C: Web Engineering and Applications

A Domain Identification Algorithm for Personalised Query Expansion with Contextual Information (Abstract)

S. A. Shahrestani , University of Western Sydney, Australia
I. Seher , University of Western Sydney, Australia
A. Ginige , University of Western Sydney, Australia
pp. 67-72

Service Oriented Architecture for Legal Web Portal (Abstract)

Joarder Kamruzzman , Monash University, Australia
Kenneth Patrick Payne , Monash University, Australia
pp. 81-86

Towards A Two-Layered Framework for Managing Web Services Interaction (Abstract)

Quan Z. Sheng , The University of Adelaide, Australia
Zakaria Maamar , Zayed University, U.A.E.
Djamal Benslimane , LIRIS, France
pp. 87-92

Towards Agent Based Web Service (Abstract)

Hongen Lu , La Trobe University, Australia
Manish Chhabra , La Trobe University, Australia
pp. 93-99
Session 2A: Image Processing and Pattern Recognition I

A Comparison of Relevance Feedback Strategies in CBIR (Abstract)

Sid Ray , Monash University, Australia
Gita Das , Monash University, Australia
pp. 100-105

A fully Automated CAD system using Multi-category Feature Selection with Restricted Recombination (Abstract)

Subhasis Mukherjee , University of Ballarat, Australia
John Yearwood , University of Ballarat, Australia
Moumita Ghosh , University of Ballarat, Australia
Ranadhir Ghosh , University of Ballarat, Australia
pp. 106-111

A Kernel-Based Method for Semi-Supervised Learning (Abstract)

Andrew Skabar , La Trobe University, Australia
Narendra Juneja , La Trobe University, Australia
pp. 112-117

A Modified K-means Algorithm for Noise Reduction in Optical Motion Capture Data (Abstract)

Jan Carlo Barca , Monash University, Australia
Grace Rumantir , Monash University, Australia
pp. 118-122

A Novel Adaptive-Boost-Based Strategy for Combining Classifiers Using Diversity Concept (Abstract)

Kushan Ahmadian , Iran University of Science and Technology, Iran
Ali Amiri , Islamic Azad University; Iran University of Science and Technology, Iran
MohammadReza JahedMotlagh , Iran University of Science and Technology, Iran
Abbas Golestani , Islamic Azad University; Iran University of Science and Technology, Iran
pp. 128-134
Session 2B: Mobile/Wireless Computing I

A Conflict Resolution Method in Context-Aware Computing (Abstract)

Min Xi , Xi'an Jiaotong University, China
Yong Qi , Xi'an Jiaotong University, China
Jizhong Zhao , Xi'an Jiaotong University, China
Saiyu Qi , Xi'an Jiaotong University, China
pp. 135-140

A Critique of Mobility Models for Wireless Network Simulation (Abstract)

Chris McDonald , The University of Western Australia, Australia
Babak Pazand , The University of Western Australia, Australia
pp. 141-146

A Fuzzy Adaptive Soft Handover Scheme Supporting Four Active Sets (Abstract)

Bin Qiu , Monash University, Australia
Iqbal Gondal , Monash University, Australia
Laurence S. Dooley , Monash University, Australia
Kemeng Yang , Monash University, Australia
pp. 147-152

A Secure Routing Protocol for Mobile Ad hoc Networks (Abstract)

Shi Shudong , University of Sci. & Tec., China; Hubei Normal University, China
Li Zhitang , Huazhong University of Sci. & Tec., China
pp. 153-157

Applying Concurrent Versioning to Serverless Mobile Device Synchronisation (Abstract)

Henry Larkin , University of New South Wales, Australia
pp. 157-162

Voice over Internet Protocol on Mobile Devices (Abstract)

Alex Talevski , Curtin University, Australia
Guo Fang Mao , Curtin University, Australia
Elizabeth Chang , Curtin University, Australia
pp. 163-169
Session 2C: Computer, Software Engineering and Information Engineering I

Cognitive Process during Incremental Software Development (Abstract)

Shaochun Xu , Laurentian University, Canada
Zendi Cui , Dalian University, China
Yufeng Gui , Wuhan University of Technology, China
pp. 176-181

Architectural View in Software Development Life-Cycle Practices (Abstract)

Roger Lee , Central Michigan University, USA
Jinalben Patel , Central Michigan University, USA
Haeng-Kon Kim , Catholic University of Daegu, Korea
pp. 194-199

Frameworks of Integration Repository for Software Process Improvement using SOA (Abstract)

Haeng-Kon Kim , Catholic University of Daegu, Korea
Eun-Ju Park , Catholic University of Daegu, Korea
Roger Y. Lee , Central Michigan University, USA
pp. 200-206
Session 3A: Image Processing and Pattern Recognition II

Adaptive Watermarking Algorithm Using SVR in Wavelet Domain (Abstract)

Jun Li , Xihua University, China; Jiamusi University, China
Hong Peng , Xihua University, China
Zheng Pei , Xihua University, China
pp. 207-211

Bezier Curve-Based Character Descriptor Considering Shape Information (Abstract)

Laurence S. Dooley , Monash University, Australia
Gour C. Karmakar , Monash University, Australia
Ferdous Ahmed Sohel , Monash University, Australia
pp. 212-216

The GVF Snake with a Minimal Path Approach (Abstract)

Kin-Man Lam , The Hong Kong Polytechnic University, Hong Kong
Chensheng Sun , The Hong Kong Polytechnic University, Hong Kong
pp. 223-228

