Submitted Papers



  1. The Problem of Taiwanese Investment on Electronic Computer Industries in China,
    By Francois L.S. Soh from Yuan Ze University, Taiwan,   ID Number: 001.
     

  2. Citizenship Behavior, Social Capital and Information Strategy of Companies in China,
    By Zhirong Duan from School of Economics and Management, Tsinghua University, Beijing, China,   ID Number: 002.
     

  3. Blurred Image Comparison Search Engine Based on Discrete Cosine Transformation,
    By Jeanne Chen, Tung-Shou Chen, Kwang-Fu Li, Zhi-Haur Wu from Department of GEC Computer Science Div. Hungkuang Institute of Technology Department of Information Management National Taichung Institute of Technology from Taiwan, China,   ID Number: 003.
     

  4. Parameter Estimation in Double-Truncated Markov Switching Model,
    By Ye Jun , Liu Yanbo from Department of Mathematical Sciences, Tsinghua University, Beijing, China,   ID Number: 004.
     

  5. Opening a Website Where One can Get Bench-mark Data Sets of the Set Covering Problem,
    By K.Iwamura, M.Horiike, N.Okada and Y.deguchi from Japan,    ID Number: 005.
     

  6. Testing Equilibrium Tourism, Policy, and the Convergence p Value,
    By Hsieh Hsih-chia from Providence University, Taiwan,    ID Number: 006.
     

  7. Designing a Broadcasting Cryptosystem for Low Computation Capabilities,
    By Hui-Feng Huang and Chin-Chen Chang from National Chung Cheng University, Taiwan.   ID Number: 007.
     

  8. A Prediction of VQ Indices by Utilizing DWT and Support Vector Machines, By Chin-Chen Chang and Chia-Te Liao from National Chung Cheng University, Taiwan,   ID Number: 008.
     

  9. An Intellectual Property Right Protection Scheme for Digital Images Using Support Vector Machines,
    By Chin-Chen Chang and Chia-Te Liao from National Chung Cheng University, Taiwan,    ID Number: 009.
     

  10. A Characteristic Rules Mining Scheme Based on Weighted Incidence Matrices,
    By Tzu-Chuen Lu, S. Wesley Changchien and Chin-Chen Chang from National Chung Cheng University, Taiwan,    ID Number: 010.
     

  11. A Hierarchical Weighted Threshold Multi-secret Sharing Scheme,
    By Chin-Chen Chang and Ya-Ping Pan from National Chung Cheng University, Taiwan,    ID Number: 011.
     

  12. Analysis of Supply Commitments with Unlimited Flexibilities,
    By Zhaotong Lian, Liming Liu and Xiang Zhu from University of Macau,    ID Number: 012.
     

  13. Security of Digital Signature Scheme Based on Factoring and Discrete Logarithms,
    By Chin-Chen Chang and Ya-fen Chang from National Chung Cheng University, Taiwan,    ID Number: 013.
     
  14. Quality Management Practices and Organizational Context in Service Industries,
    By Xiande Zhao from Department of Decision Sciences and Managerial Economics Chinese University of Hong Kong, China. ID Number:014
     

  15. System Performance Risk Analysis Model for Uncertain Supply-Chain Network Based on Stochastic Network Simulation,  
    By  Heung-Suk Hwang from Dong-eui University , KOREA,   ID Number: 039
     

  16. An Adaptive Neural Network Model and Its Application to Fuzzy GMDH-type Forecasting, 
    By  Heung-Suk Hwang from Dong-eui University , KOREA,  ID Number: 040
     

  17. A Risk Analysis of Channel Coordination of Cupply Chain With Contract,
    By ZHANG Long, SONG Shiji, LIU Lianchen,  WU Cheng from CIMS Engineering Research Center, Tsinghua University, China, ID Number:041
     

  18. A Study on the Comparison of Mutltispectral Image Classifiers for High Ground Resolution Images,
    By Chih-Cheng Hung, from Southern Polytechnic State University, ID Number:042
     

  19. Optimizing Intranet Topology under Enterprise Information System’s Requirements,
    By Jau-Ji Shen, Tzung-Liang Hung from Chaoyang University of Technology, Taiwan,   ID Number:043
     

