2009 international conference on computer technology and ...toc.proceedings.com/07036webtoc.pdf ·...

22
IEEE Catalog Number: ISBN: CFP0934I-PRT 978-1-4244-5255-2 2009 International Conference on Computer Technology and Development (ICCTD 2009) Kota Kinabalu, Malaysia 13-15 November 2009 Volume 1 Pages 1-700

Upload: others

Post on 25-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

IEEE Catalog Number: ISBN:

CFP0934I-PRT 978-1-4244-5255-2

2009 International Conference on Computer Technology and Development (ICCTD 2009)

Kota Kinabalu, Malaysia 13-15 November 2009

Volume 1 Pages 1-700

Page 2: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

2009 International Conferenceon Computer Technology

and Development

ICCTD 2009Table of Contents

Volume - 1

Preface - Volume 1Organizing Committee - Volume 1Reviewers - Volume 1

Session 1

Simulatio of Traffic Congestion at the Tourist Attraction Spot of Kuching

Waterfront, Sarawak ....................................................................................................................................................3

Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini

Shortest Path Simulation Using Interactive SVG Map ..........................................................................................6

Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini

Hardware Architecture of Protection Switching Device (PSD) .........................................................................10

Boonchuan Ng, Aswir Premadi, Noor Azie Azura Mohd Arif,

and Mohammad Syuhaimi Ab-Rahman

Intelligent Route Planning for Multiple Robots Using Particle Swarm

Optimization ...............................................................................................................................................................15

Sai Krishna Mulpuru and Krishna Chaitanya Kollu

Systemic Water Analysis - The Procedure ............................................................................................................19

Leow Meng Chew, Lim Poh Wing, and Nanna Suryana Herman

Virtual Mid-Line Detection on Curve Road for User Guidance Using

Simulation Model ......................................................................................................................................................24

Erma Rahayu Mohd Faizal and Hj. Mohd Asri Hj. Mansor

Success Factors for Higher Education ERPs .........................................................................................................28

Razvan Bologa, Ana-Ramona Bologa, and Gheorghe Sabau

Page 3: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Architecture for Applying Data Mining and Visualization on Network Flow

for Botnet Traffic Detection .....................................................................................................................................33

AliReza Shahrestani, Maryam Feily, Rodina Ahmad, and Sureswaran Ramadass

An Approach for Heartbeat Sound Transcription .................................................................................................38

Ehsan Safar Khorasani, Shyamala Doraisamy, and Farshad Arvin

Learning Difficulties in Programming Courses: Undergraduates’ Perspective

and Perception ............................................................................................................................................................42

Phit-Huan Tan, Choo-Yee Ting, and Siew-Woei Ling

Session 2

Combinging Fisheye with List: Evaluating the Learnability and User

Satisfaction .................................................................................................................................................................49

Aznoora Osman, Mohammad Hafiz Bin Ismail, and Nadia Abdul Wahab

Turn-on Time Delay of Uncooled Semiconductor Laser Diode Subject

to External Optical Feedback: Theoretical Analysis ............................................................................................53

Mohammad Syuhaimi Ab-Rahman and Mazen R. Hassan

Document Clustering Using Concept Space and Cosine Similarity

Measurement ..............................................................................................................................................................58

Lailil Muflikhah and Baharum Baharudin

Approach of Graphic BPEL Workflow Debugging .............................................................................................63

Lixin Zhou and Ye Tian

Designing and Developing a PDA Food Ordering System Using Interaction

Design Approach: A Case Study .............................................................................................................................68

Lim Tek Yong, Choong You Qi, Chai Soon Yee, Alexander Johnson, and Ng Kar Hoong

Protection Access Network: An Architecture Approach to Remote Monitor

and Control .................................................................................................................................................................72

Aswir Premadi, Boonchuan Ng, M. Mastang, Mohammad Syuhaimi Ab-Rahman,

and Kasmiran Jumari

Artificial Neural Network for Predicting Machining Performance of Uncoated

Carbide (WC-Co) in Milling Machining Operation .............................................................................................76

Azlan Mohd Zain, Habibollah Haron, and Safian Sharif

Secure Virtual Application Distribution ................................................................................................................81

Wira Zanoramy A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan,

Mohd Saufy Rohmad, and Mohd Anuar Mat Isa

Intelligent Uplink Bandwidth Allocation Based on PMP Mode for WiMAX .................................................86

Sun Zhen Tao and Abdullah Gani

Session 3

Research on Communication Countermeasure Simulation Training System ...................................................93

Lixia Liu

Page 4: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Region of Interest in Disparity Mapping for Navigation of Stereo Vision

Autonomous Guided Vehicle ...................................................................................................................................98

Anwar Hasni Abu Hasan, Rostam Affendi Hamzah, and Mohd Haffiz Johar

Optical Switch Controller Using Embedded Internet Based System ...............................................................103

Mohamad Syuhaimi Ab-Rahman, Mohamad Najib Mohamad Saupe, and Kasmiran Jumari

Analysis, Design and Implementation of a Web-Based Payroll Application

Software ....................................................................................................................................................................107

Husin J. Then, Biju Issac, Lau T. Chung, Susanti Wongso, Riyan Bong, Lesley Lu,

and Yu P. Ling

Modified Correlative Coding for Frequency Offset Mitigation in OFDM

Systems ......................................................................................................................................................................112

Mohamed Essam Khedr, Nour El-Din El-Madany, and Amr El-Sayed Rizk

2x3 Optical Moderator Based on Planar Waveguide Device for Ftth

Application ...............................................................................................................................................................116

Mohammad Syuhaimi Ab-Rahman, Norazilawati Md-Zain, Seri Mastura Mustaza,

Aida Baharuddin, and Kasmiran Jumari

Guarding Strategic Points of a Gallery .................................................................................................................121

