{"title":"Study of Bike Customers Value Analysis","authors":"Ming-Haur Shih","doi":"10.1109/ICICIC.2009.339","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.339","url":null,"abstract":"This research aims to group bicycle customers' data through RFM (recently, frequency, monetary amount) model to find out characteristics of different customer clusters. Then this research designs the scales that conform to bicycle product and service quality (2) to locate overall dimension of product and service quality. Additionally this research uses grouping result and questionnaire survey (3) to conduct weighting analysis by different analytical items to realize the importance of each factor and make a ranking. Results indicate that Giant bicycle has won more recognition than Merida bicycle in the aspects of important customer and secondary customer.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real-Time Vehicle Routing Method with Diversion for Immediate Requests","authors":"Yan Fang, Xiangpei Hu, Mudan Bai, Wenjuan Wang","doi":"10.1109/ICICIC.2009.48","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.48","url":null,"abstract":"Real-time vehicle routing that can divert a vehicle away from its fixed route in response to a new customer request is beneficial to flexible routing for its efficiency in quick response and saving cost especially when the density of customer requests is low. In this paper, a real-time method for assigning immediate request, which allows diversion, is proposed. A multi-objective model is built for the real-time vehicle routing problem with immediate requests considering the cost, and passengers on bus and waiting at stops. An empirical quick response and local optimization approach is proposed, which makes trade off between the computation time and the solution quality. A numerical experiment based on the real-world case has been designed to test the effectiveness of the proposed method. Comparison on the methods with or without diversion demonstrates the potential savings can be obtained through the proposed approach. The method proposed also has potential application meaning for handle real-time vehicle routing in schools, tourist places, and manufactories logistics.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131422783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Acceptance and Use of the Learning Management System","authors":"Din Jong","doi":"10.1109/ICICIC.2009.347","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.347","url":null,"abstract":"The study utilized UTAUT (Venkatesh et. al., 2003) to determine technology acceptance of learning management system of Taiwan technical university students. This study used cluster sampling and stepwise regression analysis to determine the relationships among constructs. Research results showed that performance expectancy, attitude toward using technology, facilitating conditions, self-efficacy, and social influence have significant influence on behavior intention. Additionally, only behavior intention, attitude toward using technology, and social influence have direct impact on system usage.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131627312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Realization of TLM","authors":"Yibin Li, V. Chouliaras, J. Flint","doi":"10.1109/ICICIC.2009.227","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.227","url":null,"abstract":"This paper presents the development of the hardwired engine for the TLM application by using ESL based design flow. In the hardwired approach, the dedicate engine for TLM was developed using a novel ESL design flow. The scalar form was explored to post-synthesis stage. The inherent parallelisms are also realized by the hardware. Finally, from comparing with the previously developed programmable approach, the trade-off between programmable and hardwired approach can be studied.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127817946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New P2P File Sharing System Based on the Access Distribution Property","authors":"Y. Hattori, T. Nakashima","doi":"10.1109/ICICIC.2009.36","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.36","url":null,"abstract":"The current Internet traffics depend more on the P2P type communication than the legacy client-server type communication. The P2P communication has been applied to diverse systems such as the VoIP and the file sharing system for the P2P potential ability. The distributed file sharing system over the P2P network using DHT (Distributed Hash Table) can especially provide the quick search, while the file accesses from the remote user does not follow the uniform distribution causing the degradation of searching performance. In this paper, we firstly propose the new searching algorithm based on the access distribution revising the Chord algorithm using the distribution management host. Secondly, the mechanism of the distribution management host is to be applied as the distribution algorithm maintained over the all Chord ring structure. Evaluation of the performance of proposed mechanism is carried out after the implementation of the algorithms using management host.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dao-Lai Cheng, Chui-Jie Yi, Zhiqiang Zhang, Xianbo Xiao, H. Yao
