{"title":"Efficient Image Retrieval Based on Quantized Histogram Texture Features in DCT Domain","authors":"Fazal-e-Malik, B. Baharudin, K. Ullah","doi":"10.1109/FIT.2011.24","DOIUrl":"https://doi.org/10.1109/FIT.2011.24","url":null,"abstract":"Huge number of images is available on the internet. Efficient and effective retrieval system is needed to retrieve these images by the contents or features of the images like color, texture and shape. This system is called content based image retrieval (CBIR). Conventionally features are extracted from images in pixel domain. But at present almost all images are represented in compressed form using DCT (Discrete Cosine Transformation) blocks transformation. Some critical information is removed in compression and only perceptual information is left which has significant attraction for information retrieval in compressed domain. In this paper we study the problem that how to retrieve perceptual information in compressed domain JPEG such that to improve image retrieval. Our approach is based on quantized histogram statistical texture features in DCT blocks. We show that to get best image retrieval performance by extracting the statistical texture features of quantized histogram in DCT blocks using JPEG compressed format images. Experiments on the Corel animal database using the proposed approach, give results which show that the statistical texture features of histogram are robust in retrieval of images. This shows that texture features in local compression is a significant step for effective image retrieval.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122866062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clock Frequency Offset Correction through Computationally Simple Algorithms","authors":"Q. Chaudhari","doi":"10.1109/FIT.2011.50","DOIUrl":"https://doi.org/10.1109/FIT.2011.50","url":null,"abstract":"Clock synchronization among network nodes is a fundamental requirement for many applications. In some scenarios, the algorithm efficiency is also a crucial factor for energy conservation. Many different solutions have been proposed addressing this problem ranging from computationally expensive to very simple statistical methods. There is a complexity-performance tradeoff involved such that the efficient and robust techniques demand highly computational resources. In this paper, a new clock synchronization scheme is presented with the following characteristics: when the network delays originate from an exponential distribution, it performs better than the maximum likelihood and other complex estimators but with much reduced complexity, and it is robust to the underlying network delay probability density function otherwise. Therefore, it is suitable to both energy constrained and unconstrained network synchronization requirements.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122130329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SBVR2UML: A Challenging Transformation","authors":"Hina Afreen, Imran Sarwar Bajwa, B. Bordbar","doi":"10.1109/FIT.2011.14","DOIUrl":"https://doi.org/10.1109/FIT.2011.14","url":null,"abstract":"UML is a de-facto standard used for generating the software models. UML support visualization of the software artifacts. To generate a UML diagram, a software engineer has to collect software requirements in a natural language (such as English) or a semi-formal language (such as SBVR), manually analyze the requirements and then manually generate the class diagrams in an available CASE tool. However, by automatically transforming SBVR Software requirements to UML can seriously share burden of a system analyst and can improve the quality and robustness of software modeling phase. The paper demonstrates the challenging aspect of model transformation from SBVR to UML. The presented approach takes input the software requirements specified in SBVR syntax, parses the input specification, extracts the UML ingredients such as classes, methods, attributes, associations, etc and finally generate the visual representation of the extracted information. The presented approach is fully automated. The presented approach is explained via an example.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Abdul, Tawab D Khalil, Dominic, H. Kazemian, U. Habib