Mohammad Hosseinzadeh Moghaddam, Alireza Bagheri, Ali Safari Mamaghani,

and Saied Taghavi Afshord

Design and Application of a Project-Based Teaching Environment ...............................................................125

Ou Jian, Dong Yi-ning, and You Jin-sheng

Comparison of Swarm Adaptive Neural Network Control of a Coupled Tank

Liquid Level System ...............................................................................................................................................130

Mohd Syakirin Ramli, Mohd Ashraf Ahmad, and Raja Mohd Taufika Raja Ismail

Quality of Service Multicast Routing Protocol for Large Scale MANETs ....................................................136

Mohammad M.M. Qabajeh, Aisha-Hassan A. Hashim, Othman Khalifa,

and Liana K. Qabajeh

Session 4

A Scalable Secure Routing Protocol for MANETs ............................................................................................143

Liana Khamis Qabajeh, Laiha Mat Kiah, and Mohammad Moustafa Qabajeh

The Construction and Evolution of Learner Model in Adaptive Learning

System .......................................................................................................................................................................148

Bing Jia, Shaochun Zhong, Wei Wang, and Bin Yang

Prospects of Implementing Short Message Service (SMS) Based

E-government Model in Bangladesh ....................................................................................................................153

Khaled Mahmud and Khonika Gope

Requirements Prioritization in On-line Banking Systems: Using

Value-Oriented Framework ...................................................................................................................................158

Amir Seyed Danesh, Soolmaz Mir Mortazavi, and Seyed Yahya Seyed Danesh

Page 5: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

An Optimized, Mathematical-Based Flight Performance Planning .................................................................162

Arman Rezaee and Saman Izadpanah

Remote Sensing Image Fusion Based on Nonsubsampled Contourlet

Transform and PCA .................................................................................................................................................165

Ding Li

Robot Path Planning Using Wave Expansion Approach Virtual Target .........................................................169

Amir Nooraliei and Sami A. Mostafa

Feed-forward Techniques for Sway Suppression in a Double-Pendulum-Type

Overhead Crane ........................................................................................................................................................173

Mohd Ashraf Ahmad, Raja Mohd Taufika Raja Ismail, Mohd Syakirin Ramli,

Ahmad Nor Kasruddin Nasir, and Najidah Hambali

Considering Faults in Service-Oriented Architecture: A Graph

Transformation-Based Approach ..........................................................................................................................179

Farzaneh Mahdian, Vahid Rafe, Reza Rafeh, and M.R Zand Miralvand

An Improved Chinese Segmentation Algorithm Based on Segmentation

Dictionary .................................................................................................................................................................184

Yan Niu and Lala Li

Session 5

Automatic Refinement of Platform Independent Models ..................................................................................191

Mohamad Reza Zand Miralvand, Vahid Rafe, Reza Rafeh, and Maryam Hajiee

Using MDA for Developing SOA-Based Applications .....................................................................................196

Vahid Rafe, Reza Rafeh, Parvin Fakhri, and Shahrbanoo Zangaraki

Verification and Validation of Activity Diagrams Using Graph Transformation .........................................201

Vahid Rafe, Reza Rafeh, Somayeh Azizi, and Mohamad Reza Zand Miralvand

Towards Automated Software Verification and Validation ..............................................................................206

Somayeh Asadollahi, Vahid Rafe, and Reza Rafeh

Automated Model Checking of Stochastic Graph Transformation Systems ..................................................211

Vahid Rafe, Reza Rafeh, Mohamad Reza Zand Miralvand, and Alavie Sadat Alavizadeh

Architecture of Distributed Traffic Simulation System Based on SOA

and Multi-Agents .....................................................................................................................................................216

Bingnan Jiang and Hai Zhang

Character-Based Indexing Using Inverted Lists .................................................................................................221

Chouvalit Khancome and Veera Boonjing

Deriving Formal Specification Using Z Notation ...............................................................................................225

Roslina Mohd Sidek and Noraziah Ahmad

Graph Partitioning Method for Functional Module Detections of Protein

Interaction Network .................................................................................................................................................230

Afnizanfaizal Abdullah, Safaai Deris, Siti Zaiton Mohd Hashim, and Hamimah Mohd Jamil

Shared Buffer Approach in Fault Tolerant Networks ........................................................................................235

Luisito I. Tabada and Pierre U. Tagle

Page 6: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Session 6

The Utilization of Metrics Usability to Evaluate the Software Quality ..........................................................243

Jaroslav Zeman, Pavol Tanuska, and Michal Kebisek

Efficient Enhancement of Microarray Image Using Histogram Specification ...............................................247

Satish G. Dappin, Sahana Santosh Shetty, Manjunath S.S., and Lalitha Rangarajan

Flexible Security Protocol in Collaborative Editing Environment: An

Overview ...................................................................................................................................................................252

Mohd Adib Omar, Rosni Abdullah, and Fazilah Haron

Cargo Projectile Opening Control Strategy Analysis and Rapid Algorithm ..................................................255

Shen Qiang and Ge Mian

Path Planning Using Wave Front’s Improvement Methods ..............................................................................259

Hamed Nooraliei and Amir Nooraliei

Web Service QoS Prediction Based on Multi Agents ........................................................................................265

Jaleh Shoshtarian Malak, Mehran Mohsenzadeh, and Mir Ali Seyyedi

Using Labeled Hyper Multi Digraph for Tabriz Passenger Traffic Modeling:

Data-oriented Approach ..........................................................................................................................................270

Raheleh Olfatkhah, Ahmad Habibizad Navin, Nima Jafari Navimipour,

Mirkamal Mirnia, and Seyyed Hasan Yasrebi

Session 7

Interface Design Issues to Enhance Usability of E-commerce Websites

and Systems ..............................................................................................................................................................277

Roshanak Safavi

Assessment of Leaner’s Understanding: An Experimental Result ..................................................................282

Adidah Lajis and Normaziah Abdul Aziz

Cell Breathing and Coverage Prediction in WCDMA .......................................................................................287