{"title":"Comparative Analyses and Experiment Verification on Cockpit Background Sound' Characteristic Frequency","authors":"Dao-Lai Cheng, Chui-Jie Yi, Zhiqiang Zhang, Xianbo Xiao, H. Yao","doi":"10.1109/ICICIC.2009.142","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.142","url":null,"abstract":"Because the characteristic frequencies of cockpit background sound recorded by Cockpit Voice Recorder (CVR) is the key evidence in investigating accident causes for wrecked airplane. And it is crucial for investigator to verify the characteristic frequencies through different methods. To obtain exact characteristic frequencies for cockpit background sound, systematic research are made. Firstly,the CVR signals is classified into speech signals, non-speech signals; then, cockpit voice decoding system (CVDS) is developed according to the audio principles. Through the CVDS,the cockpit background sounds are differentiated & heard, and as an example of a background sound signal, an overspread warning signal initial spectrum characteristics are obtained. At the same time,to get more exact spectrum characteristics of the signal, three algorithm methods(wavelet transform-WT, Chirp z- transform-CZT, correlation analyses-PSD) are applied to the signal respectively, their characteristics frequency(maximum frequency) are acquired and almost identical. Finally, to prove the algorithm results, the experiment verification to characteristic frequency of over speed warning signal and other three kinds cockpit background sounds from airplane cockpits are checked out and analyzed in whole anechoic room with the aid of LMS SC305 instrument and its software.Research indicates that the experiment characteristic frequency spectrums of the cockpit background sounds are identical with the three algorithm methods. The concludes of the paper provides better approaches for civil aviation experts to comprehend the cockpit sound signals characteristics and reveal wreckage aircraft causes.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132919167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaysonne A. Pacurib, Glaiza Mae M. Seno, J. P. T. Yusiong
{"title":"Solving Sudoku Puzzles Using Improved Artificial Bee Colony Algorithm","authors":"Jaysonne A. Pacurib, Glaiza Mae M. Seno, J. P. T. Yusiong","doi":"10.1109/ICICIC.2009.334","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.334","url":null,"abstract":"Sudoku puzzles belong to a set of hard problems called NP-Complete problems. A Sudoku puzzle is a logic-based combinatorial puzzle with rules that are relatively simple. Various algorithms have been applied to solve this combinatorial problem. A relatively new algorithm called Artificial Bee Colony algorithm was developed in 2005. The algorithm mimics the way bees forage for food and has been successfully applied to a wide array of NP-Complete problems. This paper explores the possibility of using an improved variant of the Artificial Bee Colony algorithm in solving Sudoku Puzzles. The results obtained support the conclusion that the algorithm can be used to solve Sudoku Puzzles efficiently and effectively.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Chao, Tsair-Fwu Lee, Te-Jen Su, Chieh Lee, M. Cho, Chang-Yu Wang
{"title":"Boundary Finding Combining Wavelet and Markov Random Field Segmentation Based on Maximum Entropy Theory","authors":"P. Chao, Tsair-Fwu Lee, Te-Jen Su, Chieh Lee, M. Cho, Chang-Yu Wang","doi":"10.1109/ICICIC.2009.128","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.128","url":null,"abstract":"Boundary finding is one of the most important aspects in medical image processing. Wavelet edge detector becomes popular in recent years but is known to degrade in noisy situations. This study aimed to develop an advance precision image segmentation algorithm to enhance the blurred edges clearly for medical target definition. A new method of combining wavelet analysis with Markov Random Field (RBF) segmentations has been developed to improve the performance of boundary finding. We found that the resulting boundary is indeed much superior than using the wavelets or RBF segmentations performed alone. Experimental results of a magnetic resonance of imaging (MRI) proved the method shall have important practical values.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131776180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Weighted Subspace Clustering Algorithm in High-Dimensional Data Streams","authors":"Jiadong Ren, Lining Li, Changzhen Hu","doi":"10.1109/ICICIC.2009.64","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.64","url":null,"abstract":"Clustering is a significant and difficult problem in data stream mining due to a mass of streaming data arriving continuously. High-dimensional data streams make clustering analysis more complex because of the sparsity of data. In this paper, we propose a new clustering method for highdimensional data streams, called WSCStream. The method incorporates a fading cluster structure and a dimensional weight matrix. We assign a weight to each dimension of corresponding cluster in the matrix. The weight associated with each dimension indicates the importance of each dimension to the corresponding cluster. The weighted distance between a cluster and a data point is used to obtain the final clusters as the new data points arrive over time. Experimental results on real and synthetic datasets demonstrate that WSCStream has higher clustering quality than PHStream.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134326773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path Converged Design Application to Alternative Strategy of Migration","authors":"Juying Zeng, Bing Xu, Yafen Wang","doi":"10.1109/ICICIC.2009.292","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.292","url":null,"abstract":"Path-converged design is applied to first identify allocation efficiency of population resource and to second realize allocation efficiency with alternative strategy of migration under efficiency-oriented framework. The path converged design allows us to identify allocation efficiency from distribution of inefficiency by inefficiency interval and inefficiency strength rather than from parameters of inefficiency in previous researches. First, the identification finds out the inefficiency strengths of population allocation are most significant in Western region and large cities from respective perspectives of regional location and city scale. Second, alternative strategy is proposed to realize efficient allocation and the decision making on population migration in Western large cities is effective since it reduces the inefficiency strength by 18 percents.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"119 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}