lecture notes in artificial intelligence 7345 - springer978-3-642-31087-4/1.pdflecture notes in...
TRANSCRIPT
Lecture Notes in Artificial Intelligence 7345
Subseries of Lecture Notes in Computer Science
LNAI Series Editors
Randy GoebelUniversity of Alberta, Edmonton, Canada
Yuzuru TanakaHokkaido University, Sapporo, Japan
Wolfgang WahlsterDFKI and Saarland University, Saarbrücken, Germany
LNAI Founding Series Editor
Joerg SiekmannDFKI and Saarland University, Saarbrücken, Germany
He Jiang Wei Ding Moonis AliXindong Wu (Eds.)
Advanced Researchin Applied ArtificialIntelligence
25th International Conferenceon Industrial Engineering and OtherApplicationsof Applied Intelligent Systems, IEA/AIE 2012Dalian, China, June 9-12, 2012Proceedings
13
Series Editors
Randy Goebel, University of Alberta, Edmonton, CanadaJörg Siekmann, University of Saarland, Saarbrücken, GermanyWolfgang Wahlster, DFKI and University of Saarland, Saarbrücken, Germany
Volume Editors
He JiangDalian University of TechnologyDalian, ChinaE-mail: [email protected]
Wei DingUniversity of Massachusetts BostonBoston, MA, USAE-mail: [email protected]
Moonis AliTexas State University–San MarcosSan Marcos, TX, USAE-mail: [email protected]
Xindong WuUniversity of VermontBurlington, VT, USAE-mail: [email protected]
ISSN 0302-9743 e-ISSN 1611-3349ISBN 978-3-642-31086-7 e-ISBN 978-3-642-31087-4DOI 10.1007/978-3-642-31087-4Springer Heidelberg Dordrecht London New York
Library of Congress Control Number: 2012939335
CR Subject Classification (1998): I.2, H.3-4, F.1-2, C.2, I.4-5, H.2.8
LNCS Sublibrary: SL 7 – Artificial Intelligence
© Springer-Verlag Berlin Heidelberg 2012This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The last few years have witnessed great advances in applied artificial intelligenceto solve real-life problems. To achieve this accomplishment, researchers havedevoted significant efforts in various fields, from theoretical analysis to industrialpractice.
The International Conference on Industrial, Engineering and Other Applica-tions of Applied Intelligent Systems (IEA/AIE), sponsored by the InternationalSociety of Applied Intelligence (ISAI), concentrates on artificial intelligence, aswell as its applications to complex problem solving. The conference is held an-nually, and has become an important international event in the field of appliedintelligence, where researchers and industrial communities communicate witheach other and promote the development of advanced research in artificial intel-ligence. The 25th IEA/AIE conference was held in Dalian, China, in June 2012.Following the conference tradition, IEA/AIE-2012 provided an international sci-entific forum for researchers in various fields of applied intelligence.
We received 198 papers from all over the world and selected 82 papers forpublication in this volume of LNCS proceedings. Each paper was reviewed by atleast two anonymous referees to assure quality. We would like to take this oppor-tunity to thank the Program Committee members as well as all the reviewers fortheir efforts, which guarantee the high quality of the papers in the proceedings.The selected papers cover theoretical approaches and applications of intelligentsystems from various fields of artificial intelligence.
The papers were presented at the IEA/AIE-2012 conference in several reg-ular as well as 11 special sessions. The topics of the papers in the proceedingsinclude data mining, combinatorial optimization and evolutionary algorithms,AI methods and applications, machine learning, agent-based systems, patternrecognition, cognitive computing, decision-making techniques, mission-criticalapplications, intelligent systems in healthcare, sentiment analysis for Asian lan-guages, social network and its applications, aspects on cognitive computing andintelligent interaction, knowledge-based systems, data mining and computationalintelligence for digital forensics and information assurance, mission-critical ap-plications and case studies of intelligent systems, natural language processingand its applications, spatio-temporal data mining, structured learning and theirapplications, modeling and support of cognitive and affective human processes,and cyber-physical systems for intelligent transportation applications.
The papers in these proceedings highlight the advanced research of appliedartificial intelligence and show the potential directions of novel applications. Wehope that you will find the papers interesting and obtain inspiration for yourresearch.
