{"title":"Effective Instruction Fetch Stage Design for 16-Bit Instruction Set Architecture","authors":"A. Kim, Seokjoong Hwang, S. Kim","doi":"10.1109/CIT.2008.WORKSHOPS.107","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.107","url":null,"abstract":"The 16-bit instruction set architecture has merits in terms of code size reduction and instruction cache efficiency. But we have taken the advantages at the cost of performance due to lack of an available expression space for a long immediate value, a three-address mode and so on. This paper presents a new instruction coalescing technique named as move folding to remove redundant move instructions caused by the limitation of the 16-bit instruction set.We prove effectiveness of the technique by implementing it on a commercial microprocessor. The proposed move folding technique improves speedup of 5% on average and up to 18% at the cost of 4.3% hardware complexity increment.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
HyeSuk Kim, H. Yoon, Nguyen Dinh Toan, Gueesang Lee
{"title":"Anisotropic Diffusion Transform Based on Directions of Edges","authors":"HyeSuk Kim, H. Yoon, Nguyen Dinh Toan, Gueesang Lee","doi":"10.1109/CIT.2008.WORKSHOPS.100","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.100","url":null,"abstract":"This paper provides the derivation of speckle reducing anisotropic diffusion (SRAD), anisotropic diffusion method tailored to ultrasonic imaging applications. The conventional anisotropic diffusion is performed in four directions without condition in the previous method. In this paper, a new anisotropic diffusion transform based on directions of edges is proposed. The proposed diffusion is not performed at a pixel which is not an edge. The range of proposed diffusion is selected adaptively according to the number of the directions of edges. Experiments results show that the process time of the proposed method over conventional methods, can be faster slightly. Also, the proposed method can improve the image quality of diagonal edges in ultrasound image with speckle noise.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134039056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Structural Change Point in Multivariate Regression Models: An Application on IT Productivity Impact","authors":"S. Poon, G. Fan, J. Poon, R. Young","doi":"10.1109/CIT.2008.WORKSHOPS.86","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.86","url":null,"abstract":"In many fields of empirical science, theories have been proposed arguing that behavioral relationships change over time. There are many possible ways in which parameters of regression models are assumed to change. With better understanding of how parameters change, estimation and testing procedures for various structural changes can be developed. This paper uses an exploratory way by augmenting the multivariate regression framework with data mining to study the less understood structural change concept by examining the effects of IT investments on industry profiles. It explores the shifting of industry boundaries over the past 17 years (1990-2006) in Australia.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124128942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robot Task Planning for Mixed-Initiative Human Robot Interaction in Home Service Robot","authors":"Dongyeop Kang, Ho‐Jin Choi","doi":"10.1109/CIT.2008.WORKSHOPS.84","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.84","url":null,"abstract":"The main reason of current robotics research is the difficulties of coping with dynamic environment, uncertainty, operational limitation, etc. Human robot interaction (HRI) becomes important role in robotics research and especially humanpsilas roles in HRI is increasing. In this paper, we made robot task planning framework for MI HRI in home service environment. We suggest an structure of task network called joint script which enables MI HRI and its planning process based on three procedures; search, selection and adaptation in deliberative layer. For experiment, we manually made 200 heterogeneous joint scripts and each module for script-based planning is validated by showing appropriate scenario.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Architecture and Its Role in Solving Business Issues: Case Study of the NSW Department of Lands","authors":"P. Harris","doi":"10.1109/CIT.2008.WORKSHOPS.98","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.98","url":null,"abstract":"Enterprise Architecture (EA) is a holistic and comprehensive business transformation method to define and plan changes to the organisationpsilas processes and operations. The value of an EA initiative is only realised by embracing and using the deliverable outputs. Frameworks, are the building blocks and process steps to assist with an EA project. The paper provides a non technical contextual overview of EA, an environment scan of its applicability across governments and references a detailed case study account with the NSW Department of Lands.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuin-Mu Wang, Xiao-Xing Mai, G. Lin, Chio-Tan Kuo
{"title":"Classification for Breast MRI Using Support Vector Machine","authors":"Chuin-Mu Wang, Xiao-Xing Mai, G. Lin, Chio-Tan Kuo","doi":"10.1109/CIT.2008.WORKSHOPS.90","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.90","url":null,"abstract":"Magnetic resonance image (MRI) was harmless to the human body and used on the clinical trial extensively in recent years. In this study, we want to detect the tissues of breast form the multi-spectral MR image. Because multi-spectral MR image are scanning the same slice with various frequencies and parameters and it can obtain intact information. In the image classification, we apply support vector machine (SVM) on breast multi-spectral magnetic resonance image to classify the tissues of breast separately. The classification results would assist doctor to judge and sift the breast tumor. In order to further evaluate its performance, the C-means (CM) classification method is compared with SVM. By some experiments, the result of SVM is better than C-mean.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127053505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A User-Centric Privacy Authorization Model Based on Role and Session in the Context-Aware Home","authors":"Hyang-Chang Choi, YongHoon Yi","doi":"10.1109/CIT.2008.WORKSHOPS.97","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.97","url":null,"abstract":"The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation is higher than that of the general computing environment given user participations. This paper presents a user-centric access control model based on role and session in the context-aware home. Our model provides privacy protection for the users using a range of services of the context-aware home and provides anonymity by joining ID and roles.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Studies on Dynamics Performance of Lateral and Longitudinal Control for Autonomous Vehicle Using Image Processing","authors":"K. Isa","doi":"10.1109/CIT.2008.WORKSHOPS.89","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.89","url":null,"abstract":"This paper presents a simulation of vehicle driving control system in terms of lateral and longitudinal control using image processing. The main contribution of this study is it contributes an algorithm of vehicle lane detection and tracking which based on colour cue segmentation, Canny edge detection and Hough transform. The algorithm gave good result in detecting straight and smooth curvature lane on highway even the lane was affected by shadow. Then by combining and processing the result of lane detection process with vehicle dynamics model, this system will produce the dynamics performance of vehicle driving control. This simulation system was divided into four subsystems: sensor, image processing, controller and vehicle. All the methods have been tested on video data and the experimental results have demonstrated a fast and robust system.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124135639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virus Prevention Model Based on Static Analysis and Data Mining Methods","authors":"Tzu-Yen Wang, C. Wu, Chu-Cheng Hsieh","doi":"10.1109/CIT.2008.WORKSHOPS.102","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.102","url":null,"abstract":"Owing to the lack of prevention ability of traditional anti-virus methods, a behavior-based virus prevention model for detecting unknown virus is proposed in this study. We first defined the behaviors of an executable by observing its usage of dynamically linked libraries and Application Programming Interfaces. Then, information gain and support vector machines were applied to filter out the redundant behavior attributes and select informative feature for training a virus classifier. The performance of our model was evaluated by a dataset contains 1,758 benign executables and 846 viruses. The experiment results are promising, and the overall accuracies are 99% and 96.66% for detecting the known viruses and the previously unseen viruses respectively.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Ternary Sigma-Delta Modulated Processor: Adder and Integrator","authors":"A. Sadik, P. O'Shea","doi":"10.1109/CIT.2008.WORKSHOPS.16","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.16","url":null,"abstract":"Sigma delta modulated systems have a number of very appealing properties, and are therefore heavily used in analog to digital converters, amplifiers and as modulators in communication systems. This paper presents new results which show that they may also be useful for general purpose arithmetic computing. The paper introduces ternary (i.e. +1, 0 or -1) sigma delta modulated adders and integrators. Simulations show that these new structures have very promising performance.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}