Mohd Dani Baba, Muhammad Yusoff Ibrahim, and Farah Jida Abd Ghafar

Improving Performance of Handwork-Fused 1x3 Polymer Optical Fiber

Splitter through Progressed Fusion Technique ...................................................................................................291

Mohd Hazwan Harun, Mohammad Syuhaimi Ab-Rahman, and Mohd Hadi Guna Safnal

Empire Establishment Algorithm ..........................................................................................................................295

Seyed Mojtaba Saif, Hamed Shah-Hosseini, and Mohammad Reza Feizi

Devising a Biological Model to Detect Polymorphic Computer Viruses

Artificial Immune System (AIM): Review ..........................................................................................................300

Saman Mirza Abdulla and Omar Zakaria

Page 7: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Session 8

Collaborative Network for the Development of an Informational System in

the SOA Context for the University Management ..............................................................................................307

Gheorghe Sabau, Ramona Bologa, Razvan Bologa, and Mihaela Muntean

Performance of H.264 in Real Time Optimization .............................................................................................312

Faizul Hadi Bin Mohamad Jamil, Razak Mohd Ali Lee, Terence Daim Jerome,

Khairul Anuar Mohamad, and Ahmad Razani Haron

The Development of a Web-Based Claims System ............................................................................................317

Syed Zulkarnain Syed Idrus, Ahmad Zulhusny Rozali, and Hazry Desa

The Monitoring of the Network Traffic Based On Queuing Theory

and Simulation in Heterogeneous Network Environment .................................................................................322

Seyed Hossein Kamali, Maysam Hedayati, Abdol Said Izadi, and Hamid Reza Hoseiny

Extracting Temporal Rules from Medical Data ..................................................................................................327

Hoda Meamarzadeh, Mohammad Reza Khayyambashi, and Mohammad Hussein Saraee

Test-Bed Based Comparison of Single and Parallel TCP and the Impact

of Parallelism on Throughput and Fairness in Heterogenous Networks .........................................................332

Mohamed A. Alrshah and Mohamed Othman

Review on FPGA-Based Systolic Poisson Solver ..............................................................................................336

Ngoh Jin Yee and Mohamed Othman

Improved Inspection Data Quality Using Modified Corrosion Rate Method

for Offshore Pipeline Assessment .........................................................................................................................340

Mazura Mat Din, Md Asri Ngadi, Khadijah Abdul Razak, and Norhazilan Md. Noor

Session 9

Realization of an Economical Self-Fabricated Polymer Optical Fiber Splitters

for Small World Communication ..........................................................................................................................347

Mohd Syuhaimi Ab-Rahman, Kasmiran Jumari, Hadi Guna, and Mohd Hazwan Harun

Research on the Application of QFD and Knowledge Management in

the Outsourcing Software Quality Assurance .....................................................................................................352

Xiong Wei, Wu Zhixin, and Yu Shaozhong

Real-time Data Storage Research Based on RAM .............................................................................................359

Zhang Yan and Liu Wenyi

A Method of Program Structure Division Based on Program Understanding ...............................................363

Zhang Youwei, Wang Yonghong, and Liu Xiaochun

Mobile System Using Natural Language Annotations for Question Answering ...........................................367

Malik Sikander Hayat Khiyal, Aihab Khan, and Sidra Khalid

A Novel Detection of Network Errrors by Study of Raw TCP/IP Packets .....................................................372

M. Ravindran and R. Bhaskaran

The Importance of Web Services Using the RPC and REST Architecture ....................................................377

Pîrnău Mironela

Page 8: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Session 10

WsVsSenNet: An Era of Enhanced Vision Based Sensing Capability ...........................................................383

Navneet Tiwari, Jatan Saraf, and Siddarth Jain

EMD for the Localization of Underwater Target with Time Varying Signal Via

Radiated Signal ........................................................................................................................................................388

Liu Wenhai

Study of Soft-sensing Method Used to Predict the Overhead Product Purity

of the Styrene Distillation Column .......................................................................................................................391

Cao Wei, Zhao Ying-Kai, Li Zhaojie, and Li Zhiliang

Obstacles Avoidance and Optimal Path Determination in Mobile Ad

hoc Network .............................................................................................................................................................394

Khandakar Entenam Unayes Ahmed, Isahaque Miah, Nur Hossen, and Abdullah Al Aaqib

Converting 2D Image into Sequence of Curves on 3D Flat Model .................................................................397

Nanik Suciati and Koichi Harada

A Novel Spatial Clustering with Obstacles and Facilitators Constraint Based

on Edge Detection and K-Medoids .......................................................................................................................402

V. Pattabiraman, R. Parvathi, R. Nedunchezian, and S. Palaniammal

Betweeness-Centrality of Grid Networks ............................................................................................................407

Indra Rajasingh, Bharati Rajan, and Florence Isido D.

Researches on Support Vector Machine Based Semi-Active Control

of Structures ..............................................................................................................................................................411

Qing Liu and Chunxiang Li

Perspectives on Knowledge Sharing System for Special Interest Group (SIG):

Culture, Power Issues and User Interface ............................................................................................................416

Aisyah Ismail, Shahida Sulaiman, and Maziani Sabudin

A Coupling and Cohesion Metrics Suite for Object-Oriented Software .........................................................421

Sukainah Husein and Alan Oxley

Session 11

Specific Data Model of Smart Fuel Consumption Cost Estimator ..................................................................429

Noraziah Ahmad

Study on Expressing Principles of Semantics in Product Design ....................................................................433

Zhang Xin, Zhang Jianwu, and Yang Mei

Development of Informative System Memory Monitoring ..............................................................................437

Noraziah Ahmad

Hajj-QAES: A Knowledge-Based Expert System to Support Hajj Pilgrims

in Decision Making .................................................................................................................................................442

