ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia最新文献

筛选
英文 中文
Flies species recognition for maggot therapy using neural-expert technique 基于神经专家技术的蝇类识别与蛆治疗
Nursyafinaz Md Yusoff, N. H. A. Hamid, S. A. Halim
{"title":"Flies species recognition for maggot therapy using neural-expert technique","authors":"Nursyafinaz Md Yusoff, N. H. A. Hamid, S. A. Halim","doi":"10.1109/ICIMU.2011.6122755","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122755","url":null,"abstract":"Maggot Debridement Therapy (MDT) has been recognized as one of the effective alternative treatment to enhance healing and to decrease the mortality associated with underlying injury. One of the most important procedures in performing MDT is to use the correct maggot from suitable species. In this case, maggots from the incorrect species would consume the live tissue instead of the dead tissue. Hence, this is highlighted as one of the difficulties in implementing MDT. Currently the process of identifying flies is done manually by experts or by using DNA traits. We explored and developed another procedure to recognize the species using hybrid neuro-expert technique. The percentage of correctness using standard back propagation neural network yields 94.4% accuracy. By adapting the neuro-expert technique, the prototype accuracy is 100%.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Indirect DNS covert channel based on name reference for minima length distribution 基于最小长度分布的名称引用的间接DNS隐蔽通道
S. N. Omar, I. Ahmedy, M. Ngadi
{"title":"Indirect DNS covert channel based on name reference for minima length distribution","authors":"S. N. Omar, I. Ahmedy, M. Ngadi","doi":"10.1109/ICIMU.2011.6122768","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122768","url":null,"abstract":"Covert Channels is the methods to conceal a message in network communications. Until now, covert channels based on packet length produce abnormal packet length when the size of the packets' length is minima. Standard DNS request has minima range in length, which is could not support by previous packet length covert channels. Abnormal packet length, especially in normal DNS requests will expose the covert channels to network security perimeter. Therefore, it motivated the study to propose a method based on reference matrix to hide the secret message in DNS request. Standard DNS requests' packet was collected from campus network. The proposed and the previous packet length covert channels were compared to standard DNS requests. The comparisons were done through percentages and frequency range of length and statistical T-test. The results show that, there is no significant different between the packet lengths of standard DNS request and propose covert, which outperform the previous packet length covert channels.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure service mechanism of video surveillance system based on H.264/SVC 基于H.264/SVC的视频监控系统安全服务机制
Su-Wan Park, J. Han, Sanguk Shin
{"title":"Secure service mechanism of video surveillance system based on H.264/SVC","authors":"Su-Wan Park, J. Han, Sanguk Shin","doi":"10.1109/ICIMU.2011.6122767","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122767","url":null,"abstract":"Video surveillance users are expecting the efficient service that provide dynamic re-sizing video stream to each user device, while the existing techniques generate a fixed quality and sized video stream. To solve the problem, we propose a secure service mechanism of surveillance system using H.264/SVC and user domain. It help user who can monitor IP-cameras freely and securely within devices belonging to a single owner. Also it adaptively provides streaming data to devices which have different display sizes and different computing capabilities.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121019309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Parallel Optical Burst Switching (POBS) for Ultra-Dense WDM (U-DWDM) systems 超密集波分复用(U-DWDM)系统的并行光突发交换(POBS)
A. Abdelouahab, F. M. Abbou, H. Ewe
{"title":"Parallel Optical Burst Switching (POBS) for Ultra-Dense WDM (U-DWDM) systems","authors":"A. Abdelouahab, F. M. Abbou, H. Ewe","doi":"10.1109/ICIMU.2011.6122751","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122751","url":null,"abstract":"Several different switching paradigms have been devised to transfer data over Wavelength-Division Multiplexing (WDM), such as Optical Circuit Switching (OCS) a wavelength-routed network, Optical Packet Switching (OPS), and Optical Burst Switching (OBS). Given that any optical switching strategy is mainly shaped by the advances in the optical technology, the optical communications systems must provide for the highest possible data rate. This paper introduces, as a variant of OBS, a new optical switching strategy for Ultra-Dense WDM (U-DWDM), named Parallel Optical Burst Switching (POBS). POBS simplifies the scheduling/switching algorithms and reduces, relatively, the number of control channels, which, in its turn, reduces the number of the Opto-Electrical / Electro-Optical converters needed in the core nodes. Furthermore, POBS simplifies the design of the burst segmentation techniques and service differentiation schemes, and the implementation of the Fiber Delay Lines (FDLs). In addition, the number of required switching elements and wavelength converters needed in the core nodes can be lowered with POBS, therefore, lowering the overall network cost, if the waveband switching is deployed.