2011 Frontiers of Information Technology最新文献

筛选
英文 中文
Efficient Image Retrieval Based on Quantized Histogram Texture Features in DCT Domain 基于DCT域量化直方图纹理特征的高效图像检索
2011 Frontiers of Information Technology Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.24
Fazal-e-Malik, B. Baharudin, K. Ullah
{"title":"Efficient Image Retrieval Based on Quantized Histogram Texture Features in DCT Domain","authors":"Fazal-e-Malik, B. Baharudin, K. Ullah","doi":"10.1109/FIT.2011.24","DOIUrl":"https://doi.org/10.1109/FIT.2011.24","url":null,"abstract":"Huge number of images is available on the internet. Efficient and effective retrieval system is needed to retrieve these images by the contents or features of the images like color, texture and shape. This system is called content based image retrieval (CBIR). Conventionally features are extracted from images in pixel domain. But at present almost all images are represented in compressed form using DCT (Discrete Cosine Transformation) blocks transformation. Some critical information is removed in compression and only perceptual information is left which has significant attraction for information retrieval in compressed domain. In this paper we study the problem that how to retrieve perceptual information in compressed domain JPEG such that to improve image retrieval. Our approach is based on quantized histogram statistical texture features in DCT blocks. We show that to get best image retrieval performance by extracting the statistical texture features of quantized histogram in DCT blocks using JPEG compressed format images. Experiments on the Corel animal database using the proposed approach, give results which show that the statistical texture features of histogram are robust in retrieval of images. This shows that texture features in local compression is a significant step for effective image retrieval.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122866062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Clock Frequency Offset Correction through Computationally Simple Algorithms 时钟频偏校正通过计算简单的算法
2011 Frontiers of Information Technology Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.50
Q. Chaudhari
{"title":"Clock Frequency Offset Correction through Computationally Simple Algorithms","authors":"Q. Chaudhari","doi":"10.1109/FIT.2011.50","DOIUrl":"https://doi.org/10.1109/FIT.2011.50","url":null,"abstract":"Clock synchronization among network nodes is a fundamental requirement for many applications. In some scenarios, the algorithm efficiency is also a crucial factor for energy conservation. Many different solutions have been proposed addressing this problem ranging from computationally expensive to very simple statistical methods. There is a complexity-performance tradeoff involved such that the efficient and robust techniques demand highly computational resources. In this paper, a new clock synchronization scheme is presented with the following characteristics: when the network delays originate from an exponential distribution, it performs better than the maximum likelihood and other complex estimators but with much reduced complexity, and it is robust to the underlying network delay probability density function otherwise. Therefore, it is suitable to both energy constrained and unconstrained network synchronization requirements.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122130329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SBVR2UML: A Challenging Transformation SBVR2UML:一个具有挑战性的转换
2011 Frontiers of Information Technology Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.14
Hina Afreen, Imran Sarwar Bajwa, B. Bordbar
{"title":"SBVR2UML: A Challenging Transformation","authors":"Hina Afreen, Imran Sarwar Bajwa, B. Bordbar","doi":"10.1109/FIT.2011.14","DOIUrl":"https://doi.org/10.1109/FIT.2011.14","url":null,"abstract":"UML is a de-facto standard used for generating the software models. UML support visualization of the software artifacts. To generate a UML diagram, a software engineer has to collect software requirements in a natural language (such as English) or a semi-formal language (such as SBVR), manually analyze the requirements and then manually generate the class diagrams in an available CASE tool. However, by automatically transforming SBVR Software requirements to UML can seriously share burden of a system analyst and can improve the quality and robustness of software modeling phase. The paper demonstrates the challenging aspect of model transformation from SBVR to UML. The presented approach takes input the software requirements specified in SBVR syntax, parses the input specification, extracts the UML ingredients such as classes, methods, attributes, associations, etc and finally generate the visual representation of the extracted information. The presented approach is fully automated. The presented approach is explained via an example.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Study to Examine If Integration of Technology Acceptance Model's (TAM) Features Help in Building a Hybrid Digital Business Ecosystem Framework for Small and Medium Enterprises (SMEs) 技术接受模型(TAM)特征的整合是否有助于为中小企业构建混合数字商业生态系统框架的研究
2011 Frontiers of Information Technology Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.37
Muhammad Abdul, Tawab D Khalil, Dominic, H. Kazemian, U. Habib