The conference also invited three outstanding scholars to give plenary keynotespeeches. They were Fei-Yue Wang, from the Chinese Academy of Sciences,
VI Preface
China, Jong Kim, from Pohang University of Science and Technology, SouthKorea, and Atul Prakash, from the University of Michigan, USA.
In addition to the ISAI and School of Software, Dalian University of Tech-nology, the main sponsors of the conference, our special thanks are due to theAssociation for the Advancement of Artificial Intelligence (AAAI), Associationfor Computing Machinery (ACM/SIGART, SIGKDD), Austrian Association forArtificial Intelligence (OeGAI), Catalan Association for Artificial Intelligence(ACIA), Chinese Association of Artificial Intelligence (CAAI), Dalian Univer-sity of Technology (DUT), European Neural Network Society (ENNS), Interna-tional Neural Network Society (INNS), Italian Artificial Intelligence Association(AI*IA), Japanese Society for Artificial Intelligence (JSAI), Lithuanian Com-puter Society–Artificial Intelligence Section (LIKS-AIS), Slovenian Artificial In-telligence Society (SLAIS), Spanish Society for Artificial Intelligence (AEPIA),Taiwanese Association for Artificial Intelligence (TAAI), Taiwanese Associationfor Consumer Electronics (TACE), and Texas State University-San Marcos.
We wish to thank the members of the Program and Organizing Committeesfor their hard work, especially those who played essential roles: Mingchu Li(Organizing Chair), Wei Ding (Special Session Chair) and the organizers of thespecial sessions: Amitava Das, Catholijn M. Jonker, Chengcui Zhang, Chi-YoHuang, Dan Simovici, Hamido Fujita, Hisham Al-Mubaid, Hong Liu, HonggangWang, Hyuk Cho, Jan Treur, Jie Liu, Lei Chen, Liangliang Cao, Ling Feng, MarkHoogendoorn, Mingjian Tang, Ping Chen, Qingzhong Liu, Tomasz F. Stepinski,Wayne Murray, Wei Ding, Yuanchang Xie, and Zhenggang Wang. We wouldlike to thank the keynote speakers for their inspiring and informative talks.We gratefully thank the authors for their valuable contributions and the otherparticipants of the conference. The conference would not have been possiblewithout their support.
April 2012 He JiangWei Ding
Moonis AliXindong Wu
Organization
Chairs
General ChairsMoonis Ali Texas State University, San Marcos, USAZhongxuan Luo Dalian University of Technology, ChinaXindong Wu University of Vermont, USA
Program Chairs
Nick Cercone York University, CanadaHe Jiang Dalian University of Technology, ChinaRamamohanarao Kotagiri University of Melbourne, Australia
Organizing Chair
Mingchu Li Dalian University of Technology, China
Special Session Chair
Wei Ding University of Massachusetts Boston, USA
International Organizing Committee
Floriana Esposito, ItalyFevzi Belli, GermanyAh-Hwee Tan, SingaporeShyi-Ming Chen, TaiwanChang-Hwan Lee, South KoreaLakhmi Jain, AustraliaDian-Hui Wang, AustraliaChunsheng Yang, CanadaSalem Benferhat, France
Paul Chung, UKHans Guesgen, The NetherlandsNicolas Garcıa-Pedrajas, SpainGitchang, JapanRichard Dapoigny, FranceAnwar Althari, MalaysiaGustavo Arroyo Figueroa, MexicoMasoud Mohammadian, Australia
Local Organizing Committee
Wenjie Liu, ChinaYan Hu, ChinaTie Qiu, ChinaHong Yu, China
Zhihui Wang, ChinaJifeng Xuan, ChinaZhilei Ren, China
VIII Organization
Special Sessions
Aspects on Cognitive Computing and Intelligent InteractionHamido FujitaData Mining and Computational Intelligence for Digital Forensics andInformation Assurance (DMCIDFIA)Lei Chen, Hyuk Cho, Qingzhong Liu, and Chengcui ZhangData Mining and Intelligent Systems in HealthcareMingjian Tang and Wayne MurrayDecision-Making Techniques and Innovative Knowledge ManagementChi-Yo Huang and Hamido FujitaMission-Critical Applications and Case Studies of Intelligent SystemsLing FengNatural Language Processing and Its ApplicationsHisham Al-Mubaid and Ping ChenSentiment Analysis for Asian LanguagesAmitava DasSocial Network and Its ApplicationsZhenggang Wang and Liangliang CaoModeling and Support of Cognitive and Affective Human ProcessesMark Hoogendoorn, Catholijn M. Jonker, and Jan TreurSpatio-Temporal Data Mining, Structured Learning and TheirApplicationsTomasz F. Stepinski, Dan Simovici, Wei Ding, and Jie LiuCyber-Physical System for Intelligent Transportation ApplicationsHonggang Wang, Hong Liu, and Yuanchang Xie