  20. The Concept of Effective Incremental Maintenance for View in Data Warehousing,
    By Jau-Ji Shen,  Yi-Pei Hsieh from Chaoyang University of Technology, Taiwan,   ID Number:044
     

  21. Use of Decision Support Systems as Surrogate Supervisory Agents for the Uncaring Servers,
    By John D. Hwang from California State University, USA,     ID Number:045
     

  22. An Adaptive Two-Stage Codebook Search Algorithm Using Principal Component Analysis and Dynamic Subspace Rechecking,
    By Piyu Tsai, Yu-Chen Hu, and Chin-Chen Chang from National Chung Cheng University, Taiwan    ID Number:046
     

  23.  Application of Experimental Design to Improve The Cost of UV Ink,
    By Jhy-Ping Jhang and Shih-Ta Chan from Huafan University, Taiwan.  ID Number:047
     

  24. Applying the Neural Fuzzy System to Predict Sugar Consumption and Production: Evidence from the Egyptian Sugar Industry,
    By Medhat Mohamed Abdelaal from Ein Shams University ,Egypt.   ID Number:048
     

  25. Assessing Normality of Data:  A Simple and Effective Spreadsheet Tool,
    By  Stephen C. Hora from University of Hawaii.   ID Number:049
     

  26.  Supply Chain Coordination under Asymmetric Information,
    By SUO Hansheng, JIN Yihui from Tsinghua university, China,  ID Number:050
     

  27.  RSA Based Eigenvalue for Detecting and Restoring an Image Destruction,
    By Keh-Jian Ma, Tung-Shou Chen, and Meng-Yun Chen from National Taichung Institute of Technology, Taiwan,    ID Number:051
     

  28.  A Color Image Retrieval Method Based on Regional Color Moment and Wavelet-Based Features,
    By Yung-kuan Chan and Chin-Chen Chang  from National Chung Cheng University, Taiwan,    ID Number:052
     

  29. A High Capacity Image Hiding Scheme for Binary Images ,
    By Chin-Chen Chang and Tai-Xing Yu from National Chung Cheng University, Taiwan,    ID Number:053
     

  30. Using Similarity and Homogeneity for the Comparison of Images,
    By Dietrich Van der Weken from Ghent University,Belgium,  ID Number:054

  31.  A New Approach for Localization of Vehicle License Plates ,
    By Chun-Chie Yu and Wen-Kuang Chou  from Providence University, Taiwan,      ID Number:055

  32.  Developing the Right E-Procurement Strategy,
    By Jerry C. Wei,  from University of Notre Dame, Notre Dame,   ID Number:056

  33. Networking Security and Privacy Strategies in E-business,
    By Nancy Tsai from California State University, Sacramento, USA.   ID Number:057

  34. Analysis to Competitive Advantages for Alishan National Scenery Area Accommodation Facilities,
    By Cheng-Tsung Hwang and Chia-Feng Wang  Chin-Ban Lin from  Providence University , Taichung, Taiwan,  ID Number:058

  35. A List-based Low Power Scheduling Technique for Intelligent Memory System,
    By Tsung-Chuan Huang from National Sun Yat-sen University , Taiwan,    ID Number:059

  36. Effects of Promoters and Job Interdependence on R&D Employee’s Knowledge Sharing Willingness in High -Tech Industry,
    By Bi-Fen Hsu1 from National Yunlin University of Science & Technology, Taiwan,     ID Number:060

  37. Mobile Credit Payment Scheme,
    By Wei-Bin Lee and Chia-En Lee from  Feng Chia University, Taiwan,    ID Number:061

  38. A Formal Model of Enterprise Diagnostic Expert System Based on Fuzzy Set-Covering,
    By Wei Yu, Hui Shen, Jieping Liu, Yuliu Chen, Qing Li from  Tsinghua University, Beijing, China,   ID Number:062

  39. Process Costing Method By Using IDEF3 Models,
    By Tao Li, Ningyu Ma, Qing Li, Yuliu Chen from  Tsinghua University, China       ID Number:063

