2008 IEEE 8th International Conference on Computer and Information Technology Workshops最新文献

筛选
英文 中文
Fire Surveillance System Using an Omni-directional Camera for  Remote Monitoring 用全向摄像机远程监控火灾监控系统
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.11
ByoungChul Ko, Hyun-Jae Hwang, In-Gyu Lee, J. Nam
{"title":"Fire Surveillance System Using an Omni-directional Camera for  Remote Monitoring","authors":"ByoungChul Ko, Hyun-Jae Hwang, In-Gyu Lee, J. Nam","doi":"10.1109/CIT.2008.WORKSHOPS.11","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.11","url":null,"abstract":"This paper proposes new video-based fire surveillance and remote monitoring system for real-life application. Most previous video-based fire detection systems using color information and temporal variations of pixels produce frequent false alarms due to the use of many heuristic features. Plus, they need several cameras to overcome the dead angle problem of a normal CCD camera. Thus, to overcome these problems, probabilistic models of fire are generated based on the fact that fire pixel values in consecutive frames change constantly and these models are applied to a Bayesian Networks to detect real fire from videos. In our system, we use an omni-directional camera instead of a normal CCD camera to remove the dead angle problem. After then, the fire region is captured by pan-tilt camera and transferred to cell phone for remote monitoring. The proposed system was successfully applied to various fire-detection tasks in real-world environments and effectively distinguished fire from fire-colored moving objects.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127529285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Embedded Architectural Design Using Protection Logics to Defend Attack of Buffer Overflow and Unauthorized Access of Code 利用保护逻辑防御缓冲区溢出攻击和代码未授权访问的嵌入式体系结构设计
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.119
C. Yau, Y. Tan, A. Fong, P. L. Mok
{"title":"Embedded Architectural Design Using Protection Logics to Defend Attack of Buffer Overflow and Unauthorized Access of Code","authors":"C. Yau, Y. Tan, A. Fong, P. L. Mok","doi":"10.1109/CIT.2008.WORKSHOPS.119","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.119","url":null,"abstract":"As security is always a major concern in most of the networked computer systems, embedded systems should provide security features to defend the attack and protect the confidential and sensitive data. Many Trojan Horses and viruses use the security holes of exception to trigger attack, such as buffer overflow attack. Although most embedded systems rely on the programmer, the compiler or the third-party security software to defend and protect the systems against the buffer overflow attack, these techniques could not completely maintain the overall system security. Using a secure programming language is another approach to protect the system, but this approach contains a large security hole that break the overall security. Therefore, this paper proposes a secure Java embedded processor architecture called jHISC with protection logic to protect the system naturally. This new processor realized the natural secure language features of Java in the core architecture to enhance the overall system security. It performs various rigid hardware bound checks and embedded access control checks to avoid the code bypassing. The current implementation phase is under version 4 with 4 KB instruction cache and 8 KB data cache is described by VHDL and implemented and verified in a Xilinx Virtex FPGA.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptive Policy-Based Vertical Handoff Algorithm for Heterogeneous Wireless Networks 异构无线网络中基于策略的自适应垂直切换算法
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.109
N. MirMotahhary, Y. Mafinejad, F. Atbaei, A. Kouzani
{"title":"An Adaptive Policy-Based Vertical Handoff Algorithm for Heterogeneous Wireless Networks","authors":"N. MirMotahhary, Y. Mafinejad, F. Atbaei, A. Kouzani","doi":"10.1109/CIT.2008.WORKSHOPS.109","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.109","url":null,"abstract":"The next generation of wireless networks is envisioned as convergence of heterogeneous radio access networks. Since technologies are becoming more collaborative, a possible integration between IEEE 802.16 based network and previous generation of telecommunication systems (2G, ..., 3G) must be considered. A novel quality function based vertical handoff (VHO) algorithm, based on proposed velocity and average receive power estimation algorithms is discussed in this paper. The short-time Fourier analysis of received signal strength (RSS) is employed to obtain mobile speed and average received power estimates. Performance of quality function based VHO algorithm is evaluated by means of measure of quality of service (QoS). Simulation results show that proposed quality function, brings significant gains in QoS and more efficient use of resources can be achieved.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Independent Component Analysis Approach for Enhancing Camera Based Low Quality Text Images 基于相机的低质量文本图像增强的独立分量分析方法