Fast Scene Change Detection Based Histogram (Abstract)

Joydip Saha , Bangladesh University of Engineering and Technology, Bangladesh
Rezwanur Rahman , Bangladesh University of Engineering and Technology, Bangladesh
S. M. Raiyan Kabir , United International University, Bangladesh
Morshed U. Chowdhury , Deakin University, Australia
pp. 229-233

Fingerprint Recognition System Using Hybrid Matching Techniques (Abstract)

Howida Youssry Nafaa , Helwan University, Egypt
Aliaa A.A. Youssif , Helwan University, Egypt
Sid Ray , Monash University, Australia
Morshed U. Chowdhury , Deakin University, Australia
pp. 234-240
Session 3B: Mobile/Wireless Computing II

Defining Functional Requirements for a Lightweight GNSS Support Protocol (LGSP) (Abstract)

Mike Tyson , Monash University, Australia
Carlo Kopp , Monash University, Australia
pp. 241-246

Design of Multi-signature Scheme in Wireless Networks (Abstract)

Yuemei Hu , Soochow University, China
Ping Han , Soochow University, China
Yanqin Zhu , Soochow University, China
pp. 247-251

Development of Multimodal Ubiquitous System: A pilot study (Abstract)

David Kang , Victoria University, Australia
Wei Dai , Victoria University, Australia
pp. 252-256

Effects of Varying Superframe Duration on Jitter in Interactive Multimedia Traffic Transmission over WLANs (Abstract)

Suhaimi Bin Abd Latif , Massey University, New Zealand
F. Alam , Massey University, New Zealand
M. A. Rashid , Massey University, New Zealand
pp. 257-260

Pheromone Communication Simulation for Mobile Robots Using Java 3D (Abstract)

Anies Hannawati Purnamadjaja , Monash University, Australia
R. Andrew Russell , Monash University, Australia
Johan Iskandar , Monash University, Australia
pp. 261-266

Cell Phone System for Tour & Information Guide (Abstract)

Naohiro Ishii , Aichi Institute of Technology, Japan
Nariaki Kato , Aichi Institute of Technology, Japan
pp. 267-273
Session 3C: Computer, Software Engineering, and Information Engineering II

Software Development for B92 Quantum Key Distribution Communication Protocol (Abstract)

Sajal Palit , University of Canberra, Australia
Bala Balachandran , University of Canberra, Australia
Shirantha Wijesekera , University of Canberra, Australia
pp. 274-278

Towards Aspect Oriented Web Service Composition with UML (Abstract)

Yang Xu , Wuhan University, China
Shengqun Tang , Wuhan University, China
Youwei Xu , Wuhan University, China
Zukai Tang , Wuhan University, China
pp. 279-284

XPL, a Presentation Language based on User Interface Design Pattern (Abstract)

Nunzio Ingraffia , Engineering Ingegneria Informatica S.p.A, Italy
Giuseppe Vella , Engineering Ingegneria Informatica S.p.A, Italy
Marilia Liotta , University of Palermo, Italy
Antonella Santangelo , University of Palermo, Italy
Antonio Gentile , University of Palermo, Italy
pp. 285-290

A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration (Abstract)

Alauddin Ahmed , Independent University, Bangladesh
Morshed U. Chowdhury , Deakin University, Australia
Atiqur Rahman , Independent University, Bangladesh
Mohammed Anwer , Independent University, Bangladesh
Nazmul Haque , Softvision Systems Pty Ltd, Australia
pp. 291-295

Reliability Analysis of Component Software Based on Stochastic Petri Nets (Abstract)

Yanchen Li , China University of Petroleum, China
Lianzhang Zhu , China University of Petroleum, China
pp. 296-301

Evaluating the Usefulness of Pair Programming in a Classroom Setting (Abstract)

Roger Lee , Central Michigan University, USA
Theodore Van Toll III , Central Michigan University, USA
Tom Ahlswede , Central Michigan University, USA
pp. 302-308
Session 4A: Image Processing and Pattern Recognition III

Fuzzy Model Based Recognition of Handwritten Hindi Numerals using Bacterial Foraging (Abstract)

A. C. Mishra , Netaji Subhas Institute of Technology, India
A. V. Nath , Netaji Subhas Institute of Technology, India
V. K. Madasu , Queensland University of Technology, Australia
M. Hanmandlu , Indian Institute of Technology, India
pp. 309-314

Image Watermarking Using Structure Based Wavelet Tree Quantization (Abstract)

Pang-Hsuan Huang , National Chi Nan University, Taiwan
Gin-Der Wu , National Chi Nan University, Taiwan
pp. 315-319

Improved Background Removal through Polarisation in Vision-Based Tabletop Interface (Abstract)

Ross Eldridge , RMIT University, Australia
Peter H. Wilson , RMIT University, Australia
Jonathan Duckworth , RMIT University, Australia
Heiko Rudolph , RMIT University, Australia
pp. 326-331

Real-time Linear Projection Speed Sign Detection System in Low Light Conditions (Abstract)

John Devlin , Latrobe University, Australia
Tam P. Cao , Latrobe University, Australia
Darrell M. Elton , Latrobe University, Australia
pp. 332-338

Slice and Blockwise Well-Composed Sets (Abstract)

Luke Domanski , University of Western Sydney, Australia
pp. 339-345
Session 4B: Mobile/Wireless Computing III

Hybrid Group Key Management Scheme for Secure Wireless Multicast (Abstract)

