on COMPUTERS
Issue 6, Volume 5, June 2006
ISSN 1109-2750 http://www.wseas.orgResearches on Pairwise Key Establishment for Sensor Networks / 1111
Wang Lei
Implement M-PE Scheme with Strict Prime Number / 1118
Xie Yumin, Shi Feng, Muhammad Kamran, Yang Xiaoxu
A New Extension Method of Cubic B-spline Curves / 1124
Mo Guoliang, Zhao Yanan
A New Method for Designing Approximate Developable Surfaces / 1130
Mo Guoliang, Zhao Yanan
Deployment Method for Wireless Sensor Networks on Weighted Fields / 1136
Wei-Chei Ko, Ying-Chin Chao, Ming-Jer Tsai
A Framework for Agile Reverse Engineering / 1143
S.a Niknam, Q.P Yang, S.F. Qin
Structure Design of Data Buffer for High-Speed Exchange Devices / 1149
Wang Jie, Ji Zhen-Zhou, Hu Ming-Zeng
A Real-time One-to-Many Video Broadcasting System / 1154
Ming-Chun Cheng, Shyan-Ming Yuan
A Scalable and Flexible Management Framework for Distributed Computing System / 1162
Tsun-Yu Hsiao, Shyan-Ming Yuan
Personal Authentication Based on Feature Extraction and Optic Nerve Location in Digital Retinal Images / 1169
M. Ortega, C. Marino, M. G. Penedo, M. Blanco, F. Gonzalez
Efficient Schemes for Securing Electronic Commerce Applications in Mobile Agent Based Networks / 1177
Woei-Jiunn Tsaur, Gin-We Liu
Development of an Artificial Vision Inspection System for Real-Time Defect Detection and Classification on Circular Knitting Machines / 1186
Rocco Furferi, Lapo Governi
An Effective Constraint Handling Method in Quantum-inspired Evolutionary Algorithm for Knapsack Problems / 1194
Zhongyu Zhao, Xiyuan Peng, Yu Peng, Enzhe Yu
Convergence Rate of the Successive Zooming Genetic Algorithm Using Optimal Control Parameters / 1200
Y.-D. Kwon, H.-W. Kwon, S.-W. Cho, S.-H. Kang
Secure Group Key Distribution Protocol Based on Huffman One-way Key Chain Tree / 1208
Zhu LieHuang, Cao YuanDa, Liao LeJian, Tan Yu'an, Muhanmad Hanif Durad
An Identity-Based Scheme for Ad Hoc Network Secure Routing Protocol from Pairing / 1214
Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu
Multiple Watermark for Tamper Detection in Mammography Image / 1222
Y. I. Khamlichi, M. Machkour, K. Afdel, A. Moudden
Decision Resource Coordinate Scheduling Based on Grid Workflow / 1227
Mingsheng Hu, Jianjun Zhang, Xueguang Chen
Reverse Engineering XML Documents into DTD Graph with SAX / 1236
Herbert Shiu, Joseph Fong, Robert P. Biuk-Aghai
Adaptive Potential Field Data Processing in Spatial Domain / 1242
Wanwu Guo
New Test Methods for Scanner Point Spread Function Evaluation / 1248
Longjiang Yu, Shenghe Sun
A Novel Evidential Trust Evaluation Algorithm / 1254
Muhammad Hanif Durad, Yuanda Cao, Zhu Liehuang
H-Vet: a hybrid telediagnosis system in aquaculture / 1262
Daoliang Li, Wei Zhu, Zetian Fu
Taboo Niche Optimization Based on Intelligent Engineering and Its Application in Water Ecology / 1268
Wang Jing, Zhao Changhong, Yuan Jiahai, Hu Zhaoguang
Web Image Automatic Classification Based on Fuzzy Pattern Recognition and Complexion Model / 1274
Yi Xie, Xun Wang
An Approach to Solve Computer Attacks Based on Hybrid Model / 1280
Surat Srinoy, Witcha Chimphlee, Siriporn Chimphlee, Yoothapoom Poopaibool
Using Asynchronous Messaging for Agent-Based Development / 1285
Paulo Sousa
An XML Index using Prime Number Coordinate for Efficient Query Processing / 1293
Xiaofan Hong, Jeonghoon Han, Tackgon Kim, Woosaeng Kim
Study of Video Watermarking for MPEG2 video / 1299
Yuk Ying Chung, Fang Fei Xu, Xiaoming Chen, Changseok Bae
An Investigate of Cost Optimization and Performance Constraints for Failure Mode Identification / 1307
Yi Sun, Jianrong Tan, Yalang Mao, Ming Lou
Access Control for Hierarchical Joint-Tenancy / 1313
Jonathan Keirre Adams, Basheer N. Bristow
Research on Automatic Detecting Technology of Razor’s Assembling Quality Based on the Machine Vision System / 1319
Zhongfei Wang, Shiming Ji, Li Zhang, Yanghui Huan, Guang Yang
Human Motion Modeling and Simulation by Anatomical Approach / 1325
J. Kang, B. Badi, Y. Zhao, D. K. Wright
Universal Attraction Force-Inspired Freeform Surface Modeling for 3D Sketching / 1333
Sheng Feng Qin, David Wright
Illustrative Implementations to Show How Logarithm Based High Dimensional Model RepresentationWorks for Various Function Structures / 1339
Metin Demiralp
IAs Based Rule Mining Approach for Satellite-Derived Land-Cover Classification / 1345
Ta-Cheng Chen, Chao-Yuan Chen
A Comment based Software Design Support Method with Cases / 1354
Tetsuya Yoshida
Augmentation of a Term/Document Matrix with Part-of-Speech Tags to Improve Accuracy of Latent Semantic Analysis / 1361
Tom Rishel, A. Louise Perkins, Sumanth Yenduri, Farnaz Zand, S. S. Iyengar
Protection of MPEG-2 Video Headers using a MD5 Hash Technique / 1367
Yuk Ying Chung, Xiang Zhang, Xiaoming Chen, Changseok Bae
Shield Privacy: A conceptual framework for Information Privacy and Data Access Controls / 1375
Geoff Skinner, Song Han, Elizabeth Chang
Study on Product Collaborative Design System Based on TeamCenter / 1383
Duan Guolin, Zhou Liang
Healthcare Data Analysis using Data Mining Algorithms / 1389
Jiangbo Liu, Yufen Huang