Invited Speakers
Fei-Yue Wang Institute of Automation, Chinese Academy ofSciences, China
Jong Kim Pohang University of Science and Technology,South Korea
Atul Prakash University of Michigan, USA
Program Committee
Ah-Hwee Tan, SingaporeAmruth Kumar, USAAntonio Bahamonde, SpainAnwar Althari, MalaysiaAoying Zhou, ChinaBora Kumova, Turkey
C.W. Chan, Hong KongChang-Hwan Lee, South KoreaChien-Chung Chan, USAChih-Cheng Hung, USAChunsheng Yang, CanadaDajun Zeng, China
Organization IX
Dan Tamir, USADianhui Wang, AustraliaDjamel F.H. Sadok, BrazilDon-Lin Yang, TaiwanDunwei Gong, ChinaEnhong Chen, ChinaEnrique Herrera-Viedma, SpainFevzi Belli, GermanyFloriana Esposito, ItalyGerard Dreyfus, FranceGitchang, JapanGregorio Sainz-Palmero, SpainGustavo Arroyo, MexicoHai Jin, ChinaHaibin Duan, ChinaHaibin Yu, ChinaHans W. Guesgen, New ZealandHasan Selim, TurkeyHiroshi G. Okuno, JapanHongwei Mo, ChinaHumberto Bustince, SpainJyh-Horng Chou, TaiwanKaoru Hirota, JapanKazuhiko Suzuki, JapanKe Tang, ChinaKishan Mehrotra, USALeszek Borzemski, PolandLicheng Jiao, ChinaLin-Yu Tseng, TaiwanMaciej Grzenda, PolandManton Matthews, USA
Maoguo Gong, ChinaMarco Valtorta, USAMark Hoogendoorn, The NetherlandsMingchu Li, ChinaMiquel Sanchez-Marre, USANicolas Garcıa-Pedrajas, SpainPatrick Brezillon, FrancePaul Chung, UKPrabhat Mahanti, CanadaRichard Dapoigny, FranceRuppa Thulasiram, CanadaSalem Benferhat, FranceShaheen Fatima, UKShie-Jue Lee, TaiwanShyi-Ming Chen, TaiwanSrini Ramaswamy, USATakayuki Ito, JapanTetsuo Kinoshita, JapanTibor Bosse, The NetherlandsTim Hendtlass, AustraliaValery Tereshko, UKVic J. Rayward-Smith, UKVincenzo Loia, ItalyWalter Potter, USAWei Ding, USAXingquan Zhu, AustraliaYo-Ping Huang, TaiwanYoungchul Bae, South KoreaYu-Bin Yang, ChinaZhi-Hua Zhou, ChinaZsolt Janos Viharos, Hungary
Special Session Reviewers
Alexandra Balahur, SpainAlison Sutinen, AustraliaAllan Wong, Hong KongBernardete Ribeiro, PortugalBipin Indurkhya, IndiaBjorn Gamback, NorwayCatherine Havasi, USAChoochart Haruechaiyasak, ThailandDawei Wang, USADipankar Das, IndiaEduard Hovy, USA
Erik Cambria, SingaporeEugene Ko, TaiwanFeng Hong, ChinaFiemke Both, The NetherlandsFuji Ren, JapanHaiquan Chen, USAHenry Lo, USAHiroya Takamura, JapanHung-Yu Kao, TaiwanJane You, Hong KongJifeng Xuan, China
X Organization
Juan Ortega, SpainJun Hakura, JapanJun Sasaki, JapanKun Hua, USALee Nung Kion, MalaysiaLei Zhang, USALuis Soriamorillo, SpainManabu Okumura, JapanMasaki Kurematsu, JapanMatthijs Pontier, The NetherlandsMengyu Qiao, USAMichael Tu, USAMing Yang, USAMinqing Hu, USAMuaz Niazi, UKNarasimha Shashidhar, USANatalie van der Wal, The NetherlandsNiek Wijngaards, The NetherlandsNoriko Kando, JapanPaolo Rosso, SpainPeter-Paul van Maanen,
The NetherlandsRam Basnet, USA
Roberto Revetria, ItalyRosanne Vetro, USAShengli Fu, USASivaji Bandyopadhyay, IndiaSumudu Mendis, AustraliaSwapna Somasundaran, USATangjian Deng, ChinaVirginia Dignum, The NetherlandsXi Li, USAXiaodan Zhuang, USAXiaojun Ruan, USAXin Jin, USAXinfa Hu, USAYan Chen, ChinaYiming Ji, USAYin Shan, AustraliaYingsong Hu, AustraliaYintao Yu, USAYutaka Watanobe, JapanZheng Zeng, USAZhijun Yin, USAZhilei Ren, China
Additional Reviewers
Arlette van Wissen, The NetherlandsCaihua Liu, ChinaCharlotte Gerritsen, The NetherlandsChia-Han Yang, TaiwanChia-Li Lin, TaiwanClaudia d’Amato, ItalyFrancisco Rente, PortugalGabriele Modena, The NetherlandsGuillermo Alonso, USAHueilin Chen, TaiwanIke Azogu, USAJeroen de Man, The NetherlandsJing Sun, ChinaKui Yu, USAMiao Xu, ChinaMichele Nappi, ItalyNataliya Mogles, The Netherlands