Shahida Sulaiman, Hasimah Mohamed, Muhammad Rafie Mohd Arshad,

Nur’ Aini Abdul Rashid, and Umi Kalsom Yusof

Page 9: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Creation Ontology with Completeness for Identification of 3D Architectural

Objects .......................................................................................................................................................................447

Yucong Duan

A System for Checking Code Numbers on a Credit Card and a Paper

of Personal Information ..........................................................................................................................................455

Adisorn Leelasantiham

Development of Sarawak Malay Local Dialect Online Translation Tool .......................................................459

Syahrul Nizam Junaini, Azelina Luk Tzcr Hwey, Jonathan Sidi,

and Khirulnizam Abd Rahman

Learning Sarawak Local Malay Dialect Using Pedagogical Agent .................................................................463

Syahrul Nizam Junaini and Loh Hua Chui

Networking Modeling for the Network-in-the-Loop Training Simulation .....................................................468

Zhi-Chun Gan, Hua Tian, and Jian-Jun Shen

Flexible, Wearable Algorithms for Web Services ..............................................................................................472

XiwangYang and Wang Hua

Session 12

Simulating Flip-Flop Gates Using Peer-to-Peer Methodologies ......................................................................479

Yao Nan

An Evaluation of E-Business with Fin .................................................................................................................483

Yingying Ma

The Influence of Distributed Algorithms on Artificial Intelligence ................................................................488

Feng Ji

The Effect of Peer-to-Peer Technology on Algorithms .....................................................................................492

Lixia Liu

Computer Simulation Opportunity In Plastic Injection Mold Development

for Automotive Part .................................................................................................................................................495

Alias Mohd Saman, Abdul Halim Abdullah, and Mohd Asri Mohd Nor

Pattern Discovery of Web Usage Mining ............................................................................................................499

Shahnaz Parvin Nina, Mahmudur Rahman, Khairul Islam Bhuiyan,

and Khandakar Entenam Unayes Ahmed

A Clustering Algorithm for Datasets with Different Densities ........................................................................504

Xiaobing Yang, Lingmin He, and Huijuan Lu

Session 13

A Prototype of FTMK Online Collaboration System via Wireless LAN .......................................................511

Ariff Idris, Abd. Samad Hasan Basari, and Nafisah Jusoh

Creating Extraction Pattern by Combining Part of Speech Tagger

and Grammatical Parser ..........................................................................................................................................515

Yunita Sari, Mohd Fadzil Hassan, and Norshuhani Zamin

Multi-Agent Based Virtual Enterprise ..................................................................................................................520

Wei Feng and Rulin Wang

Page 10: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Fractal Color Image Compression by Adaptive Zero-Mean Method ..............................................................525

Loay E. George and Eman A. Al-Hilo

Novel Low Power, High Speed Hardware Implementation of 1D DCT/IDCT

Using Xilinx FPGA .................................................................................................................................................530

Rajesh Kannan Megalingam, Vineeth Sarma V., Venkat Krishnan B., Mithun M.,

and Rahul Srikumar

Hardware Implementation of Low Power, High Speed DCT/IDCT Based

Digital Image Watermarking .................................................................................................................................535

Rajesh Kannan Megalingam, Venkat Krishnan B., Vineeth Sarma V., Mithun M.,

and Rahul Srikumar

Performance Evaluation of Adaptive Backoff Algorithms in Ad Hoc Networks ..........................................540

Sasan Zhalehpour, Hadi Shahriar Shahhoseini, and Sara Zhalehpour

Music Playlist Recommendation Based on User Heartbeat and Music

Preference .................................................................................................................................................................545

Hao Liu, Jun Hu, and Matthias Rauterberg

Fast PhyloCon Algorithm Using OpenMP ..........................................................................................................550

Hazrina Yusof Hamdani, Nur'Aini Abdul Rashid, Mustafa Fadzil Farid Wajidi,

Atheer Akram Abdulrazzaq, and Rana M. Ghadban

Sandglass Model of Next Generation Internet Data Transport Protocol .........................................................554

Liu Yong-Min, Yu Shao-Jun, and Nian Xiao-Hong

Session 14

The Architecture and Characteristics of Wireless Sensor Network .................................................................561

Liu Yong-Min, Wu Shu-Ci, and Nian Xiao-Hong

Reflection of Network Security Caused by a Wheel ..........................................................................................566

Ruan Hong-Wei, Li Hua, Ao Teng-He, and Wu Cheng-Yong

Feedback Arc Set in Oriented Graphs ..................................................................................................................569

Indra Rajasingh, Bharati Rajan, and Little Joice

Multi-label Detection Method in Warehousing Wireless Scanning System ..................................................574

Yao Sufen, Zhu Cheng, and Lin Fei

Security Model Based on Network Business Security .......................................................................................577

Wu Kehe, Zhang Tong, Li Wei, and Ma Gang

A New Method for Color Image Steganography Using SPIHT and DFT,

Sending with JPEG Format ....................................................................................................................................581

Asghar Shahrzad Khashandarag and Naser Ebrahimian

Influence of Rendering Intents on the Gamut Volume and the Visual

Evaluations in Digital Proofing .............................................................................................................................587

Maohai Lin, Shisheng Zhou, Mao-hai Lin, and Yunhui Luo

A New Fabric of Dynamic NOC for Communication in Reconfigurable

Devices ......................................................................................................................................................................590

Pan Jing-wei and Yan Bo

Page 11: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Conceptual Framework for a Heuristics Based Methodology for Interface

Evaluation of Educational Games .........................................................................................................................594

Hasiah Mohamed Omar and Azizah Jaafar

Session 15

The Effect of Technological Improvement on the Development of Photovoltaic

Industry ......................................................................................................................................................................601

Chen Ming

Research on China’s Photovoltaic Industrial Restructuring ..............................................................................606

Tao Chun-hai

On Chinese Monetary Policy’s Validity ..............................................................................................................611

Dai Shu-Yang

On Jiangxi’s Alignment with Yangtze River Delta-Zhujiang River

Delta-Fujian Golden Delta and Involvement in Globalization .........................................................................616

Dai Shu-Yang

Research on Brand-name Extension Strategy of Real Estate in China ...........................................................621

Guo Ya-Xiong

Research on Strategic Transition and Industrial Structure Upgrading

of Chinese Bonded Ports and Zones .....................................................................................................................626

Guo Ya-Xiong

Research on Development of Ecotourism in Poyang Lake ...............................................................................631

X.M. Han

The Application of Web Technology In Electronic Commerce .......................................................................636

Hang X.M.