Phu Dung Le , Monash University, Australia
Balasubramaniam Srinivasan , Monash University, Australia
Yiling Wang , Monash University, Australia
pp. 346-351

Network Lifetime of Application-Specific Randomly Deployed Wireless Sensor Networks in Arbitrary Sensor Density (Abstract)

Guangyan Huang , Chinese Academy of Sciences, China
Jing He , Victoria University, Australia; Chinese Academy of Sciences, China
Yanchun Zhang , Victoria University, Australia
Yong Shi , Chinese Academy of Sciences, China
pp. 352-357

Performance Analysis of OFDM Systems with Phase Noise (Abstract)

M. Delowar Hossain , Islamic University, Bangladesh
M. Mahbubur Rahman , Islamic University, Bangladesh
A. B. M. Shawkat Ali , Central Queensland University, Australia
pp. 358-362

RFID-based Hospital Real-time Patient Management System (Abstract)

Rajiv Khosla , La Trobe University, Australia
Belal Chowdhury , La Trobe University, Australia
pp. 363-368

Taxonomy and Survey of Location Management Systems (Abstract)

Michael Hobbs , Deakin University, Australia
Jemal Abawajy , Deakin University, Australia
Ahadur Rahaman , Deakin University, Australia
pp. 369-374

Tokenisation of Class Files for an Embedded Java Processor (Abstract)

Greg Knowles , Flinders University, Australia
Shawn Haggett , Flinders University, Australia
Graham Bignell , Flinders University, Australia
pp. 375-381
Session 4C: Knowledge Discovery, Artificial Intelligence, Neural Networks, and Genetic Algorithms I

A Combined MA-GA Approach for Solving Constrained Optimization Problems (Abstract)

David Cornforth , University of New South Wales, Australia
Ruhul Sarker , Member, IEEE; University of New South Wales, Australia
Abu Saleh Shah Muhammad Barkat Ullah , Student Member, IEEE; University of New South Wales, Australia
pp. 382-387

A Genetic Robot Path Planner with Fuzzy Logic Adaptation (Abstract)

Mahmoud Tarokh , San Diego State University, USA
pp. 388-393

A Hybrid Method for Solving Traveling Salesman Problem (Abstract)

M. R. Meybodi , Amirkabir University, Iran
Bager Zarei , Islamic Azad University, Iran
Mortaza Abbaszadeh , Islamic Azad University, Iran
pp. 394-399

A Hybrid Simulated Annealing with Kempe Chain Neighborhood for the University Timetabling Problem (Abstract)

Mauritsius Tuga , The University of Newcastle, Australia
Regina Berretta , The University of Newcastle, Australia
Alexandre Mendes , The University of Newcastle, Australia
pp. 400-405

A Neuro-Fuzzy Model for Motion Cognition (Abstract)

Ehab ElGindy , Helwan University, Egypt
Mohamed Belal , Helwan University, Egypt
Mohamed Shaarawy , Helwan University, Egypt
pp. 406-411

A Procedural Approach to Forecasting Nocturnal Air Temperature for Frost Prediction (Abstract)

Megan Woods , Monash University, Australia
Iqbal Gondal , Monash University, Australia
pp. 412-418
Session 5A: Image, Acoustic, Speech, and Signal Processing I

Acoustic Features Extraction for Emotion Recognition (Abstract)

Gang Li , Deakin University, Australia
Jia Rong , Deakin University, Australia
Yi-Ping Phoebe Chen , Deakin University, Australia
Morshed Chowdhury , Deakin University, Australia
pp. 419-424

Statistical Analysis of Impulse Noise Model for Color Image Restoration (Abstract)

Mieng Quoc Phu , Monash University, Australia
Peter Eric Tischer , Monash University, Australia
Hon Ren Wu , RMIT, Australia
pp. 425-431

2D Barcodes as Watermarks in Image Authentication (Abstract)

Prashan Premaratne , University of Wollongong, Australia
Farzad Safaei , University of Wollongong, Australia
pp. 432-437

Accent Classification Using Support Vector Machines (Abstract)

Joachim Diederich , The University of Queensland, Australia; American University of Sharjah, U.A.E.
Carol Pedersen , The University of Queensland, Australia
pp. 444-449

One-Dimensional Grey Polynomial Interpolators for Image Enlargement (Abstract)

Ting-Yu Feng , Chaoyang University of Technology, Taiwan
Ren-Hsien Huang , Chaoyang University of Technology, Taiwan
Cheng-Hsiung Hsieh , Chaoyang University of Technology, Taiwan
pp. 450-456
Session 5B: Intelligent Agent Technology, Agent Based Systems

A Fuzzy-Based Approach for Partner Selection in Multi-Agent Systems (Abstract)

Quan Bai , University of Wollongong, Australia
Fenghui Ren , University of Wollongong, Australia
Minjie Zhang , University of Wollongong, Australia
pp. 457-462

An Empirical Study of Knowledge Representation and Learning within Conceptual Spaces for Intelligent Agents (Abstract)

Ickjai Lee , James Cook University, Australia
Bayani Portier , James Cook University, Australia
pp. 463-468

Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited Visibility (Abstract)

Paola Flocchini , University of Ottawa, Canada
Amiya Nayak , University of Ottawa, Canada
Arno Schulz , University of Ottawa, Canada
pp. 469-474

Learning in Market-based Resource Allocation (Abstract)