Nicola Di Mauro, ItalyPascal Cuxac, FrancePingpeng Yuan, ChinaRan Zheng, ChinaShu-Kung Hu, TaiwanSong Gao, USAWenbin Jiang, ChinaXiangjuan Yao, ChinaYang Mu, USAYao-Huei Huang, TaiwanYenchu Chen, TaiwanYilin Kang, SingaporeYing-Hsun Hung, TaiwanYixin Lu, The NetherlandsYong Zhang, ChinaZhibin Yu, ChinaZhonghang Xia, USA
Table of Contents
Section 1: Machine Learning Methods
Automatic Detailed Localization of Facial Features . . . . . . . . . . . . . . . . . . . 1Qing He, Ye Duan, and Danyang Zhang
Confidence-Based Incremental Classification for Objects with LimitedAttributes in Vertical Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Ozer Ozdikis, Pinar Senkul, and Siyamed Sinir
Algorithms for Detecting Outliers via Clustering and Ranks . . . . . . . . . . . 20Huaming Huang, Kishan Mehrotra, and Chilukuri K. Mohan
Grouping Co-occurrence Filtering Based on Bayesian Filtering . . . . . . . . . 30Takuya Yoshimura, Yutaro Fujii, and Takayuki Ito
Model Fusion-Based Batch Learning with Application to Oil SpillsDetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Chunsheng Yang, Yubin Yang, and Jie Liu
Efficient Determination of Binary Non-negative Vector Neighbors withRegard to Cosine Similarity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Marzena Kryszkiewicz
Automatic Chord Recognition Based on Probabilistic Integration ofAcoustic Features, Bass Sounds, and Chord Transition . . . . . . . . . . . . . . . . 58
Katsutoshi Itoyama, Tetsuya Ogata, and Hiroshi G. Okuno
Section 2: Cyber-Physical System for IntelligentTransportation Applications
A Real-Time Transportation Prediction System . . . . . . . . . . . . . . . . . . . . . . 68Haiguang Li, Zhao Li, Robert T. White, and Xindong Wu
Several Remarks on Mining Frequent Trajectories in Graphs . . . . . . . . . . . 78Henry Z. Lo, Dan A. Simovici, and Wei Ding
Cyber-Physical Integration to Connect Vehicles for TransformedTransportation Safety and Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Daiheng Ni, Hong Liu, Wei Ding, Yuanchang Xie, Honggang Wang,Hossein Pishro-Nik, and Qian Yu
Multi-modal Remote Sensing System for Transportation InfrastructureInspection and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Tzu-Yang Yu, Christopher Niezrecki, and Farhad Ansari
XII Table of Contents
Section 3: AI Applications
Operational Support in Fish Farming through Case-Based Reasoning . . . 104Axel Tidemann, Finn Olav Bjørnson, and Agnar Aamodt
CPMD: A Matlab Toolbox for Change Point and Constrained MotifDiscovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Yasser Mohammad, Yoshimasa Ohmoto, and Toyoaki Nishida
Time Invariant Gesture Recognition by Modelling Body PostureSpace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Binu M. Nair and Vijayan K. Asari
Go beyond the SCOPE: A Temporal Situation Calculus-Based SoftwareTool for Time Petri Nets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Xing Tan
An Algorithm of Channel Assignment of MAC Layer in Ad HocNetwork Based on Dynamic Game with Perfect and CompleteInformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Xiaochen Lai, Quanli Liu, Wei Wang, Likun Li, Simin Lu, andDi Wu
A Semantic Approach for Question Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 156Dai Quoc Nguyen, Dat Quoc Nguyen, and Son Bao Pham
Section 4: Evolutionary Algorithms, CombinatorialOptimization
Solving Periodic Event Scheduling Problems with SAT . . . . . . . . . . . . . . . . 166Peter Großmann, Steffen Holldobler, Norbert Manthey,Karl Nachtigall, Jens Opitz, and Peter Steinke
Improving the Performance of Constructive Multi-Start Search UsingRecord-Keeping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Dan E. Tamir, Charles R. King, and Mark McKenney