On Measures of Promoting Independent Innovation of Small-

and Medium-Sized Enterprises in the Context of Financial Crisis ..................................................................641

Hu Yu-Chen

Session 16

Research and Application of SOA in B2B Electronic Commerce ...................................................................649

Li Xiong-yi

Research on Knowledge Management of Software Enterprises with Lenovo

for Case Study ..........................................................................................................................................................654

Lin Lan

Research on Promotion Policies of China’s Photovoltaic Industry .................................................................659

Liu Biao-wen

On Game Balance in Market-oriented Public Utility Reform ..........................................................................664

Wang Zi-li and Liu Xiu-ming

On the Deep-rooted Cause of Public Utility Reform .........................................................................................668

Wang Zi-li and Liu Xiu-ming

Page 12: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Problems and Countermeasures of Public Sector Human Resource

Management In China .............................................................................................................................................673

Zhang Bi-an

Study on Industrial Ecosystems of Poyang Lake Ecological Economic Zone ...............................................678

Zhang Xiao-feng and Li Sheng-Lang

Practice of Strategic Human Resource Management In the Enterprise ...........................................................683

Zhu Hui

On Motivation/Incentive of Knowledge Employees of Virtual Enterprises ...................................................687

Ke Jian-Chun

A Study Report about Defensive Strategies Based on Strength Comparison

among Different Enterprises ..................................................................................................................................692

Li Guang-Jin, Deng Ke, and Zhou Xin-Yin

Research on Complete Risk Management of Chinese Commercial Banking

Based on the New Basel Capital Accord .............................................................................................................696

Ke Jian-Chun

Author Index - Volume 1

Page 13: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

IEEE Catalog Number: ISBN:

CFP0934I-PRT 978-1-4244-5255-2

2009 International Conference on Computer Technology and Development (ICCTD 2009)

Kota Kinabalu, Malaysia 13-15 November 2009

Volume 2 Pages 1-579

Page 14: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

2009 International Conferenceon Computer Technology

and Development

ICCTD 2009Table of Contents

Volume - 2

Preface - Volume 2Organizing Committee - Volume 2Reviewers - Volume 2

Session 17

A Kind of “4-high-1-low” Traffic Model for On-Chip Crossbar .........................................................................3

Zhao Hongzhi

Real Time Protocol Using Wavelets .........................................................................................................................7

Basim Alhadidi and Zyad Thalji

Solution for String Matching Problem of Indian Alphabetical Letters .............................................................11

Adnan I. Al Rabea, Mohammd Jaber, and A.V. Senthil Kumar

A New Stability Criterion of Networked Control Systems .................................................................................15

Xiaohua Ge, Xiefu Jiang, and Xinxin Zhang

A New Stability Criterion of Fuzzy Systems with Interval Time-varying Delay ............................................20

Xingxu Yang, Xiefu Jiang, and Xinxin Zhang

Analysis on the One-Way Communication Capability of GPS Satellites

in Orbit Transmitting Non-navigational Information ...........................................................................................24

Cheng Xi-jun, Xu Jiang-ning, Cao Ke-jin, and Zhu Ying-bin

Performance Analysis in Frequency-Time-Hopping Multicarrier

Code-Division Multiple Access Systems ...............................................................................................................30

Hossein Kamrani and Alireza Zolghadrasli

Power Effective Source Routing Protocol in Mobile Ad hoc Network ............................................................35

Ashutosh Singh

Page 15: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Adaptive Routing In Ad Hoc Wireless Networks Using Ant Colony

Optimization ...............................................................................................................................................................40

Vahide Rajabi Zanjani and Abolfazl Toroghi Haghighat

Tree Optimization In Overlay Multicast Based on Location and Bandwidth ..................................................46

Maryam Bagheri and Ali Movaghar

Session 18

Study on Time Characteristics of Marine UV Scattering Communication .......................................................53

Wang Ping, Gao Jun, Xu Zhijun, and Wang Hongxia

ECG Parameter Extraction Algorithm using (DWTAE) Algorithm ..................................................................57

Abdulrhman Elbuni, Salah Kanoun, Mohamed Elbuni, and Nasser Ali

Performance Analysis of Low Density Parity Check Codes for Cognitive

Radio ............................................................................................................................................................................63

Ashfaq Ahmed, Adeel Akram, and Waleed Ejaz

Improvement and Simulation for a Localization Based on APIT ......................................................................68

Feng Xiu-fang and Qi Hui-bo

A Computer Vision-Based Classification Method for Pearl Quality

Assessment .................................................................................................................................................................73

Chunyu Tian

Numerical Investigation on Two-Phase Flow Distribution in Plate-Fin Heat

Exchangers and Experimental Verification ...........................................................................................................77

Jianghong Wu, Xihui Wang, and Guang Ouyang

Numerical Simulation of Active Magnetic Regenerative Refrigerators ...........................................................81

Jianghong Wu and Zheng Zhang

Automated Reference Services ................................................................................................................................85

Pradit Songsangyos and Suwut Tumthong

No-Reference Quality Prediction of Distorted/Decompressed Images Using

ANFIS .........................................................................................................................................................................90

Indrajit De and Jaya Sil

Clustered P2P Proxy-Assisted Architecture for On Demand Media Streaming ..............................................95