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"48 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fitted dynamic framed slotted ALOHA anti-collision algorithm in RFID systems RFID系统中的拟合动态框架开槽ALOHA防碰撞算法
M. Shakiba, A. Zavvari, E. Sundararajan
{"title":"Fitted dynamic framed slotted ALOHA anti-collision algorithm in RFID systems","authors":"M. Shakiba, A. Zavvari, E. Sundararajan","doi":"10.1109/ICIMU.2011.6122776","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122776","url":null,"abstract":"Radio Frequency Identification (RFID) system is a new communication technology to identify the objects using electromagnetic waves. The main superiority of RFID systems in comparison with other identification systems, such as barcodes, is its ability in simultaneous identification process, but when more than one tag wants to communicate with the reader, collision problem occurs and wastes time and increases energy consumption. This reduces efficiency of the identification process in RFID systems. Collision problem happens when the reader has to identify more than one tag at the same time. Consequently, it is essential to develop an efficient anti-collision algorithm to save the time and energy and increase the performance of the system. In this paper, after investigating the previous works on ALOHA-based anti-collision algorithms, a new anti-collision algorithm is presented to improve the DFSA ALOHA-based anti-collision algorithms. Evaluation of the ALOHA-based algorithms and simulation of the results illustrate that presented work recognizes the tags more efficiently by reducing the number of time slots.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Genetic algorithm approach for dynamic configuration of Multicast Broadcast Single Frequency Network deployment in LTE LTE中组播单频网络部署动态配置的遗传算法
N. F. Tuban, M. F. Azman, K. A. Noordin, M. Ismail
{"title":"Genetic algorithm approach for dynamic configuration of Multicast Broadcast Single Frequency Network deployment in LTE","authors":"N. F. Tuban, M. F. Azman, K. A. Noordin, M. Ismail","doi":"10.1109/ICIMU.2011.6122733","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122733","url":null,"abstract":"Multimedia Broadcast Multicast service (MBMS) is used for the delivery of multimedia contents such as video and live mobile TV in a point-to-multipoint (PtM) mode of transmission. In Long Term Evolution (LTE), another technique is offered to increase the capacity and speed of transmission via Multimedia Broadcast / Multicast service over a Single Frequency Network (MBSFN). MBSFN is a large network consisting of multiple cells where the signal transmission are tightly time synchronized among them in a given duration. The configuration of which cells comprise a MBSFN area is necessary to adapt changes of MBMS users location. In this paper, a genetic algorithm (GA) approach is proposed for dynamic configuration of MBSFN area. The proposed algorithm searches the optimal solution for MBSFN area deployment based on location where the densities of MBMS user equipments (UEs) are higher. The UEs that are expensive to cover would be sacrificed from being in MBSFN mode of transmission.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Eigenvalue Steganography based on eigen characteristics of quantized DCT matrices 基于量化DCT矩阵特征特征的特征值隐写
Y. M. Behbahani, P. Ghayour, A. Farzaneh
{"title":"Eigenvalue Steganography based on eigen characteristics of quantized DCT matrices","authors":"Y. M. Behbahani, P. Ghayour, A. Farzaneh","doi":"10.1109/ICIMU.2011.6122769","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122769","url":null,"abstract":"In this paper we propose a new JPEG-based steganography technique, using eigenvalues' properties of matrices of quantized DCT coefficients. We call this new approach, Eigenvalue Steganography. Usual steganography techniques based on JPEG images, hide data by changing the least significant bit (LSB) of DCT coefficients. Eigenvalue Steganography technique hides confidential data employing the eigenvalues of quantized DCT matrices and manipulating them. This technique suggests the subdivision of quantized DCT coefficients blocks into smaller submatrices in DCT domain. Afterwards, this technique efficiently hides confidential information among DCT submatrices, by employing the proposed algorithms and manipulating the eigenvalues of these submatrices. Experiments done in this paper, depicts that the two proposed methods to implement Eigenvalue Steganography show appropriate resistance against Subtractive Pixel Adjacency Matrix (SPAM) steganalyzer. This steganalysis model doesn't have the capability of proper detection for the suggested methods.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133940951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Non-contact multi-hand gestures interaction techniques for architectural design in a virtual environment 虚拟环境中建筑设计的非接触多手势交互技术