A Modified Particle Swarm Optimizer for Engineering Design . . . . . . . . . . 187Li Ma and Babak Forouraghi
Homogeneous RF Coil Design Using a GA . . . . . . . . . . . . . . . . . . . . . . . . . . 197Karthik Nadig, William M. Potter, and Walter D. Potter
A Comparative Study of Content Statistics of Coding Regions in anEvolutionary Computation Framework for Gene Prediction . . . . . . . . . . . . 206
Javier Perez-Rodrıguez, Alexis G. Arroyo-Pena, andNicolas Garcıa-Pedrajas
Table of Contents XIII
Enhancing Point Clouds Accuracy of Small Baseline Images Based onConvex Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
My-Ha Le, Andrey Vavilin, Sung-Min Yang, and Kang-Hyun Jo
Subset Quadratic Assignment Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226He Jiang and Yan Hu
Section 5: Modeling and Support of Cognitive andAffective Human Processes
Forward or Ignore: User Behavior Analysis and Prediction onMicroblogging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Guanghua Song, Zhitang Li, and Hao Tu
Compositionality of Team Mental Models in Relation to Sharednessand Team Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Catholijn M. Jonker, M. Birna van Riemsdijk,Iris C. van de Kieft, and Maria Gini
Section 6: Data Mining and ComputationalIntelligence for Digital Forensics and InformationAssurance
Feature Selection for Improved Phishing Detection . . . . . . . . . . . . . . . . . . . 252Ram B. Basnet, Andrew H. Sung, and Quingzhong Liu
Identification of Smartphone-Image Source and Manipulation . . . . . . . . . . 262Qingzhong Liu, Xiaodong Li, Lei Chen, Hyuk Cho, Peter A. Cooper,Zhongxue Chen, Mengyu Qiao, and Andrew H. Sung
Situation-Aware on Mobile Phone Using Co-clustering: Algorithms andExtensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Hyuk Cho, Deepthi Mandava, Qingzhong Liu, Lei Chen,Sangoh Jeong, and Doreen Cheng
Section 7: Natural Language Processing and ItsApplications
Persian Text Classification Based on K-NN Using Wordnet . . . . . . . . . . . . 283Mostafa Parchami, Bahareh Akhtar, and MirHossein Dezfoulian
An Efficient Minimum Vocabulary Construction Algorithm forLanguage Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Sina Lin, Zengchang Qin, Zehua Huang, and Tao Wan
Effective Co-reference Resolution in Clinical Text . . . . . . . . . . . . . . . . . . . . 302David Hinote, Carlos Ramirez, and Ping Chen
XIV Table of Contents
VAHA: Verbs Associate with Human Activity – A Study on FairyTales . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Hui-Ngo Goh, Lay-Ki Soon, and Su-Cheng Haw
Section 8: Social Network and Its Applications
A Semantic-Based Social Network of Academic Researchers . . . . . . . . . . . 323Elnaz Davoodi and Keivan Kianmehr
Heuristic Resource Discovery in P2P Network . . . . . . . . . . . . . . . . . . . . . . . 333Zheng Chen, Lei Wu, Jiansong Zhang, Xuemei Hu, and Yang Xu
Section 9: Mission-Critical Applications and CaseStudies of Intelligent Systems
The Use of a Local Histogram Feature Vector of Classifying DiffuseLung Opacities in High-Resolution Computed Tomography . . . . . . . . . . . . 343
Yoshihiro Mitani, Yusuke Fujita, Naofumi Matsunaga, andYoshihiko Hamamoto
SOM2CE: Double Self-Organizing Map Based Cluster EnsembleFramework and Its Application in Cancer Gene Expression Profiles . . . . . 351
Zhiwen Yu, Hantao Chen, Jane You, Le Li, and Guoqiang Han
A Context-Aware Enterprise Search Engine for Aviation . . . . . . . . . . . . . . 361Hao Wang, Qingwei Liu, Tangjian Deng, and Ling Feng
Formal Analysis of Aviation Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371Tibor Bosse and Nataliya M. Mogles
Section 10: AI Methods
Common Sensorimotor Representation for Self-initiated ImitationLearning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Yasser Mohammad, Yoshimasa Ohmoto, and Toyoaki Nishida
