{"title":"Fire Surveillance System Using an Omni-directional Camera for Remote Monitoring","authors":"ByoungChul Ko, Hyun-Jae Hwang, In-Gyu Lee, J. Nam","doi":"10.1109/CIT.2008.WORKSHOPS.11","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.11","url":null,"abstract":"This paper proposes new video-based fire surveillance and remote monitoring system for real-life application. Most previous video-based fire detection systems using color information and temporal variations of pixels produce frequent false alarms due to the use of many heuristic features. Plus, they need several cameras to overcome the dead angle problem of a normal CCD camera. Thus, to overcome these problems, probabilistic models of fire are generated based on the fact that fire pixel values in consecutive frames change constantly and these models are applied to a Bayesian Networks to detect real fire from videos. In our system, we use an omni-directional camera instead of a normal CCD camera to remove the dead angle problem. After then, the fire region is captured by pan-tilt camera and transferred to cell phone for remote monitoring. The proposed system was successfully applied to various fire-detection tasks in real-world environments and effectively distinguished fire from fire-colored moving objects.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127529285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded Architectural Design Using Protection Logics to Defend Attack of Buffer Overflow and Unauthorized Access of Code","authors":"C. Yau, Y. Tan, A. Fong, P. L. Mok","doi":"10.1109/CIT.2008.WORKSHOPS.119","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.119","url":null,"abstract":"As security is always a major concern in most of the networked computer systems, embedded systems should provide security features to defend the attack and protect the confidential and sensitive data. Many Trojan Horses and viruses use the security holes of exception to trigger attack, such as buffer overflow attack. Although most embedded systems rely on the programmer, the compiler or the third-party security software to defend and protect the systems against the buffer overflow attack, these techniques could not completely maintain the overall system security. Using a secure programming language is another approach to protect the system, but this approach contains a large security hole that break the overall security. Therefore, this paper proposes a secure Java embedded processor architecture called jHISC with protection logic to protect the system naturally. This new processor realized the natural secure language features of Java in the core architecture to enhance the overall system security. It performs various rigid hardware bound checks and embedded access control checks to avoid the code bypassing. The current implementation phase is under version 4 with 4 KB instruction cache and 8 KB data cache is described by VHDL and implemented and verified in a Xilinx Virtex FPGA.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. MirMotahhary, Y. Mafinejad, F. Atbaei, A. Kouzani
{"title":"An Adaptive Policy-Based Vertical Handoff Algorithm for Heterogeneous Wireless Networks","authors":"N. MirMotahhary, Y. Mafinejad, F. Atbaei, A. Kouzani","doi":"10.1109/CIT.2008.WORKSHOPS.109","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.109","url":null,"abstract":"The next generation of wireless networks is envisioned as convergence of heterogeneous radio access networks. Since technologies are becoming more collaborative, a possible integration between IEEE 802.16 based network and previous generation of telecommunication systems (2G, ..., 3G) must be considered. A novel quality function based vertical handoff (VHO) algorithm, based on proposed velocity and average receive power estimation algorithms is discussed in this paper. The short-time Fourier analysis of received signal strength (RSS) is employed to obtain mobile speed and average received power estimates. Performance of quality function based VHO algorithm is evaluated by means of measure of quality of service (QoS). Simulation results show that proposed quality function, brings significant gains in QoS and more efficient use of resources can be achieved.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Independent Component Analysis Approach for Enhancing Camera Based Low Quality Text Images","authors":"Atishay Jain, S. Tapaswi, U. Garain","doi":"10.1109/CIT.2008.WORKSHOPS.111","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.111","url":null,"abstract":"The paper proposes an independent component analysis approach specifically aimed at enhancing low-resolution text images from handheld devices. Three layered Independent components are extracted from the image, checked for the components if missing in any of the layer and then integrated so as the missing component can be mixed. Afterwards the image enhancement techniques such as threshold and dilation are used to produce the final text image. Comparative performance evaluation is presented in the form of OCR results of the super-resolution output.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Website Data Storage Management during Data Lifecycle Taking into Account of Time Effect","authors":"Zenggui Ou","doi":"10.1109/CIT.2008.WORKSHOPS.47","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.47","url":null,"abstract":"The data lifecycle means the process from datapsilas advent to its disappearance; the data management runs through the whole data lifecycle. Data management aims at providing the data which are complete, accurate and conducts time effect for userspsila data retrieval. At each stage of datapsilas life cycle, different demands exist upon data management, among which data store management is the most important. There are several different strategies and models in store management and to choose the best scheme for it is also fundamental. In fact, it is always hoped that the recent, latest data would be stored in the most accessible device. From the perspective of how the administrator provides effective data for userspsila retrieval, this thesis discusses about the store management based on data time effect within datapsilas life cycle. The main point, however, is to find out a feasible way on a Website towards how to divide the data upon its time effect, what kind of store strategies should be adopted due to the division and finally some suggestions and solution would be proposed.