Sciweavers

KES
2005
Springer
13 years 10 months ago
Optimal Remediation Design in Groundwater Systems by Intelligent Techniques
Abstract. This research develops an optimal planning model for pump-treatinject based groundwater remediation systems. Optimizing the design of the pump-treat-inject system is a no...
Hone-Jay Chu, Chin-Tsai Hsiao, Liang-Cheng Chang
KES
2005
Springer
13 years 10 months ago
Fast Video Retrieval via the Statistics of Motion Within the Regions-of-Interest
Abstract. It is a very important issue to quickly retrieve semantic information from a vast multimedia database. In this paper, we propose a statistic-based algorithm to retrieve t...
Jing-Fung Chen, Hong-Yuan Mark Liao, Chia-Wen Lin
KES
2005
Springer
13 years 10 months ago
A Robust Approach for Improving Computational Efficiency of Order-Picking Problems
The new market forces have affected the operation of distribution centers (DCs) extremely. The DCs demand an increased productivity and a low cost in their daily operation. This pa...
Yu-Min Chiang, Shih-Hsin Chen, Kuo-Chang Wu
KES
2005
Springer
13 years 10 months ago
An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing
Cancelable biometrics has been proposed for canceling and re-issuing biometric templates and for protecting privacy in biometrics systems. Recently, new cancelable biometric approa...
King Hong Cheung, Adams Wai-Kin Kong, David Zhang,...
KES
2005
Springer
13 years 10 months ago
Parameter Space Exploration of Agent-Based Models
When developping multi-agent systems (MAS) or models in the context of agent-based simulation (ABS), the tuning of the model constitutes a crucial step of the design process. Indee...
Benoît Calvez, Guillaume Hutzler
KES
2005
Springer
13 years 10 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
KES
2005
Springer
13 years 10 months ago
Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers
Abstract. In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the exp...
Pascal Bouvry, Gilbert Klein, Franciszek Seredynsk...
KES
2005
Springer
13 years 10 months ago
Extraction of Lexico-Syntactic Information and Acquisition of Causality Schemas for Text Annotation
We present the INSYSE method for the annotation of texts, based on extraction of semantic relations from syntactic structures. We is method to a corpus of 5000 Medline abstracts ab...
Laurent Alamarguy, Rose Dieng-Kuntz, Catherine Far...
KES
2005
Springer
13 years 10 months ago
Paraconsistent Artificial Neural Network: An Application in Cephalometric Analysis
Jair Minoro Abe, Neli Regina Siqueira Ortega, Maur...