{"title":"A Study to Examine If Integration of Technology Acceptance Model's (TAM) Features Help in Building a Hybrid Digital Business Ecosystem Framework for Small and Medium Enterprises (SMEs)","authors":"Muhammad Abdul, Tawab D Khalil, Dominic, H. Kazemian, U. Habib","doi":"10.1109/FIT.2011.37","DOIUrl":"https://doi.org/10.1109/FIT.2011.37","url":null,"abstract":"Digital Business Ecosystem (DBE) is a rapidly growing technology which caters online businesses in both sectors of Business to Consumer (B2C) and Business to Business (B2B). It takes networked business organizations into account and helps them in digitally establishing inter and intra-organizational link. We are focusing on Small and Medium Enterprises (SME) which provides healthy breeding ground for Digital Business Ecosystem framework mainly due to the reason that small and medium enterprises depict more adaptability to own the technology. Digital Business Ecosystem fuses ICT (Information and Communication Technology) with business network of small and medium enterprises. The character of being eco provides the due collaboration among the peer organizations and with the consumers as well. Digital Business Ecosystem allows small and medium enterprises to create and integrate their services. In pursuit of a hybrid framework for Digital Business Ecosystem, one of the critical factors for its future implementation is the willingness of employees of small and medium enterprises. Technology Acceptance Model (TAM) suggests that acceptance of a new technology depends upon Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) of the users which are employees of small and medium enterprises in our study. In this paper, we identify and discuss different DBE features and judge the Perceived Usefulness and Perceived Ease of Use of SME Employees by a pilot study. The result of the preliminary but comprehensive survey is seen as vital for further study on Digital Business Ecosystem and its subsequent implementation.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Aun Abbas, H. Rhy, Changhee Lee, Bongsoo Kim, Jun-Young Kim
{"title":"Reflection Considerations in Seeded DWDM Transmission Links","authors":"Syed Aun Abbas, H. Rhy, Changhee Lee, Bongsoo Kim, Jun-Young Kim","doi":"10.1109/FIT.2011.51","DOIUrl":"https://doi.org/10.1109/FIT.2011.51","url":null,"abstract":"This paper investigates the reflection phenomenon and its impact on the transmission of a seeded DWDM link. The factors that influence the choice of acceptable values of the optical return loss and maximum discrete reflectance are discussed and measured data is presented that provides insight into the penalty associated with the optical return loss. It is found that that the values used for optical return loss and maximum discrete reflectance in ITU-T Recommendation G.698.1 and G.959.1 based DWDM links cannot be used in seeded DWDM link specifications due to its bidirectional seeded architecture and the reflective nature of its colour adaptive transmitter at the terminal equipment.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"39 S7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saima Rathore, M. A. Iftikhar, M. Hussain, A. Jalil
{"title":"Texture Analysis for Liver Segmentation and Classification: A Survey","authors":"Saima Rathore, M. A. Iftikhar, M. Hussain, A. Jalil","doi":"10.1109/FIT.2011.30","DOIUrl":"https://doi.org/10.1109/FIT.2011.30","url":null,"abstract":"Texture is a combination of repeated patterns with regular/irregular frequency. It can only be visualized but hard to describe in words. Liver structure exhibit similar behavior, it has maximum disparity in intensity texture inside and along boundary which serves as a major problem in its segmentation and classification. Problem gets more complicated when one applies simple segmentation techniques without considering variation in intensity texture. The problem of representing liver texture is solved by encoding it in terms of certain parameters for texture analysis. Numerous textural analysis techniques have been devised for liver classification over the years some of which work equally work well for most of the imaging modalities. Here, we attempt to summarize the efficacy of textural analysis techniques devised for Computed Tomography (CT), Ultrasound and some other imaging modalities like Magnetic Resonance Imaging (MRI), in terms of well-known performance metrics.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DOFUR: DDoS Forensics Using MapReduce","authors":"Rana Khattak, S. Bano, Shujaat Hussain, Z. Anwar","doi":"10.1109/FIT.2011.29","DOIUrl":"https://doi.org/10.1109/FIT.2011.29","url":null,"abstract":"Currently we have seen a very sharp increase in network traffic. Due to this increase, the size of attack log files has also increased greatly and using conventional techniques to mine the logs and get some meaningful analyses about the DDoS attacker's location and possible victims has become increasingly difficult. We propose a technique using Hadoop's MapReduce to deduce results efficiently and quickly which would otherwise take a long time if conventional means were used. The aim of this paper is to describe how we designed a framework to detect those packets in a dataset which belong to a DDoS attack using MapReduce provided by Hadoop. Experimental results using a real dataset show that parallelising DDoS detection can greatly improve efficiency.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}