Near-Optimal Evaluation of Network Survivability under Multi-stageAttacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Frank Yeong-Sung Lin, Pei-Yu Chen, and Quen-Ting Chen
Solving Manufacturing Cell Design Problems Using ConstraintProgramming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Ricardo Soto, Hakan Kjellerstrand, Juan Gutierrez, Alexis Lopez,Broderick Crawford, and Eric Monfroy
A Pragmatic Approach to Grounding Data Computation for ModalStatements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Wojciech Lorkiewicz, Grzegorz Skorupa, and Radoslaw Katarzyniak
Table of Contents XV
G-SteX: Greedy Stem Extension for Free-Length Constrained MotifDiscovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Yasser Mohammad, Yoshimasa Ohmoto, and Toyoaki Nishida
Section 11: Sentiment Analysis for Asian Languages
Event-Level Textual Emotion Sensing Based on Common ActionDistributions between Event Participants . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Cheng-Yu Lu, William W.Y. Hsu, and Jan-Ming Ho
Towards a Chinese Common and Common Sense Knowledge Base forSentiment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Erik Cambria, Amir Hussain, Tariq Durrani, and Jiajun Zhang
Emotion Tracking on Blogs - A Case Study for Bengali . . . . . . . . . . . . . . . 447Dipankar Das, Sagnik Roy, and Sivaji Bandyopadhyay
Section 12: Aspects on Cognitive Computing andIntelligent Interaction
Pseudo-code Programming of Designer Activities in Development ofSoftware Intensive Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Petr Sosnin
Intelligent Aspects of AIDA Programming . . . . . . . . . . . . . . . . . . . . . . . . . . 467Yutaka Watanobe, Lin Gu, and Nikolay Mirenkov
Improving Healthcare Using Cognitive Computing Based Software: AnApplication in Emergency Situation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Roberto Revetria, Alessandro Catania, Lucia Cassettari,Guido Guizzi, Elpidio Romano, Teresa Murino,Giovanni Improta, and Hamido Fujita
Detecting Changing Emotions in Natural Speech . . . . . . . . . . . . . . . . . . . . . 491Wojtek Kowalczyk and C. Natalie van der Wal
An Ambient Agent Model for Support of Informal Caregivers duringStress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Azizi Ab Aziz, Jan Treur, and C. Natalie van der Wal
Interruption Theory for Improving Work Efficiency by ReasoningWorkflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Kohei Sugawara and Hamido Fujita
Action Selection Using Theory of Mind: A Case Study in the Domainof Fighter Pilot Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
Mark Hoogendoorn and Robbert-Jan Merk
XVI Table of Contents
Intelligent Decision-Making Approach Based on Fuzzy-CausalKnowledge and Reasoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
Alejandro Pena-Ayala and Riichiro Mizoguchi
Section 13: Spatio-temporal Data Mining, StructuredLearning and Their Applications
Camera Motion Estimation and Moving Object Detection Based onLocal Feature Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
Andrey Vavilin, Le-My Ha, and Kang-Hyun Jo
Optimization of Criminal HotSpots Based on Underlying CrimeControlling Factors Using Geospatial Discriminative Pattern . . . . . . . . . . 553
Dawei Wang, Wei Ding, Tomasz Stepinski, Josue Salazar,Henry Lo, and Melissa Morabito
Spatio-temporal Reasoning with Qualitative and QuantitativeInformation about Constraints and Approximations . . . . . . . . . . . . . . . . . . 563
Anthony Y. Chang
Section 14: Decision Making and Knowledge BasedSystems
A Human-Like Agent Model for Attribution of Actions UsingOwnership States and Inverse Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
Jan Treur and Muhammad Umair
Fault Resolution Support Based on Activated Knowledge andInformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
Kazuto Sasai, Gen Kitagata, and Tetsuo Kinoshita