{"title":"A Study to Examine If Integration of Technology Acceptance Model's (TAM) Features Help in Building a Hybrid Digital Business Ecosystem Framework for Small and Medium Enterprises (SMEs)","authors":"Muhammad Abdul, Tawab D Khalil, Dominic, H. Kazemian, U. Habib","doi":"10.1109/FIT.2011.37","DOIUrl":"https://doi.org/10.1109/FIT.2011.37","url":null,"abstract":"Digital Business Ecosystem (DBE) is a rapidly growing technology which caters online businesses in both sectors of Business to Consumer (B2C) and Business to Business (B2B). It takes networked business organizations into account and helps them in digitally establishing inter and intra-organizational link. We are focusing on Small and Medium Enterprises (SME) which provides healthy breeding ground for Digital Business Ecosystem framework mainly due to the reason that small and medium enterprises depict more adaptability to own the technology. Digital Business Ecosystem fuses ICT (Information and Communication Technology) with business network of small and medium enterprises. The character of being eco provides the due collaboration among the peer organizations and with the consumers as well. Digital Business Ecosystem allows small and medium enterprises to create and integrate their services. In pursuit of a hybrid framework for Digital Business Ecosystem, one of the critical factors for its future implementation is the willingness of employees of small and medium enterprises. Technology Acceptance Model (TAM) suggests that acceptance of a new technology depends upon Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) of the users which are employees of small and medium enterprises in our study. In this paper, we identify and discuss different DBE features and judge the Perceived Usefulness and Perceived Ease of Use of SME Employees by a pilot study. The result of the preliminary but comprehensive survey is seen as vital for further study on Digital Business Ecosystem and its subsequent implementation.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reflection Considerations in Seeded DWDM Transmission Links 种子DWDM传输链路中的反射考虑
2011 Frontiers of Information Technology Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.51
Syed Aun Abbas, H. Rhy, Changhee Lee, Bongsoo Kim, Jun-Young Kim
{"title":"Reflection Considerations in Seeded DWDM Transmission Links","authors":"Syed Aun Abbas, H. Rhy, Changhee Lee, Bongsoo Kim, Jun-Young Kim","doi":"10.1109/FIT.2011.51","DOIUrl":"https://doi.org/10.1109/FIT.2011.51","url":null,"abstract":"This paper investigates the reflection phenomenon and its impact on the transmission of a seeded DWDM link. The factors that influence the choice of acceptable values of the optical return loss and maximum discrete reflectance are discussed and measured data is presented that provides insight into the penalty associated with the optical return loss. It is found that that the values used for optical return loss and maximum discrete reflectance in ITU-T Recommendation G.698.1 and G.959.1 based DWDM links cannot be used in seeded DWDM link specifications due to its bidirectional seeded architecture and the reflective nature of its colour adaptive transmitter at the terminal equipment.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"39 S7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Texture Analysis for Liver Segmentation and Classification: A Survey 纹理分析在肝脏分割与分类中的应用综述
2011 Frontiers of Information Technology Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.30
Saima Rathore, M. A. Iftikhar, M. Hussain, A. Jalil
{"title":"Texture Analysis for Liver Segmentation and Classification: A Survey","authors":"Saima Rathore, M. A. Iftikhar, M. Hussain, A. Jalil","doi":"10.1109/FIT.2011.30","DOIUrl":"https://doi.org/10.1109/FIT.2011.30","url":null,"abstract":"Texture is a combination of repeated patterns with regular/irregular frequency. It can only be visualized but hard to describe in words. Liver structure exhibit similar behavior, it has maximum disparity in intensity texture inside and along boundary which serves as a major problem in its segmentation and classification. Problem gets more complicated when one applies simple segmentation techniques without considering variation in intensity texture. The problem of representing liver texture is solved by encoding it in terms of certain parameters for texture analysis. Numerous textural analysis techniques have been devised for liver classification over the years some of which work equally work well for most of the imaging modalities. Here, we attempt to summarize the efficacy of textural analysis techniques devised for Computed Tomography (CT), Ultrasound and some other imaging modalities like Magnetic Resonance Imaging (MRI), in terms of well-known performance metrics.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
DOFUR: DDoS Forensics Using MapReduce DOFUR:使用MapReduce进行DDoS取证
2011 Frontiers of Information Technology Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.29
Rana Khattak, S. Bano, Shujaat Hussain, Z. Anwar
{"title":"DOFUR: DDoS Forensics Using MapReduce","authors":"Rana Khattak, S. Bano, Shujaat Hussain, Z. Anwar","doi":"10.1109/FIT.2011.29","DOIUrl":"https://doi.org/10.1109/FIT.2011.29","url":null,"abstract":"Currently we have seen a very sharp increase in network traffic. Due to this increase, the size of attack log files has also increased greatly and using conventional techniques to mine the logs and get some meaningful analyses about the DDoS attacker's location and possible victims has become increasingly difficult. We propose a technique using Hadoop's MapReduce to deduce results efficiently and quickly which would otherwise take a long time if conventional means were used. The aim of this paper is to describe how we designed a framework to detect those packets in a dataset which belong to a DDoS attack using MapReduce provided by Hadoop. Experimental results using a real dataset show that parallelising DDoS detection can greatly improve efficiency.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信