Eduardo Rodrigues Gomes , Swinburne University of Technology, Australia
Ryszard Kowalczyk , Swinburne University of Technology, Australia
pp. 475-482

Policy based Ontology Framework for Mobile Agents (Abstract)

Arshad Ali , NUST Institute of Information Technology, Pakistan
H. Farooq Ahmad , Communication Technologies, Sendai, Japan
Hiroki Suguri , Communication Technologies, Sendai, Japan
Sarmad Sadik , NUST Institute of Information Technology, Pakistan
pp. 483-488

Routing with Load Balancing in Ad Hoc Network: A Mobile Agent Approach (Abstract)

V. K. Bhat , SM VD University, India
R. B. Patel , M.M. Engineering College, Mullana
Neeraj Nehra , SM VD University, India
pp. 489-495
Session 5C: Knowledge Discovery, Artificial Intelligence, Neural Networks, and Genetic Algorithms II

Ambient Cardiac Expert: A Cardiac Patient Monitoring System using Genetic and Clinical Knowledge Fusion (Abstract)

Shoaib Sehgal , Monash University, Australia
Joarder Kamruzzaman , Monash University, Australia
Iqbal Gondal , Monash University, Australia
Mudasser Iqbal , Monash University, Australia
pp. 496-501

An Attribute Reduction Method Based on Rough Set and SVM and with Application in Oil-Gas Prediction (Abstract)

Ru Nie , China University of Mining and Technology, China
Jianhua Yue , China University of Mining and Technology, China
pp. 502-506

Finding Motifs in miRNA Sequences (Abstract)

Jiyuan An , Deakin University, Australia
Chinnu Subramaniam , Deakin University, Australia
Jayavardhana Gubbi , The University of Melbourne, Australia
Yi-Ping Phoebe Chen , Deakin University, Australia
pp. 507-512

Higher Order Voronoi Diagrams for Concept Boundaries and Tessellations (Abstract)

Ickjai Lee , James Cook University, Australia
Kyungmi Lee , Charles Stuart University, Australia
pp. 513-518

Hybrid Genetic Algorithm for Solving Job-Shop Scheduling Problem (Abstract)

David Cornforth , University of New South Wales, Australia
Ruhul Sarker , Member, IEEE; University of New South Wales, Australia
S. M. Kamrul Hasan , Student Member, IEEE; University of New South Wales, Australia
pp. 519-524

Learning Structure of a Gene Regulatory Network (Abstract)

Ramesh Ram , Monash University, Australia
Madhu Chetty , Monash University, Australia
pp. 525-531
Session 6A: Data Mining, Data Warehousing, and Database

A Novel Classifier Selection Approach for Adaptive Boosting Algorithms (Abstract)

A. B. M Shawkat Ali , Central Queensland University, Australia
Tony Dobele , Central Queensland University, Australia
pp. 532-536

Hybrid Multi-Feature Indexing for Music Data Retrieval (Abstract)

Yu-lung Lo , Chaoyang University of Technology, Taiwan
Chun-hsiung Wang , Chaoyang University of Technology, Taiwan
pp. 543-548

Obtain Weather Data with Data Warehousing (Abstract)

P. Khosraviyan Dehkordi , Islamic Azad University, Iran
Z. Davari Nejad , Islamic Azad University, Iran
M. H. Peyravi , Islamic Azad University, Iran
pp. 549-554

ORN Additive: Shrinking the Gap between Database Modeling and Implementation (Abstract)

Bryon K. Ehlmann , Southern Illinois University Edwardsville, USA
pp. 555-560

Service-mining Based on the Knowledge and Customer Databases (Abstract)

Chunqiang Gong , Wuhan University of Technology, China
Yan Li , The University of Southern Queensland, Australia
Hu Wang , Wuhan University of Technology, China
pp. 561-568
Session 6B: Communication Systems, Networks, and Wireless Networks I

A New Cooperative Communication MAC Strategy for Wireless Ad Hoc Networks (Abstract)

Ji Hong , Beijing University of Posts and Telecommunications, China
Li Yi , Beijing University of Posts and Telecommunications, China
pp. 569-574

An Efficient Node Partitioning Algorithm for the Capacitated Minimum Spanning Tree Problem (Abstract)

Jun Han , Beihang University, China
Jinpeng Huai , Beihang University, China
Zhaohao Sun , University of Wollongong, Australia
Xian Li , Beihang University, China
pp. 575-580

Integrated Sensing and Diagnosis -- The next step in Real Time Patient Health Care (Abstract)

Mudasser Iqbal , Monash University, Australia
Shoaib Sehgal , Monash University, Australia
Megan Woods , Monash University, Australia
Iqbal Gondal , Monash University, Australia
pp. 581-586

Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms (Abstract)

M. Esmaeili , Shahid Beheshti University, Iran
V. R. Mousavi , Sharif University of Technology, Iran
A. Saremi , Sharif University of Technology, Iran
A. T. Haghighat , Shahid Beheshti University, Iran
pp. 587-591

Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding (Abstract)

Zhongwen Li , Xiamen University, China
Shui Yu , Deakin University, Australia
pp. 592-597

Optimization of QoS Routing (Abstract)

Melanie Grah , RMIT University, Australia
Himanshu Agrawal , RMIT University, Australia
Mark Gregory , RMIT University, Australia; MIEEE
pp. 598-603
Session 6C: Parallel and Distributed Computing and Systems

A Study on Data Placement of Extensible Parallel Storage System (Abstract)