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132257109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sustaining Learners in WBT Environments through Service-Oriented Formative Assessment","authors":"I-Ching Chen, Shueh-Cheng Hu, Dong-Her Shih","doi":"10.1109/CIT.2008.WORKSHOPS.72","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.72","url":null,"abstract":"Web-based training gains popularity due to the pervasiveness of Web applications, abundant hyper media contents, and other attractive attributes. However, previous experience and research indicate that learners in Web-based learning environments tend to drop out when they lose orientation or have insufficient interaction with support providers during self-directed learning process. Formative assessment activities can not only identify weakness of learners, but also can provide guidance toward ultimate learning goals through interactions with learners. Various instructional resources have been designed to enrich e-learning context, and most of these resources are integrated proprietarily within Web-based learning platforms. The service oriented approach, which enables a more flexible way for architecting software systems, could be applied in a variety of domains, including those with the purpose of pedagogy. This research work aims to investigate a method of enhancing interactivity in Web-central learning environments by means of blending formative assessment services into instructional processes. A proof-of-concept prototype has been implemented and the preliminary usage shows that the interactions between self-directed learners and support-providers are critical to sustaining those learners as well as better learning achievements.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"100 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133085602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of Iris Based Hard Fuzzy Vault","authors":"E. Reddy, I. R. Babu","doi":"10.1109/CIT.2008.WORKSHOPS.20","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.20","url":null,"abstract":"Blend of cryptography and biometrics results an emerging architecture known as Crypto-biometrics which produces high level security. Fuzzy vault is a cryptographic construction used to store iris biometric templates which are binded by a random key extracted from same iris textures. Though the fuzzy vault provides better security, it is affected by cross matching, non uniform nature of biometric data. To overcome these limitations, we propose a scheme that hardens both fuzzy vault and secret key using password based on iris textures. By using password an additional layer of security is embedded to achieve high level security.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116897010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of C4ISR Architecture Simulation Validation with UML and Object-Based Petri Nets","authors":"Xiaohui Bai","doi":"10.1109/CIT.2008.WORKSHOPS.61","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.61","url":null,"abstract":"C4ISR (command, control, communication, computer, intelligence, surveillance and reconnaissance) architecture is the important method to ensure the quality of system design. One method of C4ISR architecture validation is to transform the C4ISR architecture products to executable models. Through analyzing model execution process and result, the performance of C4ISR architecture can be tested. Based on the different advantage of UML (Unified Modeling Language) and Petri nets, the paper applies some kinds of views in UML to describe the relative C4ISR system architecture products. Considering the relationship among the products, the UML view of products is transformed to OPN (object-based Petri nets) simulation model according to the transformation rules. So the dynamic behavior of system can be displayed by those simulation model, and whether the relation of time-order, information flow and interface is reasonable, or the system function satisfies the military requirement , and the change of system state is correct, can be checked evidently. At last, the paper gives a case in the air defense system using simulation validation method proposed by it.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"358 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Dependency Trees from Binary Data","authors":"Chaofeng Sha, Dao Tao, Aoying Zhou, Weining Qian","doi":"10.1109/CIT.2008.WORKSHOPS.92","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.92","url":null,"abstract":"Much work has been done in finding interesting subsets of items, since it has broad applications in financial data analysis, e-commerce, text data mining, and so on. Though the well-known frequent pattern mining attracted much attention in research community, recently, more work has been devoted to analysis of more sophisticated relationships among items. Chow-Liu tree and low-entropy tree, for example, were used to summarize the frequent patterns. In this paper, we consider finding a novel dependency tree from binary data. It has several advantages over previous related work. Firstly, we propose a novel distance measure between items based on information theory, which captures the expected uncertainty in the item pairs and the mutual information between them. Based on this distance measure, we present a simple yet efficient algorithm for finding the dependency trees from binary data. We also show how our new approach can find applications in frequent pattern summarization. Our running example on synthetic dataset shows that our approach achieves good results compared to existing popular heuristics.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114512190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Semantic Web Technologies in Visualizing Medicinal Vocabularies","authors":"J. Puustjarvi, L. Puustjarvi","doi":"10.1109/CIT.2008.WORKSHOPS.19","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.19","url":null,"abstract":"The number of new medications and medicinal knowledge increases all the time. Further, as each drug has its unique indications, cross-reactivity, complications and costs also the management and dissemination of medication information becomes still more complex giving rise for potential medication errors. However, by utilizing the Semantic Web technologies in visualizing medication information this complexity can be alleviated in many ways. In this paper we report our work on developing an electronic medicinal vocabulary. It deviates from other medicinal vocabularies in that the terms and their relationships are graphically illustrated and additional queries can be made on the graphical presentation. The supported visualization format is a variation of the concept mapping.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126160815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}