  40. IDEF3-based Business Process Simulation Modeling,
    By NING Ke, LI Qing, SHEN Hui, NIU Dong, CHEN Yu-liu from Tsinghua University,  China,  ID Number:064

  41. Group Decision Support for Enterprise Integration: Design of a GDSS Considering both Individual Consistency and Group Consensus,
    By Hui Shen, Yuliu Chen, Ke Ning, Wei Yu, Ningyu Ma from Tsinghua University, Beijing, China,  ID Number:065 

  42. Application of Q-Learning algorithm for Traveling Salesman Problem,
    By Li Lei from  Hosei University, Japan,    ID Number:066

  43. Performance Indicator Selection and Evaluation of Business Process:
    the Application of Balanced ScoreCard Philosophy ,
    By Liu Xin, Li Qing, Chen Yuliu, Shen Hui, Ma Ningyu from  Tsinghua University, Beijing, China.   ID Number:067 

  44. A Fast Method for Linear Space Pairwise Sequence Alignment,
    By Chin-Chen Chang from National Chung Cheng University, Taiwan.  ID Number:068

  45. The Effects of It Intensity and  Absorptive Capacity on CRM Practices,
    By Ja-Shen Chen from  Yuan-Ze University, Taiwan.  ID Number:069

  46.  On selection of centroids of fuzzy clusters for color classification,
    By Dae-Won Kim and Kwang H. Lee from  Korea,  ID Number:070

  47.  Service Quality Assurance: First Define Consumer Satisfaction Guarantees and Warranties,
    By Robert S. Owen from Texas A&M University-Texarkana,  USA,  ID Number:071

  48. A New Improvement of Lempel-Ziv-Welch Method,
    By Ji-Han Jiang,  Chin-Chen Chang, and Tung-Shou Chen From National Chung Cheng University, Taiwan,   ID Number:072

  49. Rehash Method: A Compression Technique of Sparse Binary-Matrices,
    By Jiang, Chen, and  Chin-Chen Chang  From National Chung Cheng University, Taiwan,    ID Number:073

  50. An ID-Based Conference Key Agreement Protocol for Secure Network Communications,
    By Iuon-Chang Lin from National Chung Cheng University, Taiwan.   ID Number:074

  51. Improvements on Generalized Threshold Cryptosystems,
    By Hwang, Shin-Jia from TamKang University, Taiwan,     ID Number:075

  52. A Study of Blended Learning,
    By Chyi-Ren Dow and Su-Hui Lin from Feng Chia University, Taichung, Taiwan.    ID Number:076

  53. Collaborative Enterprise Modeling: From a Extended Enterprise Point of View,
    By Qing Wang, Yue Shang , Kathryn Cormican and Yuliu Chen from National University of Ireland, Galway, Ireland.    ID Number:077

  54. A research into Competition Tactic of Internet Coffee Shops—an Example of Feng-Chia Commerce Area in Taichung Taiwan,
    By Cheng-tsung Hwang  and Yi-Ran Shen from Providence University , Taichung, Taiwan.     ID Number:078

  55. Using E-logistics Creating Competence Competitive Advantage,
    By Yuh-Wen Chiu from National Yunlin University of Science and Technology, Taiwan.    ID Number:079

  56. Integrating Perceived Playfulness into Technology Acceptance Model on Portal Site Usage,
    By Yuh-Wen Chiu from National Yunlin University of Science and Technology, Taiwan.    ID Number:080

  57. Data Mining Using Multiple  Objective Linear  Programming,
    By Chen-Kou   Yu from  Nan Jeon Institute of Technology, Taiwan.   ID Number:081

  58. Feature Selection-an Application of Linear Integer Programming,
    By Chen-Kou Yu , Yi-Hsin Liu and Lin Hsiu-Chu from Nan Jeon Institute of Technology Yan-shui, Tainan County, Taiwan.     ID Number:082

  59. Impact of Information Technology Investment on Business Value:    Evidence from High Tech Industries of Taiwan,
    By Anne Wu and Wesley Shu from National Cheng-Chi University Taiwan.  ID Number:083