Depei Qian , Xi'an Jiaotong University, China
Hu Zhang , Xi'an Jiaotong University, China
Luogeng Dai , Xi'an Jiaotong University, China
Weiguo Wu , Xi'an Jiaotong University, China
Xiaoshe Dong , Xi'an Jiaotong University, China
pp. 610-615

Adjacency Cache: Fast Web Cache Indexing and Lookup (Abstract)

John Casey , Deakin University, Australia
Ashley Chonka , Deakin University, Australia
Wanlei Zhou , Deakin University, Australia
pp. 616-621

Improving Interactive Experience of Thin Client Computing by Reducing Data Spikes (Abstract)

Sun Yang , National University of Singapore, Singapore
Tay Teng Tiow , National University of Singapore, Singapore
pp. 627-632
Session 7A: Middleware Architectures and Techniques I

A Novel Differentiated Service Hybrid Signaling Protocol for Optical Burst Switching Networks (Abstract)

Zhiqing Zhang , Xidian University, China
Aijun Wen , Xidian University, China
Zengji Liu , Xidian University, China
Yantao Guo , Xidian University, China; The 54th Research Institute of CETC, China
pp. 640-645

A Smart Proxy for a Next Generation Web Services Transaction (Abstract)

Arkady Zaslavsky , Monash University, Australia
Sunam Pradhan , University of Ballarat, Australia; Monash University, Australia
pp. 646-651

An Edge Extraction Method for Color Image Using Multiple-Valued LoG Filter and Color Space (Abstract)

Koutaro Yamano , ASTRODESIGN, Inc., Japan
Cong-Kha Pham , The University of Electro-Communications, Japan
pp. 658-662

Evaluation of Authentication Mechanisms for Mobile Agents on top of Java (Abstract)

Leila Ismail , United Arab Emirates University, UAE
pp. 663-668

Intelligent Adaptive Services for On-demand Systems Integration (Abstract)

Jonathan Liu , Victoria University, Australia
Wei Dai , Victoria University, Australia
pp. 669-675
Session 7B: Communication Systems, Networks, and Wireless Networks II

Rerouting Technique for Faster Restoration of Preempted Calls (Abstract)

Daryoush Habibi , Edith Cowan University, Australia
Joarder Kamruzzaman , Monash University, Australia
Iftekhar Ahmad , Edith Cowan University, Australia
pp. 676-681

Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs) (Abstract)

Aliaa A. A. Youssif , Helwan University, Egypt
Atef Z. Ghalwash , Helwan University, Egypt
Sherif M. Hashad , Helwan University, Egypt
Robin Doss , Deakin University, Australia
pp. 682-687

The Virtual Topology Reconfiguration Controller for WDM Networks (Abstract)

Seungyeon You , Sogang University, Korea
Sungchun Kim , Sogang University, Korea
pp. 688-693

Towards Multicast Delay Analysis for Ad hoc Wireless Networks (Abstract)

K. Sithitavorn , Monash University, Australia
C. Wilson , Monash University, Australia
B. Qiu , Monash University, Australia
pp. 694-699

A Comparative Study on the Performance of Wireless Sensor Networks (Abstract)

Lin Zou , University of Southern Queensland, Australia
Zhongwei Zhang , University of Southern Queensland, Australia
pp. 700-705
Session 7C: Information Management Systems, Economic and Financial Systems, Control and Intelligent Systems

Managing Unstructured and Semi-Structured Information in Organisations (Abstract)

Ashley M. Aitken , Curtin University of Technology, Australia
pp. 712-717

Performance Modeling of Business Processes Enabled by RFID and Web Services (Abstract)

Vittal Prabhu , The Pennsylvania State University, USA
Chen-Yang Cheng , The Pennsylvania State University, USA
pp. 718-723

Structural Equation Modelling of Large-scale Information System Application Development Productivity: the Hong Kong Experience (Abstract)

M. Quaddus , Curtin University of Technology, Australia
L. R. Foulds , University of Waikato, New Zealand
M. West , Curtin University of Technology, Australia
pp. 724-731

Portfolio Management of Option-Based Investment in Technology Research and Development (Abstract)

Daricha Sutivong , Chulalongkorn University, Thailand
Jirawute Choungsirakulwit , Chulalongkorn University, Thailand
pp. 732-737

Nanorobots for Laparoscopic Cancer Surgery (Abstract)

Julian A. Smith , Monash Medical Centre, Australia
Bijan Shirinzadeh , Monash University, Australia
Adriano Cavalcanti , Monash University, Australia; CAN Center for Automation in Nanobiotech, Brazil
Declan Murphy , Guy's Hospital, London, UK
pp. 738-743

Robust-Optimal Control of a Nonlinear Two Degree-of-Freedom Helicopter (Abstract)

Gwo-Ruey Yu , National Ilan University, Taiwan
pp. 744-749

Encoding and Decoding Techniques for Medical Video Signal Transmission and Viewing (Abstract)

Golam Sorwar , Southern Cross University, Australia
Manoranjan Paul , Southern Cross University, Australia
pp. 750-756
Session 8A: Internet Technology and Applications, e-Commerce

Dynamic Feature Selection for Spam Filtering Using Support Vector Machine (Abstract)

M. Rafiqul Islam , Deakin University, Australia
Wanlei Zhou , Deakin University, Australia
Morshed U. Choudhury , Deakin University, Australia
pp. 757-762

Improvement of the Recall and the Precision for Semantic Web Services Search (Abstract)