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.111
Atishay Jain, S. Tapaswi, U. Garain
{"title":"An Independent Component Analysis Approach for Enhancing Camera Based Low Quality Text Images","authors":"Atishay Jain, S. Tapaswi, U. Garain","doi":"10.1109/CIT.2008.WORKSHOPS.111","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.111","url":null,"abstract":"The paper proposes an independent component analysis approach specifically aimed at enhancing low-resolution text images from handheld devices. Three layered Independent components are extracted from the image, checked for the components if missing in any of the layer and then integrated so as the missing component can be mixed. Afterwards the image enhancement techniques such as threshold and dilation are used to produce the final text image. Comparative performance evaluation is presented in the form of OCR results of the super-resolution output.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Website Data Storage Management during Data Lifecycle Taking into Account of Time Effect 考虑时间效应的数据生命周期网站数据存储管理
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.47
Zenggui Ou
{"title":"Website Data Storage Management during Data Lifecycle Taking into Account of Time Effect","authors":"Zenggui Ou","doi":"10.1109/CIT.2008.WORKSHOPS.47","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.47","url":null,"abstract":"The data lifecycle means the process from datapsilas advent to its disappearance; the data management runs through the whole data lifecycle. Data management aims at providing the data which are complete, accurate and conducts time effect for userspsila data retrieval. At each stage of datapsilas life cycle, different demands exist upon data management, among which data store management is the most important. There are several different strategies and models in store management and to choose the best scheme for it is also fundamental. In fact, it is always hoped that the recent, latest data would be stored in the most accessible device. From the perspective of how the administrator provides effective data for userspsila retrieval, this thesis discusses about the store management based on data time effect within datapsilas life cycle. The main point, however, is to find out a feasible way on a Website towards how to divide the data upon its time effect, what kind of store strategies should be adopted due to the division and finally some suggestions and solution would be proposed.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132257109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sustaining Learners in WBT Environments through Service-Oriented Formative Assessment 通过面向服务的形成性评估在WBT环境中维持学习者
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.72
I-Ching Chen, Shueh-Cheng Hu, Dong-Her Shih
{"title":"Sustaining Learners in WBT Environments through Service-Oriented Formative Assessment","authors":"I-Ching Chen, Shueh-Cheng Hu, Dong-Her Shih","doi":"10.1109/CIT.2008.WORKSHOPS.72","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.72","url":null,"abstract":"Web-based training gains popularity due to the pervasiveness of Web applications, abundant hyper media contents, and other attractive attributes. However, previous experience and research indicate that learners in Web-based learning environments tend to drop out when they lose orientation or have insufficient interaction with support providers during self-directed learning process. Formative assessment activities can not only identify weakness of learners, but also can provide guidance toward ultimate learning goals through interactions with learners. Various instructional resources have been designed to enrich e-learning context, and most of these resources are integrated proprietarily within Web-based learning platforms. The service oriented approach, which enables a more flexible way for architecting software systems, could be applied in a variety of domains, including those with the purpose of pedagogy. This research work aims to investigate a method of enhancing interactivity in Web-central learning environments by means of blending formative assessment services into instructional processes. A proof-of-concept prototype has been implemented and the preliminary usage shows that the interactions between self-directed learners and support-providers are critical to sustaining those learners as well as better learning achievements.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"100 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133085602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Iris Based Hard Fuzzy Vault 基于虹膜的硬模糊Vault性能研究
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.20
E. Reddy, I. R. Babu
