WSEAS TRANSACTIONS
on COMPUTERS

Issue 3, Volume 6, March 2007

ISSN 1109-2750 http://www.wseas.org
Developing an Effective Hierarchical Clustering Method Based on Traveling Salesman Problem Model / 385
Chieh-Yuan Tsai, Chuang-Cheng Chiu
The Development of a Credit Scoring System Based on Case-based Reasoning with Genetic Algorithm Applied / 394
Shihchieh Chou, Tachun Hsu, Tai-Ping Hsing
A “Cleanroom” Model Optimization Algorithm for Physical Database Design / 400
Adi-Cristina Mitea
An Effective Error-resilient Coding for H.264 Video / 407
Yuk Ying Chung, Leo Li Fan Chen, Zeng Zheng, Xiaoming Chen
Design of a Content Based Multimedia Retrieval System / 413
Yuk Ying Chung, Ka Yee Ng, Liwei Liu, Xiaoming Chen, Mohd Afizi Mohd Shukran, Eric H.C.Choi, David Yu Shi, Fang Chen
M-JoI: a Multiple Join Indexing Technique / 419
Adi-Cristina Mitea
Back Propagation Networks for Predicting Credit Card Fraud with Stratified Personalized Data / 425
Rong-Chang Chen, Chih-Yi Lai
Using Internet Technology to Make Students Learning Better in Video/Audio Design Course / 433
Wei-Peng Lien, Maiga Chang, Ko-Kang Chu
A Services-based Framework for the Engineering of Trustworthy Computer Systems / 441
Kassem Saleh, Aziz Al-Khaili
Automatic Assessment of Multi-language Programming Questions using AulaWeb / 449
Angel Garcia-Beltran, Santiago Tapia, Raquel Martinez, Manuel Gonzalez
LeMONT: An Ontology–based Learner Modeling System / 455
Danijela Milosevic, Mirjana Brkovic, Ramo Sendelj
Uncertainty Assessment using Neural Networks and Interval Neutrosophic Sets for Multiclass Classification Problems / 463
Pawalai Kraipeerapun, Chun Che Fung, Kok Wai Wong
A Methodology to Predict and Select Control Modes for a Trustworthy Platform / 471
Zheng Yan
Secure Platform for Digital Rights Management Distribution / 478
Ion Ivan, Cristian Toma, Marius Popa, Catalin Boja
A Micro-chip Based Design of the Two Active Monitors-interface Communication Controller in Personal Computer / 486
Shieh-Shing Lin, Cheng-Chien Kuo
A Security Architecture Model for Mobile Computing / 494
Kun Gao, Lifeng Xi, Jifang Li
A Speed Enhancement Method for Document Page Segmentation using Window and Optimum Image / 500
Wichian Premchaiswadi, Phaisarn Sutheebanjard, Nuchree Premchaiswadi
Face Recognition with Co-training and Ensemble-driven Learning / 507
Neamat El Gayar, Shaban A. Shaban, Sayed Hamdy
Computing Key-word Answer to Hypothetical Queries in the Presence of Skolem Clauses Binding / 514
A. K. Rabiah, T. M. T. Sembok, B. Z. Halimah
Broadcast Multiplexing and Subchanneling for Secure P2P Multiconferencing / 522
Jose-Vicente Aguirre, Rafael Alvarez, Julia Sanchez, Antonio Zamora
Neural Network using Genetic Algorithms (NN using GA) for Solving Systems of Linear Equations and Finding the Inversion of a Matrix / 528
Z. Ghassabi, B. Moaveni, A. Khaki-Sedigh
High Throughput, Low Power Implementations for the DES Family / 532
C. Manifavas, I. Papaefstathiou, C. Sotiriou
Sakai VRE Demonstrator Project: Realise E-Research through Virtual Research Environments / 539
Xiaobo Yang, Rob Allan
Quantitative and Qualitative Results of the National Program for E-Learning in Taiwan / 546
Maiga Chang, Chin-Yeh Wang, Gwo-Dong Chen
IOAS: An Intelligent Online Assessment System / 552
Ang Tan Fong, Hu Heng Siew, Por Lip Yee, Liew Chee Sun
Basing on Social Network Analysis to Study Business Process Reengineering / 560
Jianfeng Li, Yan Chen
Cluster-based Multicast Routing Protocol for MANET / 566
Chao-Cheng Shih, Tzay-Farn Shih
Towards Automated Creation of Clients for Grid Services Wrapping CFD Codes / 573
Dana Petcu
A Comparative Analysis of Electronic Transaction Mechanisms for Secure E-Commerce / 581
Rongjou Yang, Hann-Jang Ho, I-Ming Shieh
What Does E-Courseware Evaluation Tell: A Gap Análisis / 589
Ming-Puu Chen, Kuo-En Chang
Implementing E-Learning System using Web Services / 597
Su Moon Ting, Hoe Han Ker, Yam Kien Yew
The Challenge of Information Systems Security / 605
Seppo Sirkemaa, Eeva Ylanen
Evaluating Recommendation Service Mechanisms for Asynchronous Digital Learning Systems / 612
Hong-Ren Chen
Online Insurance Policies Recommender with Case-based Reasoning (MyINS) / 618
Siti Soraya Abdul Rahman, Azah Anir Norman, Koh Joe Soon

AVOID BOGUS TRANSACTIONS VIA INTERNET
Dear WSEAS Members
Look the following instructions that we received by email:

·  Don’t fall for promises that you’ll get a credit card even if you have bad credit. Fraudulent credit card offers often target people who are having credit problems and haven’t been able to get cards elsewhere. They may promise to get you a card, but legitimate credit card issuers generally don’t do business with people who have bad credit histories.

·  Don’t pay upfront. Legitimate credit card issuers don’t usually ask for a fee upfront. If there is an application or processing fee, it should be very small, not the hundreds of dollars that con artists request. If there is an annual fee, it appears on your first credit card statement.

·  Be cautious about emails offering to get you a credit card. They are bogus. Many unsolicited emails are fraudulent.

·  If your credit history is bad, your best bet is to get a “secured” credit card. This requires you to place a deposit in an account at the issuing bank equal to your credit limit. If you don’t pay your credit card bill, the bank will use your deposit to cover it. You may not get interest on the account, but it’s a good way to start rebuilding your credit.

·  A “gold” or “silver” card may not be what you think. Sometimes fraudulent credit card offers promise “gold” or “silver” cards from major card issuers. What you receive – if you get anything at all – is a gold or silver-colored charge card that can only be used to buy overpriced goods from the company’s own catalogue.

·  Apply for credit cards directly from the issuers. It isn’t necessary to pay another company to help you get a credit card, nor will it improve your chances of obtaining one.

·  If you have credit problems, get counseling. Fraudulent credit card companies may also claim that they can repair your bad credit for a large upfront fee. But you can correct inaccurate information in your credit files yourself for free, and no one can erase negative information that is accurate. Your local Consumer Credit Counseling Service (CCCS) can provide advice about how to build a good credit record. The CCCS may also be able to make payment plans with your creditors if you’ve fallen behind. These services are offered for free or at a very low cost. To find the nearest CCCS office, call toll-free, 888- 388-2227, or go to www.nfcc.org.


thank you the WSEAS Abuse Team