  60. An Approach to Predict the Stock Market Based on Rosokuashi Patterns,
    By Tung-Shou Chen, Jeanne Chen, Chun-Hung Hsieh, and Chin-Yuan Hsu from from National Taichung Institute of Technology, Taiwan,    ID Number:084

  61. A Vector Quantization Based Image Tamper Detection and Restoration System,
    By Keh-Jian Ma, Tung-Shou Chen, and Cheng-Yu Huang from National Taichung Institute of Technology, Taiwan,    ID Number:085

  62. A Study of Channel Coordination of Supply Chain with Contract,
    By ZHANG Long, SONG Shiji, LIU Lianchen,    WU Cheng from Tsinghua University, Beijing , China.    ID Number:086

  63. Mean-Variance Analysis of Quick Response in Manufacturer-Retailer Channels ,
    By  Chu Hongsheng   Song Shiji from Tsinghua University, China.    ID Number:087

  64. Review on Reverse Logistics and Remanufacturing O perations,
    By Hongsheng Chu,Qianchuan Zhao,Shiji Song from Tsinghua University, China.  ID Number:088

  65. Lecture Timetable Generation System Using Genetic Algorithm,
    By  Arata Suenaga, Li Lei from Hosei University , Japan.    ID Number:089
     

  66. Group Decision Support for Enterprise Integration: Design of a GDSS Considering both Individual Consistency and Group Consensus,
    By Hui Shen, Yuliu Chen, Ke Ning, Wei Yu, Ningyu Ma from  Department of Automation, Tsinghua University, Beijing, China.   ID Number:090
     

  67. A Prepaid Service-based Charging and Billing Protocol for Internet Services
    By Chi-Chun Lo, Ming-Hua Lin from National Chiao-Tung University , Taiwan ,     ID Number:091
     

  68. A research on Business Process Reengineering in China
    By Xiao-xia Huang,     ID Number:092
     

  69. Applying the Neural Fuzzy System to Predict Sugar Consumption and Production: Evidence from the Egyptian Sugar Industry,
    By Medhat Mohamed Abdelaal from Ein Shams University, Cairo Egypt.   ID Number:093
     

  70. An ID-Based Conference Key Agreement Protocol for Secure Network Communications,
    By Chin-Chen Chang Iuon-Chang Lin from National Chung Cheng University, Taiwan.      ID Number:094
     

  71. An Exploratory Study of the Manufacturing Contributions on Concurrent Engineering Implementation
    By R.S.M. Lau from Hong Kong University of Science and Technology,   ID Number:095
     

  72. Optimal H Prediction Algorithm for Uncertain Non-stationary Real-Time MPEG VBR Traffic,
    By Yu-Shang Yang and Tsern-Huei Lee et al  from National Chiao-Tung University, Taiwan,  ID Number:096
     

  73. Convergence of Fuzzy Variables,
    By Gang Wang from Tsinghua University, Beijing,China, ID Number:097
     

  74. Lithology Determination by Artificial Intelligence Method,
    By Shaoxian Jin, Jingbo Shen, Jinghui Li, Qingjun Deng from Daqing Petroleum Institute, China.     ID Number:098
     

  75. Valuation Of Complex Instruments,
    By Pawel Radzikowski,     ID Number:099
     

  76. Models and  Algorithm for Flow-shop Scheduling in Birandom Environment, By Jin Peng from Tsinghua University, Beijing,China,    ID Number:100
     

  77. Characteristic Functions for Fuzzy Vectors,
    By Yuanguo Zhu from Tsinghua University,   ID Number:101
     

  78. A Multi-Objective Random Assignment Problem,
    By Lixing Yang  from Tsinghua University,     ID Number:102
     

  79. Bilevel Programming with Discount for Newsboys Problem,
    By Xiaoyu Ji  from Tsinghua University, ID Number:103
     

  80. Predict the Reliability of Systems by Applying Monte Carlo Method in Excel,
    By Li Chengshan from Tsinghua University, Beijing,    ID Number:104
     