Yehya Labib, Ahmed El Sherbini, and Amani Sabri

Session 19

Correctness Proof and Complexity Analysis of the Hybrid Reasoning

Algorithm of Beta-PSML .......................................................................................................................................103

Yila Su

Performance of WiMAX Security Algorithm (The Comparative Study of RSA

Encryption Algorithm with ECC Encryption Algorithm) .................................................................................108

Masood Habib, Tahir Mehmood, Fasee Ullah, and Muhammad Ibrahim

ECA Rule Analysis in a Distributed Active Database .......................................................................................113

Joselito Medina-Marín, Gilberto Pérez-Lechuga, and Xiaoou Li

Page 16: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Application of Modern Technology in New Insurance Product Development ..............................................117

Ondrej Matustik and Pavel Pesout

Study on the Rural Financial Service in Undeveloped Areas in China Taking

Heilongjiang Province as an Example ..................................................................................................................122

Yubo Ma and Shengde Hu

Research on the Application of RBF NN on Enterprise Early-warning .........................................................126

Shuping Yang

Derivative Pricing and Hedging on Carbon Market ...........................................................................................130

Eric Paul, Marius-Cristian Frunza, and Dominque Guegan

Using Neural Network for Predicting Induction-heating Paths in Shipyard ..................................................134

Truong-Thinh Nguyen and Young-Soo Yang

Hydrodynamic Design and Optimization: Application to Design a General

Case for Extra Equipments on the Submarine’s Hull .........................................................................................139

Amirhosein Mosavi

A Simulation Model for Optimizing Support Resources in Requirement

of Warship Mission Reliability ..............................................................................................................................144

Rui Wang, Qing-min Li, Hong-bing Zhu, and Ying-wu Peng

Research on Submarine Maneuverability of Flooded Compartment ...............................................................149

Liu Hui, Pu Jinyun, and Jin Tao

Research on Wartime Damage Simulation and Intelligent Decision System

of Ship Fire Fighting System .................................................................................................................................153

Lv Chen-guang and Pu Jin-yun

Session 20

Improving Logic Programming in Hopfield Network with Sign Constrained ...............................................161

Saratha Sathasivam

An FPGA Implementation of Gradient Based Edge Detection Algorithm

Design ........................................................................................................................................................................165

Indra Yasri, Nor Hisham bin Hamid, and Voon Vooi Yap

Alert Correlation Using Correlation Probability Estimation and Time

Windows ...................................................................................................................................................................170

Seyed Hossein Ahmadinejad and Saeed Jalili

Portable Network Monitoring System for Passive Optical Network (PON) ..................................................176

Boonchuan Ng, Mohammad Syuhaimi Ab-Rahman, Aswir Premadi, and Kasmiran Jumari

Niching with Sub-swarm Based Particle Swarm Optimization ........................................................................181

Muhammad Rashid, Abdul Rauf Baig, and Kashif Zafar

Based on the Moving Horizon Estimation of the Nonlinear Parameters

Optimization .............................................................................................................................................................184

Wang Jianfang and Li Weihua

Page 17: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Discovering the Rules in a Poker Player’s Mind Based on the Association Rule

Mining .......................................................................................................................................................................189

Afshin Mehrabi and Abolfazl Toroghi Haghighat

Business to Consumer E-commerce Enterprises Analysis: A Case Study

of Zgpgc.com ............................................................................................................................................................194

Xiaohong Wang, Liwei Li, Ling Tian, and Lifeng Xu

Session 21

Knowledge Sharing Interactions in Collaborative Software Maintenance

Environment .............................................................................................................................................................201

Mohd Zali Mohd Nor, Rusli Abdullah, Mohd Hasan Selamat,

and Masrah Azrifah Azmi Murad

Establishing an Efficient and Searchable Encrypted Log Using Record

Authenticator ............................................................................................................................................................206

Arash Sabbaghi and Fariborz Mahmoudi

A New S-Box Structure to Increase Complexity of Algebraic Expression

for Block Cipher Cryptosystems ...........................................................................................................................212

Bao Ngoc Tran, Thuc Dinh Nguyen, and Thu Dan Tran

A Novel Approach for IT Governance: A Practitioner View ...........................................................................217

Ramin Nassiri, Samira Ghayekhloo, and G. Latif Shabgahi

The IGWM Method for Tabriz Traffic Modeling: Data-Oriented Approach .................................................222

Ahmad Habibizad Navin, Nima Jafari Navimipour, and Mirkamal Mirnia

Owner-Controlled Towards Personal Information Stored in Hippocratic

Database ....................................................................................................................................................................227

Norjihan Abdul Ghani and Zailani Mohamed Sidek

Effects of Heavy Tailed Distribution on Statistical and Neural Network Based

Control Charts ..........................................................................................................................................................232

Ong Hong Choon and Poh-Ying Lim

Evaluation of Location-Aware Travel Guide ......................................................................................................237

Mohammad Hafiz Bin Ismail, Aznoora Osman, and Nadia Abdul Wahab

Theoretical Framework of the Effect of Extrinsic Rewards on Individual’s

Attitude Towards Knowledge Sharing and the Role of Intrinsic Attributes ...................................................240

Aamir Amin, Mohd Fadzil Hassan, Mazeyanti Bt. Ariffin, and Mobashar Rehman

E-Mentor: Sharing and Preserving Knowledge in Organization ......................................................................244

Eliza Mazmee Mazlan, Shakirah Mohd Taib, and Zuriani Abdul Karim

Page 18: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Session 22

The Challenges of Open Source Software Development with Collaborative

Environment .............................................................................................................................................................251

Rusli Abdullah, Modi Lakulu, Hamidah Ibrahim, Mohd Hasan Selamat,

and Mohd Zali Mohd Nor

Automatic Protection Unit in Application of Restoration Scheme for FTTH

Passive Optical Network ........................................................................................................................................256