SeungHoon Yang , Seoul National University, Korea
Daewook Lee , Seoul National University, Korea
Joonho Kwon , Seoul National University, Korea
Sukho Lee , Seoul National University, Korea
pp. 763-768

Internet Communities and Open innovation: an Information System Design Methodology (Abstract)

Roula Michaelides , The University of Liverpool, UK
Dennis Kehoe , The University of Liverpool, UK
pp. 769-775

A Multilevel Trust Management Framework (Abstract)

Jemal H. Abawajy , Deakin University, Australia
Soon-Keow Chong , Deakin University, Australia
Robert A. Dew , Deakin University, Australia
pp. 776-781

SEFAP: An Email System for Anti-Phishing (Abstract)

Yi Mu , University of Wollongong, Australia
Willy Susilo , University of Wollongong, Australia
Qiong Ren , University of Wollongong, Australia
pp. 782-787

A Matrix Algorithm forWeb Cache Pre-fetching (Abstract)

Hua Chen , Trent University, Canada
Wenying Feng , Trent University, Canada
pp. 788-794
Session 8B: Visual and Multimedia Computing

A Composite Descriptor for Shape Retrieval (Abstract)

Guojun Lu , Monash University, Australia
Dengsheng Zhang , Monash University, Australia
Atul Sajjanhar , Deakin University, Australia
Wanlei Zhou , Deakin University, Australia
pp. 795-800

An Efficient and Robust Technique for Region Based Shape Representation and Retrieval (Abstract)

Dengsheng Zhang , Monash University, Australia
Melissa Chen Yi Lim , Monash University, Australia
pp. 801-806

Efficient Probabilistic Spatio-Temporal Video Object Segmentation (Abstract)

Rakib Ahmed , Monash University, Australia
Gour C. Karmakar , Monash University, Australia
Laurence S. Dooley , Monash University, Australia
pp. 807-811

Model of a Semantic Web Search Engine for Multimedia Content Retrieval (Abstract)

Mohan Ponnada , Victoria University, Australia
Nalin Sharda , Victoria University, Australia
pp. 818-823

Research on Intelligent Visual Surveillance for Public Security (Abstract)

Wenxiong Kang , South China University of Technology, China
Feiqi Deng , South China University of Technology, China
pp. 824-829
Session 8C: 1st IEEE/ACIS International Workshop on e-Activity I

A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks (Abstract)

Eun Seok Jeong , Pukyong National University, Korea
Chul Sur , Pukyong National University, Korea
Kyung Hyune Rhee , Pukyong National University, Korea
pp. 830-833

An Integrated Haptic Data Transmission in Haptic Collaborative Virtual Environments (Abstract)

Kyungkoo Jun , University of Incheon, Korea
Mee Young Sung , University of Incheon, Korea
Yonghee You , University of Incheon, Korea
pp. 834-839

Analysis of relations between spoken utterances and text messages in chat-augmented meetings (Abstract)

Kazushi Nishimoto , Japan Advanced Institute of Science and Technology, Japan
Tomoya Kobayashi , Japan Advanced Institute of Science and Technology, Japan
pp. 840-843

Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing (Abstract)

Jizhong Zhao , Xi'an Jiaotong University, China
Min Xi , Xi'an Jiaotong University, China
Yong Qi , Xi'an Jiaotong University, China
pp. 844-849

A Campus Information Processing based on Educational Resources Reuse and Integration (Abstract)

Tokuro Matsuo , Yamagata University, Japan
Takayuki Fujimoto , Sonoda Women's University, Japan
pp. 850-855

Collaborative Education Model and Its Application in E-learning (Abstract)

Zeyu Chen , Shanghai Jiao Tong University, China
Ruimin Shen , Shanghai Jiao Tong University, China
Gang Chen , Shanghai Jiao Tong University, China
Jiajun Wang , Shanghai Jiao Tong University, China
pp. 856-860
Session 9A: Software Architectures and Frameworks, Software Reuse and Software Testing

Dynamic Reconfiguration Planning with Influence Control (Abstract)

Zhikun Zhao , Central Queensland University, Australia
Wei Li , Central Queensland University, Australia
pp. 867-872

Collaborative File Editor Using Repository in a Box (Abstract)

Ivan Milenkovic , Central Michigan University, USA
Gongzhu Hu , Central Michigan University, USA
pp. 879-884

A new approach to detecting memory access errors in C programs (Abstract)

Hyeon Soo Kim , Chungnam Nat'l Univ., Korea
Seunguk Oh , KAIST, Korea
Dae Wan Cho , Chungnam Nat'l Univ., Korea
pp. 885-890

Model-Based Software Component Testing: A UML-Based Approach (Abstract)

Gary Bundell , University of Western Australia, Australia
Weiqun Zheng , University of Western Australia, Australia
pp. 891-899
Session 9B: Parallel and Distributed Computing, Visual and Multimedia Computing

Split Private and Shared L2 Cache Architecture for Snooping-based CMP (Abstract)

Shaowen Qin , Flinders University, Australia
Xuemei Zhao , Flinders University, Australia
Karl Sammut , Flinders University, Australia
Fangpo He , Flinders University, Australia
pp. 900-905

Trust Realisation in Multi-domain Collaborative Environments (Abstract)

Oluwafemi Ajayi , University of Glasgow, UK
Richard Sinnott , University of Glasgow, UK
Anthony Stell , University of Glasgow, UK
pp. 906-911

Investigating the Shared Visual Context in Distributed Collaborative Work (Abstract)