Creating User’s Knowledge Space from Various Information Usages toSupport Human Recollection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Harumi Murakami, Kenta Mitsuhashi, and Keita Senba
Section 15: Pattern Recognition
A Robust Approach to Digit Recognition in Noisy Environments . . . . . . . 606O. Matei, P.C. Pop, and H. Valean
A One-Phase Method for Mining High Utility Mobile SequentialPatterns in Mobile Commerce Environments . . . . . . . . . . . . . . . . . . . . . . . . 616
Bai-En Shie, Ji-Hong Cheng, Kun-Ta Chuang, and Vincent S. Tseng
The Use of Shapley Value to Power Allocation Games in CognitiveRadio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Jerzy Martyna
Table of Contents XVII
Mining Time-Gap Sequential Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637Show-Jane Yen and Yue-Shi Lee
Intelligent Post-processing via Bounding-Box-Based MorphologicalOperations for Moving Objects Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
Chun-Ming Tsai
Section 16: Agent Based Systems
An Integrated Agent Model for Attention and Functional State . . . . . . . . 658Tibor Bosse, Rianne van Lambalgen, Peter-Paul van Maanen, andJan Treur
Tracking and Constraining Authorization Provenance . . . . . . . . . . . . . . . . . 669Jinwei Hu, Khaled M. Khan, Yun Bai, and Yan Zhang
A Framework for Collaborative Business Development Based on MiddleAgent Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
Hiroki Nakagawa, Akihiko Nagai, and Takayuki Ito
Agents’ Cooperation Based on Long-Term Reciprocal Altruism . . . . . . . . 689Xiaowei Zhao, Haoxiang Xia, Hong Yu, and Linlin Tian
A Vietnamese Text-Based Conversational Agent . . . . . . . . . . . . . . . . . . . . . 699Dai Quoc Nguyen, Dat Quoc Nguyen, and Son Bao Pham
Section 17: Decision Making Techniques andInnovative Knowledge Management
Using DRSA and Fuzzy Measure to Enlighten Policy Making forEnhancing National Competitiveness by WCY 2011 . . . . . . . . . . . . . . . . . . 709
Yu-Chien Ko, Hamido Fujita, and Gwo-Hshiung Tzeng
Evaluating Top Information Technology Firms in Standard and Poor’s500 Index by Using a Multiple Objective Programming Based DataEnvelopment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Chi-Yo Huang, Po-Yen Wang, and Gwo-Hshiung Tzeng
Using the DEMATEL Based Network Process and Structural EquationModeling Methods for Deriving Factors Influencing the Acceptance ofSmart Phone Operation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
Chi-Yo Huang, Ming-Jenn Wu, Yu-Wei Liu, andGwo-Hshiung Tzeng
Determine the Service Value Position for Package Tour Plan Based ona Novel MCDM Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742
Chia-Li Lin
XVIII Table of Contents
Section 18: Machine Learning Applications
Incremental 3D Reconstruction Using Bayesian Learning . . . . . . . . . . . . . . 754Ze-Huan Yuan, Lu Tong, Hao-Yi Zhou, Chen Bin, and Jia-Ning Li
A Stochastic Search on the Line-Based Solution to DiscretizedEstimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Anis Yazidi, Ole-Christoffer Granmo, and B. John Oommen
A Hierarchical Learning Scheme for Solving the Stochastic PointLocation Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 774
Anis Yazidi, Ole-Christoffer Granmo, B. John Oommen, andMorten Goodwin
Discretized Bayesian Pursuit – A New Scheme for ReinforcementLearning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
Xuan Zhang, Ole-Christoffer Granmo, and B. John Oommen
A Method of Software Defects Mining Based on Static Analysis . . . . . . . . 794Xiaochen Lai, Kuanjiu Zhou, Likun Li, Lemin Tang,Yanshuang Yao, and Liang Yu
An Extended ISOMAP by Enhancing Similarity for Clustering . . . . . . . . 808Hong Yu, Xianchao Zhang, Yuansheng Yang, Xiaowei Zhao, andLei Cai
Movie Keyframe Retrieval Based on Cross-Media Correlation Detectionand Context Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Yukang Jin, Tong Lu, and Feng Su
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827