Siti Asma Che Aziz, Mohammad Syuhaimi Ab Rahman, and Kasmran Jumari

Stress and Strain Distribution in Cemented Total Hip Arthroplasty for Walking

Load Case ..................................................................................................................................................................260

Abdul Halim Abdullah, Mohd Asri Mohd Nor, and Alias Mohd Saman

Hybrid Automatic Meter Reading System ...........................................................................................................264

Aryo Handoko Primicanta, Mohd Yunus Nayan, and Mohammad Awan

Network Performance Analysis of Internet Telephony on SIP in ENUM

Implementation ........................................................................................................................................................268

Yudha Indah Prihatini, Wahyu Novian Condro Murwanto, Adi Permadi, and Rendy Munadi

Application of Neural Network for Scour and Air Entrainment Prediction ...................................................273

Ahmed Elshafie, Ali A. Najah, and Othman A. Karim

ANFIS-Based Model for Real-time INS/GPS Data Fusion for Vehicular

Navigation System ...................................................................................................................................................278

Ahmed El Shafie, Aini Hussain, and Abo Elmagd Nour Eldin

Session 23

Homes Appliances Controlled Using Speech Recognition in Wireless Network

Environment .............................................................................................................................................................285

Mardiana B., Hazura H., Fauziyah S., Zahariah M., Hanim A.R., and Noor Shahida M.K.

RFID Based Laboratory Management System ....................................................................................................289

Hazura H., Mardiana B., Fauziyah S., Zahariah M., Hanim A.R., and Siti Normi Z.

Designing a Low Cost Electronic Devices Switching System Controlled

by Short Message Service ......................................................................................................................................292

Zahariah M., Mardian B., Hazura H., Fauziyah S., and Hanim A.R.

Implementation of 2-Pass Mesh Warping Algorithm by Using Bezier Curve ...............................................296

Vilas Lambture, Abhay Gaidhani, and Shashikant Kamble

Using Fractal Filtering Technique for Processing ETM Data as Main Criteria

for Evaluating of Gold Indices In North West of Iran .......................................................................................298

Reza Mehrnia

VASD: Video Action Scene Detector Using Audio Visual Data .....................................................................303

Lili N.A.

Enhancement of Microscopic Images Using Modified Self-Adaptive Plateau

Histogram Equalization ..........................................................................................................................................308

Nicholas Sia Pik Kong, Haidi Ibrahim, Chen Hee Ooi, and Derek Chan Juinn Chieh

Page 19: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Real Time Optical Network Monitoring and Surveillance System ..................................................................311

Aswir Premadi, Boonchuan Ng, Mohammad Syuhaimi Ab-Rahman, and Kasmiran Jumari

Image Super-Resolution via Discrete Tchebichef Moment ..............................................................................315

Nur Azman Abu, Wong Siaw Lang, and Shahrin Sahib

Simultaneous Detection and Tracking in Airborne Video ................................................................................320

Yan Huang and Xiling Luo

Session 24

Fast Tracking of Humans in Frequently Occurring Entry, Exit and Occlusion

Scenarios ...................................................................................................................................................................327

M.E. Rashid, S. Remya, and M. Wilscy

An Edge-Based Approach for Video Text Extraction .......................................................................................331

Shi Jianyong, Luo Xiling, and Zhang Jun

Recognizing Face Features Using Points of Active Contour, PHP – Image

Processing and GD Grafic Extension ...................................................................................................................336

Gheorghe Sabau, Maria Liliana Costin, and Elena Posdarie

Fuzzy Enhancement for Color Image Processing ...............................................................................................340

Suzan Abdulla Mahmood

Butterfly Subdivision Scheme Used for the Unorganized Points

Reconstruction in Virtual Environment ...............................................................................................................345

Iklima Mohamad and Abdullah Bade

Camera Auto-Calibration Based on Motion Detection for Airborne Traffic

Surveillance ..............................................................................................................................................................350

Ma Qiang and Luo Xiling

Impulse Detection Adaptive Fuzzy (IDAF) Filter ..............................................................................................355

H.S. Kam and W.H. Tan

Extraction of Blood Vascular Network for Development of an Automated

Diabetic Retinopathy Screening System ..............................................................................................................360

S. Jerald Jeba Kumar and M. Madheswaran

Session 25

Design and Implementation of an Improved Wavelet Filter Architecture Using

Pipelined Addition Reordering Technique ..........................................................................................................367

Vidhya Lavanya R. and M. Madheswaran

Detection of Intrauterine Growth Retardation Using Fetal Abdominal

Circumference ..........................................................................................................................................................371

J. Nithya and M. Madheswaran

Extraction of Fetal Biometrics Using Class Separable Shape Sensitive

Approach for Gestational Age Estimation ...........................................................................................................376

B. Priestly Shan and M. Madheswaran

A Robust and Blind 3D Mesh Watermarking Driven by Stable Regions .......................................................381

Saoussen Ben Jabra and Ezzeddine Zagrouba

Page 20: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Development of Smart Drop Restoration Scheme for Customer’s Ease in

the i-FTTH EPON Network Solution ...................................................................................................................386

Siti Rahayu Hassan, Mohd Syuhaim Ab-Rahman, and Kasmiran Jumari

Enhancement of Bone Fracture Images by Equalization Methods ..................................................................391

N. Ravia Shabnam Parveen and M. Mohammed Sathik

An Efficient Image Compression Technique Using Peak Transform .............................................................395

S. Anila and N. Devarajan

A Proposed Hybrid OCR System for Arabic and Indian Numerical Postal

Codes .........................................................................................................................................................................400

Yasser M. Alginahi and Abdul Ahad Siddiqi

Study of PCB Automatic Optical Inspection System Based on Mathematical

Morphology ..............................................................................................................................................................405

Li-zong Lin, Luo-shan Zhou, Jian-ding Wan, and Zhi-qin Qian

Session 26

A Review on Fingerprint Classification Techniques .........................................................................................411

Fadzilah Ahmad and Dzulkifli Mohamad

Haptic Vibration for Emotional Expression of Avatar to Enhance the Realism

of Virtual Reality .....................................................................................................................................................416

Ahmad Hoirul Basori, Abdullah Bade, Mohd Shahrizal Sunar, Daut Daman,

and Nadzari Saari

Integrated Approach to Block Adult Images in Websites .................................................................................421

Vijayendar G. and Sakthi Priya Balaji R.