{"title":"Performance of Iris Based Hard Fuzzy Vault","authors":"E. Reddy, I. R. Babu","doi":"10.1109/CIT.2008.WORKSHOPS.20","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.20","url":null,"abstract":"Blend of cryptography and biometrics results an emerging architecture known as Crypto-biometrics which produces high level security. Fuzzy vault is a cryptographic construction used to store iris biometric templates which are binded by a random key extracted from same iris textures. Though the fuzzy vault provides better security, it is affected by cross matching, non uniform nature of biometric data. To overcome these limitations, we propose a scheme that hardens both fuzzy vault and secret key using password based on iris textures. By using password an additional layer of security is embedded to achieve high level security.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116897010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Study of C4ISR Architecture Simulation Validation with UML and Object-Based Petri Nets 基于UML和基于对象Petri网的C4ISR体系结构仿真验证研究
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.61
Xiaohui Bai
{"title":"Study of C4ISR Architecture Simulation Validation with UML and Object-Based Petri Nets","authors":"Xiaohui Bai","doi":"10.1109/CIT.2008.WORKSHOPS.61","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.61","url":null,"abstract":"C4ISR (command, control, communication, computer, intelligence, surveillance and reconnaissance) architecture is the important method to ensure the quality of system design. One method of C4ISR architecture validation is to transform the C4ISR architecture products to executable models. Through analyzing model execution process and result, the performance of C4ISR architecture can be tested. Based on the different advantage of UML (Unified Modeling Language) and Petri nets, the paper applies some kinds of views in UML to describe the relative C4ISR system architecture products. Considering the relationship among the products, the UML view of products is transformed to OPN (object-based Petri nets) simulation model according to the transformation rules. So the dynamic behavior of system can be displayed by those simulation model, and whether the relation of time-order, information flow and interface is reasonable, or the system function satisfies the military requirement , and the change of system state is correct, can be checked evidently. At last, the paper gives a case in the air defense system using simulation validation method proposed by it.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"358 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Finding Dependency Trees from Binary Data 从二进制数据中查找依赖树
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.92
Chaofeng Sha, Dao Tao, Aoying Zhou, Weining Qian
{"title":"Finding Dependency Trees from Binary Data","authors":"Chaofeng Sha, Dao Tao, Aoying Zhou, Weining Qian","doi":"10.1109/CIT.2008.WORKSHOPS.92","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.92","url":null,"abstract":"Much work has been done in finding interesting subsets of items, since it has broad applications in financial data analysis, e-commerce, text data mining, and so on. Though the well-known frequent pattern mining attracted much attention in research community, recently, more work has been devoted to analysis of more sophisticated relationships among items. Chow-Liu tree and low-entropy tree, for example, were used to summarize the frequent patterns. In this paper, we consider finding a novel dependency tree from binary data. It has several advantages over previous related work. Firstly, we propose a novel distance measure between items based on information theory, which captures the expected uncertainty in the item pairs and the mutual information between them. Based on this distance measure, we present a simple yet efficient algorithm for finding the dependency trees from binary data. We also show how our new approach can find applications in frequent pattern summarization. Our running example on synthetic dataset shows that our approach achieves good results compared to existing popular heuristics.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114512190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Semantic Web Technologies in Visualizing Medicinal Vocabularies 语义Web技术在医药词汇可视化中的应用
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.19
J. Puustjarvi, L. Puustjarvi
{"title":"Using Semantic Web Technologies in Visualizing Medicinal Vocabularies","authors":"J. Puustjarvi, L. Puustjarvi","doi":"10.1109/CIT.2008.WORKSHOPS.19","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.19","url":null,"abstract":"The number of new medications and medicinal knowledge increases all the time. Further, as each drug has its unique indications, cross-reactivity, complications and costs also the management and dissemination of medication information becomes still more complex giving rise for potential medication errors. However, by utilizing the Semantic Web technologies in visualizing medication information this complexity can be alleviated in many ways. In this paper we report our work on developing an electronic medicinal vocabulary. It deviates from other medicinal vocabularies in that the terms and their relationships are graphically illustrated and additional queries can be made on the graphical presentation. The supported visualization format is a variation of the concept mapping.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126160815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信