  81. Facility Layout Problem with Random Fuzzy Demand,
    By Jian Zhou from Tsinghua University, ID Number:105
     

  82. Convergence Concepts of Rough Variables,
    By Hua Ke from Tsinghua University, ID Number:106
     

  83. A Preliminary Assessment on the Roles of Weblogs in Accelerating Innovation,
    By Ping Lan from School of Management, University of Alaska Fairbanks, USA    ID Number:107
     

  84. A Rapid Discrimination System for Goals with Preemptive Structure             in Uncertain Environment,
    By Rui Wang,  Jiuping Xu from School of Business and Administration Sichuan University, Chengdu,     ID Number:108
     

  85. A corresponding graph associated with the 3-SAT Problem,
    By Cheng Guo from Tsinghua University, ID Number:109
     

  86. Some Properties of Moment in Fuzzy Environments,
    By Nian Hua from Tsinghua University,  ID Number:110
     

  87. A DEA/MR methodology for predicting the output of decision making unit,
    By Celi Gao and  Li Changqing from Tsinghua University, Beijing. ID Number:111
     

  88. The Establishment of Self-adapting Algorithm of BP Neural Network and Its Application,
    By Xiaofeng Li and Jiuping Xu from School of Business and Administration, Sichuan University , Chengdu, ID Number:112
     

  89. Co-op Advertising and Pricing Models In a Manufacturer-Retailer Supply Chain,
    By Alexandre Neyret, Jinxing Xie from Tsinghua University. ID Number:113
     
  90. Research and Application of Supplier Selection Algorithm,
    By Zhao Chenfrom Tsinghua University.  ID Number:114
     

  91. The diffusion characters analysis of ERP management technology,
    By Hongkun Dai, Jiuping Xu from Business School, Sichuan University, ID Number:115
     

  92. Priority-based Genetic Algorithm for Bicriteria Network Design Problem, By Mitsuo Gen, Lin Lin, Masato Sasaki and R. Cheng  from Waseda University,  Japan. ID Number:116
     

  93. Hybrid Genetic Algorithm with Adaptive Abilities for Resource-constrained Multiple Project Scheduling, By TianZhi Dai , KwanWoo Kim, Takao Yokota, and Mitsuo Gen from Ashikaga Institute of Technology, Japan. ID Number:117
     

  94. Genetic Algorithm Approach for Two-Stage Multi-Product Production/Distribution System, By Admi Syarif , X.D. Wang, Mitsuo Yamashiro  and Mitsuo Gen from Ashikaga Institute of Technology, Japan. ID Number:118.
     

  95. Profitability in Hong Kong’s Private Residential Market,
    By Ka-fu Wong and Henry M.K. Mok from The University of Hong Kong Pokfulam, Hong Kong. ID Number:119
     

  96. A New Approach on The Optimization of A Capacitated Tree- Structured Network Design Problem,
    By Gengui Zhou, Yihua Zhu, Xiaobin Weng, Ye Feng from College of Business Administration, Zhejiang University of Technology, Hangzhou. ID Number:120
     

  97. Optimization of the Location of Factory of Petrochemical Industrial Project
    By Kaoping Song, Li Liu, Jiawen Wu, Wenzhi Mu from Daqing Petroleum Institute, Daqing, China.ID Number:121
     
  98. Reservoir Description with ANN Approach By Jicheng Zhang, Kaoping Song, Jinghui Li from Petroleum Engineering College, Daqing Petroleum Institute.ID Number:122
     
  99. Optimization of Scale of Petrochemical Project By Jinmei Wang, Jiawen Wu, Wenzhi Mu from Daqing Oilfield Corporation Ltd., China. ID Number:123
     

  100. An analysis of criteria and job selection using Analytical Hierarchy Process,
    By Zhao Chen, Chai Yueting from Tsinghua University, ID Number:124
     

  101. A Class of AHP Technique and its Application to Supply Chain Management, By Wu Min   Li Xiaofeng   Xu Jiuping from Sichuan University, Chengdu. ID Number:125
     

  102. Newsboy Problem with Fuzzy Demand, By Yu Jiang from Tsinghua University.ID Number:126