Spur Gear Design with an S-shaped Transition Curve Application Using

Mathematica and CAD Tools ................................................................................................................................426

Saifudin Hafiz Yahaya, Jamaludin Md. Ali, and Mohd Shukor Salleh

On Faster Bounding Volume Hierarchy Construction for Avatar Collision

Detection ...................................................................................................................................................................430

Norhaida Mohd Suaib, Abdullah Bade, Dzulkifli Mohamad, and Hamzah Asyrani Sulaiman

Motion Graph for Character Animation: Design Considerations .....................................................................435

Rafidah Abd Rahim, Norhaida Mohd Suaib, and Abdullah Bade

Session 27

Innovating IT Education and Accelerating IT Service Outsourcing Talent

Training .....................................................................................................................................................................443

Li Nai-xiang

A New Method for Large Scale Nonnegative Least Squares Problems ..........................................................448

Longquan Yong

Knowledge Internalization in Academic Work Practice: A Strategy

in Educational Identity Transformation ...............................................................................................................451

Haryani Haron and Rose Alinda Alias

Page 21: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Annotating Learning Materials on Moodle LMS ...............................................................................................455

Hsien-Tang Lin, Chih-Hua Wang, Chia-Feng Lin, and Shyan-Ming Yuan

An XML-Based Syllabus Repository System for Inter-university Credit

Exchange Systems ...................................................................................................................................................460

Somchai Chatvichienchai

Biopower: The Green Technology for Sustainable Development ...................................................................465

Ansu Abraham

Developing Primary and Human Resource Business Processes Based

on EQUIS ..................................................................................................................................................................470

Mursyid Hasanbasri and Andri Iesmail

Interactive Electronic Reader to Support English Education ............................................................................475

Rowel O. Atienza and Tyrone W. Tai

An Exploratory Study of Storytelling Approach as an Instructional Tool

from Educators’ Perspective ..................................................................................................................................480

Savita K. Sugathan and Khairul Shafee Kalid

Session 28

The Research of Metacognitive Theorys Training on English Self-efficacy .................................................487

Zheng Hongyan, Niu Guixia, and Tian Huiqing

English Vocabulary Learning System Based on Theory of Depths

of Processing ............................................................................................................................................................491

Zheng Hongyan, Wang Xiaohui, and Han Liyang

Evaluation of Factors Affecting the Efficacy of English Acqusition in CALL

Environment .............................................................................................................................................................494

Zheng Hongyan, Xiao Yongmei, and Li Zhe

Anatomy of Internet Marketing Mix; A Holistic Paradigm ..............................................................................497

Rashad Yazdanifard and Arash Najmaei

How to be an Innovative Organization - Developing a Culture of Innovation

in Organizations .......................................................................................................................................................502

Upasana Kanchan and Abhishek Gupta

Research on Multi-objective Talented Factors Based Genetic Algorithm ......................................................506

Liu Ze-shuang and Gao Ying

Research on the Jurisdiction of Copyright Infringement Based on E-commerce ..........................................509

Liu Chundi

Management of Technology: The Case of e-Voting in Estonia .......................................................................512

Tarmo Kalvet

Initiatives and Challenges in Countering Inappropriate Internet Use ..............................................................516

Kittichote Rojanakul and Hu Liang

Page 22: 2009 International Conference on Computer Technology and ...toc.proceedings.com/07036webtoc.pdf · Jonathan Sidi, Liew Wei Fa, and Syahrul N. Junaini Hardware Architecture of Protection

Session 29

APEX University: Is it the Malaysian Way Forward? .......................................................................................523

Fareiny Morni, Muhamad Syukri Abu Talip, Kamaruzaman Jusoff, and Fatimah Bujang

Crafting Excellent I-Brands by Rendering an Intensive Internet Marketing Mix .........................................527

Rashad Yazdanifard, Arash Najmaei, and Zahra Sadeghinejad

Professional Approach to Sustainable Development: Need for Solidarity

Managers ...................................................................................................................................................................536

Namrata Vasudeo

Sustainable Development through Watershed Management: A Case Study

of Karondi Milli-Watershed Project, MP (India) ................................................................................................539

Sebastian Lakra

Introduction of Ethical Subject in Re-designed PhD-level Computer Education

Curriculum: A Teaching Experience Driven in Thailand ..................................................................................543

Nidapan Sureerattanan

Research on Education of Graduates for Computer Specialty in Financial

and Economical Colleges .......................................................................................................................................547

Limin Wang, Yongmei He, Xuming Han, and Shuying Zhang

Research on University Resource Management Based on Digital Campus ...................................................551

Limin Wang, Ming Li, Xuming Han, and Huimin Zhang

Session 30

A Cogredient Algorithm for the m-th Power of r-Circulant Matrices .............................................................557

Guangyuan Zhao

The Hermitian Positive Definite Solution of Nonlinear Matrix Equations ....................................................561

Guangyuan Zhao

The Improved Nonsingularity on the r-Circulant Matrices in Signal Processing ..........................................564

Guangyuan Zhao

The Property of Kippenhahn Curves of Hadamard Products and Applications .............................................568

Guangyuan Zhao

Research on Workflow Modeling Based on Object-oriented Colored Pet Net ..............................................572

Yang Jun, Yu Yong-li, and Qu Chang-zheng

A Fast Algorithm for Evaluating the m-th Power of Level Circulant Matrices

of Type ......................................................................................................................................................................576

Guangyuan Zhao

Author Index - Volume 2