Dawei Jia , Deakin University, Australia
Kathy Blashki , Deakin University, Australia
Jim Eales , Middlesex University, UK
Penelope Goward , Deakin University, Australia
pp. 912-917

Reduct-Based Result Set Fusion for Relevance Feedback in CBIR (Abstract)

Samar Zutshi , Monash University, Australia
Bala Srinivasan , Monash University, Australia
Campbell Wilson , Monash University, Australia
pp. 918-923

Speech Animation Based on Chinese Mandarin Triphone Model (Abstract)

Wang Zengfu , University of Science & Technology of China, China
Zhou Wei , University of Science & Technology of China, China
pp. 924-929

Motion Control of a Dancing Character with Music (Abstract)

Hyewon Seo , Chungnam National University, South Korea
Gunwoo Kim , Chungnam National University, South Korea
Yan Wang , Chungnam National University, South Korea
pp. 930-936
Session 9C: 1st IEEE/ACIS International Workshop on e-Activity II

Conceptual Modeling of Product Information in e-Commerce (Abstract)

Junho Shim , Sookmyung Women's University, Korea
Hyunja Lee , Sookmyung Women's University, Korea
pp. 937-942

A New Cooperative Communication System in Distance Education (Abstract)

Tokuro Matsuo , Yamagata University, Japan
Takayuki Fujimoto , Sonoda Women's University, Japan
pp. 943-948

InfoXP: An E-government Information eXchange Platform Based on Overlay Network (Abstract)

Jinpeng Huai , Beijing University of Aeronautics & Astronautics, China
Xuelian Lin , Beijing University of Aeronautics & Astronautics, China
Xian Li , Beijing University of Aeronautics & Astronautics, China
Xiaoxuan Ma , Beijing University of Aeronautics & Astronautics, China
Jun Han , Beijing University of Aeronautics & Astronautics, China
Xudong Liu , Beijing University of Aeronautics & Astronautics, China
pp. 949-954

Intelligent Access Control Mechanism for Ubiquitous Applications (Abstract)

Tae-Hum Lim , Pukyong National University, Korea
Sang-Uk Shin , Pukyong National University, Korea
pp. 955-960

Long Distance Redundancy Reduction in Thin Client Computing (Abstract)

Sun Yang , National University of Singapore, Singapore
Tay Teng Tiow , National University of Singapore, Singapore
pp. 961-966

Restricted Access to Exam Grades on the Web by HIP (Abstract)

Mohammad Shirali-Shahreza , Sharif Univ. of Technology, Iran
Sajad Shirali-Shahreza , Sharif Univ. of Technology, Iran
Ali Movaghar , Sharif Univ. of Technology, Iran
pp. 967-971
Session 10A: Data Mining, Knowledge Discovery, Neural Networks and Genetic Algorithms

Spam Classification Using Adaptive Boosting Algorithm (Abstract)

Yang Xiang , Central Queensland University, Australia
A. B. M. Shawkat Ali , Central Queensland University, Australia
pp. 972-976

A Novel Genetic Algorithm Based on Image Databases for Mining Association Rules (Abstract)

Shangping Dai , Hua Zhong Normal University, China
Li Gao , Hua Zhong Normal University, China
Qiang Zhu , Zhejiang University of Media and Communication, China
Changwu Zhu , Hua Zhong Normal University, China
pp. 977-980

Using Links to Aid Web Classification (Abstract)

Musa Mammadov , University of Ballarat, Australia
John Yearwood , University of Ballarat, Australia
Wei Xie , University of Ballarat, Australia
pp. 981-986

Visual Tools for Analysing Evolution, Emergence, and Error in Data Streams (Abstract)

John Yearwood , University of Ballarat, Australia
Adil M. Bagirov , University of Ballarat, Australia
Sol Hart , University of Ballarat, Australia
pp. 987-992

Recognition of Power Quality Events by Using Multiwavelet-Based Neural Network (Abstract)

Thanatchai Kulworawanichpong , Suranaree University of Technology, Thailand
Kitti Attakitmongcol , Suranaree University of Technology, Thailand
Suriya Kaewarsa , Rajamangala University of Technology Isan, Thailand
pp. 993-998

SubSS: A Protein-Protein Interaction Detection Tool (Abstract)

Safaai Deris , Universiti Teknologi Malaysia
Nazar Zaki , UAE University, UAE
Saleh Alwahaishi , UAE University, UAE
pp. 999-1004

The Research of Social Navigation based on Fuzzy Concept Lattice (Abstract)

LiangZhong Yi , Xihua University, China
ChunZhi Xie , Xihua University, China
YaJun Du , Xihua University, China
Zheng Pei , Xihua University, China
pp. 1005-1011
Session 10B: Programming Languages, Technology Education, and Training

Control Network Programming (Abstract)

Kostadin Kratchanov , Mount Royal College, Canada
Emilia Golemanova , Rousse University, Bulgaria
Tzanko Golemanov , Rousse University, Bulgaria
pp. 1012-1018

Slicing Aided Design of Obfuscating Transforms (Abstract)

Anirban Majumdar , The University of Auckland, New Zealand
Stephen Drape , The University of Auckland, New Zealand
Clark Thomborson , The University of Auckland, New Zealand
pp. 1019-1024

A Low Cost Interactive Distance Learning Solution (Abstract)

Shakeel Ahmed Khoja , Bahria University, Pakistan
Faisal Sana , Bahria University, Pakistan
pp. 1025-1029

Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration (Abstract)

H. Yu , NC A&T State University, USA
B. Chu , University of NC at Charlotte, USA
S. Providence , NC A&T State University, USA
J. Xu , NC A&T State University, USA
X. Yuan , NC A&T State University, USA
D. Gu , Oracle Corp, USA
pp. 1030-1035

Collegiate Cyber Game Design Criteria and Participation (Abstract)

Huiming Yu , NC A&T State University, USA
Richard Kelly , University of NC at Charlotte, USA
Gail-Joon Ahn , University of NC at Charlotte, USA
Ashika Young , NC A&T State University, USA
James Deese , University of NC at Charlotte, USA
Steven Blanchard , University of NC at Charlotte, USA
Bei-Tseng Chu , University of NC at Charlotte, USA
pp. 1036-1041
Session 10C: 1st IEEE/ACIS International Workshop on e-Activity III

Software Installation on a Huge Heterogeneous Network using Mobile Agents (Abstract)

N. Siddharth , Indian Institute of Information Technology, India
Sudip Sanyal , Indian Institute of Information Technology, India
B. Srikanth , Indian Institute of Information Technology, India
D. Kirubakaran , Indian Institute of Information Technology, India
pp. 1049-1052

Using Metrics for Estimating Maintainability of Web Applications: An Empirical Study (Abstract)

Joon-Sang Lee , LG Electronics, South Korea
Woo-Sung Jung , Hanjin Heavy Industry, South Korea
Heung Seok Chae , Pusan National University, South Korea
Tae Yeon Kim , Pusan National University, South Korea
pp. 1053-1059
Session 11C: Software Metrics, Process Management, and Improvement

Bad-Smell Metrics for Aspect-Oriented Software (Abstract)

Komsan Srivisut , Chulalongkorn University, Thailand
Pornsiri Muenchaisri , Chulalongkorn University, Thailand
pp. 1060-1065

A Framework to Detect Deviations During Process Enactment (Abstract)

Sean Thompson , La Trobe University, Australia
Torab Torabi , La Trobe University, Australia
Purva Joshi , La Trobe University, Australia
pp. 1066-1073

Challenges and Solutions in Process Automation in Tertiary Education Institutes: An Australian Case Study (Abstract)

Jeewani Anupama Ginige , University of Western Sydney, Australia
Athula Ginige , University of Western Sydney, Australia
pp. 1074-1079

CAD model of Process Elements: Towards Effective Management of Process Evolution in Web-based Workflows (Abstract)

Athula Ginige , University of Western Sydney, Australia
Jeewani A. Ginige , University of Western Sydney, Australia
Uma Sirinivasan , University of Western Sydney, Australia
pp. 1080-1086
Session 11A: Speech Processing and Healthcare Engineering

New Methods for Transparent and Accurate Echo Hiding By Using the Original Audio Cepstral Content (Abstract)

M. Shahram Moin , Iran Telecom Research Center, Iran
Mehdi Parviz , Iran Telecom Research Center, Iran
Yousof Erfani , Iran Telecom Research Center, Iran
pp. 1087-1092

Voice Activity Detection Based on GM(1,1) Model (Abstract)

Ting-Yu Feng , Chaoyang University of Technology, Taiwan
Cheng-Hsiung Hsieh , Chaoyang University of Technology, Taiwan
Ren-Hsien Huang , Chaoyang University of Technology, Taiwan
pp. 1093-1098

Automated Speech Discrimination using Frequency Derivative Threshold Detection (Abstract)

Christopher J. Page , University of South Australia, Australia
Syed Mahfuzul Aziz , University of South Australia, Australia
pp. 1099-1103

Technology Management, Data management, Improved outcomes, Efficiency and Software limitation influencing the use of wireless technology for healthcare in Pakistan (Abstract)

Abdul Hafeez-Baig , University of Southern Queensland, Australia
Shelly Grist , University of Southern Queensland, Australia
Raj Gururajan , University of Southern Queensland, Australia
pp. 1104-1110
Session 11B: Middleware Architectures and Techniques, Internet Technology and Applications

Providing Reliable Web Services through Active Replication (Abstract)

Xinfeng Ye , Auckland University, New Zealand
pp. 1111-1116

Towards a Table Driven XML QoS Aware Transmission Framework (Abstract)

Alex Ng , Macquarie University, Australia
pp. 1117-1123

Two Logical Verification of Quantum NOT Gate (Abstract)

Mohammed Anwer , Independent University, Bangladesh
Morshed U. Chowdhury , Deakin University, Australia
Atiqur Rahman , Independent University, Bangladesh
Nazmul Haque , Softvision Systems Pty Ltd, Australia
Alauddin Ahmed , Independent University, Bangladesh
pp. 1124-1128

Determining the Loss of Investment Probability for Risk based Decision Support System (Abstract)

Elizabeth Chang , Curtin University of Technology, Australia
Farookh Khadeer Hussain , Curtin University of Technology, Australia
Tharam S. Dillon , Curtin University of Technology, Australia
Omar Khadeer Hussain , Curtin University of Technology, Australia
pp. 1129-1134

Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search (Abstract)

Wen-Shan Lin , National Chia-Yi University, Taiwan
Yan-Yan Chen , National Chia-Yi University, Taiwan
Ming-Fong Chen , National Chia-Yi University, Taiwan
pp. 1135-1140
Author Index

Author Index (PDF)

pp. 1141
92 ms
(Ver )