M. F. Shiratuddin, Kok Wai Wong
{"title":"Non-contact multi-hand gestures interaction techniques for architectural design in a virtual environment","authors":"M. F. Shiratuddin, Kok Wai Wong","doi":"10.1109/ICIMU.2011.6122761","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122761","url":null,"abstract":"For decades, architectural designs are created and communicated by de facto tools; either 2D CAD or 3D CAD. Architects and CAD operators alike use CAD software installed on their personal computers or workstations. The interaction techniques used when using these tools are restricted to the WIMP (windows, icons, mouse, and pointers) paradigm. Graphical User Interface (GUI) and accessibility to the functionalities of the CAD software are thus designed and revolved around this paradigm. In the Multi-Hand Gesture (MHG) interaction paradigm, a non-contact gesture recognition system is used to detect in real-time the hands and fingers movements, and also their positions in 3D space. These gestures are then interpreted and used to execute specific commands or tasks. This paper proposes a framework for a non-contact MHG interaction technique for architectural design. It also discusses 1) the WIMP and a non-contact MHG interaction technique, and 2) the development of an early prototype of a non-contact MHG recognition system. The prototype system consists of a software that is developed to recognize and interpret the multi-hand gestures captured by the Kinect sensor which does real-time scanning of three-dimensional space and depth.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Adaptive channel access tuning and QoS support for multimedia applications over IEEE 802.11e WLANs IEEE 802.11e wlan上多媒体应用的自适应信道访问调优和QoS支持
M. F. Tuysuz, H. A. Mantar
{"title":"Adaptive channel access tuning and QoS support for multimedia applications over IEEE 802.11e WLANs","authors":"M. F. Tuysuz, H. A. Mantar","doi":"10.1109/ICIMU.2011.6122775","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122775","url":null,"abstract":"IEEE 802.11e Enhanced Distributed Channel Access (EDCA) standard defines multiple Access Categories (AC) to support MAC-level Quality of Service (QoS). However, the values of the main parameters of each AC are static and do not take the wireless channel condition and the channel density into account. Therefore, the default EDCA parameters only yield good performance for few scenarios. In this paper, we propose a new cross-layer adaptation scheme that improves the IEEE 802.11e Quality of Service (QoS) by tuning the Medium Access Control (MAC) layer channel access parameters. Proposed scheme is based on the number of mobile nodes on the channel, their traffic types, application layer QoS requirements and physical layer (PHY) channel conditions. Simulation results indicate that our scheme outperforms the standard implementation and provides desired QoS for multimedia applications.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120835745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessing organizational business intelligence maturity 评估组织业务智能成熟度
I. Ong, P. Siew, S. Wong
{"title":"Assessing organizational business intelligence maturity","authors":"I. Ong, P. Siew, S. Wong","doi":"10.1109/ICIMU.2011.6122732","DOIUrl":"https://doi.org/10.1109/ICIMU.2011.6122732","url":null,"abstract":"Business intelligence (BI) is a strategic resource that helps organizations to facilitate decision making processes in order to sustain competitive advantage. Despite the apparent significance of BI to the success of business activities, many organizations are still in the early stages of BI implementation. To gain full benefits of BI, it is essential that organizations start to move toward a higher level of maturity in their BI implementation. This paper develops and tests a BI maturity model with the goal of eventually using the model to guide organizations in their effort to move toward a higher maturity level in their BI initiatives. Preliminary results indicate that while organizations are using BI, they are not getting full benefits from their BI initiatives. More efforts need to be put in for organizations to move to the highest maturity level.","PeriodicalId":102808,"journal":{"name":"ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信