{"title":"The Control of Symmetric Data Interpolation Surface","authors":"Yunfeng Zhang, Shanshan Gao, Shilong Li, Caiming Zhang","doi":"10.1109/CIT.2008.WORKSHOPS.95","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.95","url":null,"abstract":"This paper discuss the property of symmetric data interpolation surface. For the given data, when the parameters very, the interpolating surface varies, so the interpolating surfaces can be modified by selecting suitable parameters under the condition that the interpolation data are not changed. The problem is that when the two parameters vary, how does the interpolating surface change. The discussion focuses on the problem in this paper. With the change of the two parameters, the trend of variations of the interpolating surface is derived. Based on the conclusion on the two parameters, one easy to control the shape of the surface. Examples to show the effect of the parameters on the surfaces are given.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption","authors":"S. C. Koduru, V. Chandrasekaran","doi":"10.1109/CIT.2008.WORKSHOPS.33","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.33","url":null,"abstract":"Most block-cipher image encryption schemes based on chaos theory have independent modules for confusion and diffusion processes. None of the current schemes use chaos theory in the diffusion modules - thus not utilizing the capabilities of chaos to the fullest extent. We can do better: we integrate these mechanisms into a single step, thus making the encryption process efficient. This paper presents three novelties: (a) we extend 2D images to 3D by using grayscale image intensities in 8-bit binary form (b) we embed the diffusion mechanism into confusion by applying the 3D Baker map based confusion algorithm. Thus, the diffusion process is accomplished by a permutation of binary bits in the third dimension, eliminating the need for a separate diffusion process and (c) we extend the proposed method to color images by using the 24-bit color information. Color image encryption is usually performed by encrypting each channel independently and then combining these to get the encrypted image. We demonstrate that with this simplistic approach, decrypting even a single channel would reveal reasonable information contained in the image. In our approach, this drawback is eliminated because of the inherent dependence between the data contained in all the channels, thus highlighting the inherent superiority of the proposed algorithm for color image security.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Qureshi, A. Raza, D. Kumar, Sangsig Kim, Un-Sig Song, Min-Woo Park, Hyuk-Soo Jang, Hyo-Sik Yang
{"title":"A Communication Architecture for Inter-substation Communication","authors":"M. Qureshi, A. Raza, D. Kumar, Sangsig Kim, Un-Sig Song, Min-Woo Park, Hyuk-Soo Jang, Hyo-Sik Yang","doi":"10.1109/CIT.2008.WORKSHOPS.55","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.55","url":null,"abstract":"In the realm of substation automation (SA), communication infrastructure plays a vital role in mediating between physical and virtual worlds of substation. Specification of data exchanges through standardized communication stacks is therefore an important issue for all substation equipment manufacturers seeking to provide vendor interoperability. As communication arena is changing day by day, the need for efficient and reliable communication infrastructure to address SA is evident. In this respect, a communication network constitutes the core of the SA, thus the design of cost-effective and reliable network architecture is a crucial task. Most of the existing communication networks claim to address the need of communication architecture for SA but in some regard these claims just could not fulfill the constraints imposed by highly available environment for SA. This paper presents a survey and analysis of the current state-of-the-art communication infrastructure in the SA and proposes giga-bit Ethernet topology and E-PON based architecture.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126908202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Data Mining Applications in Crime Domain","authors":"P. Thongtae, S. Srisuk","doi":"10.1109/CIT.2008.WORKSHOPS.80","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.80","url":null,"abstract":"In this paper, we give comprehensive surveys of efficient and effective methods/techniques on data mining for crime data analysis. These techniques aim at finding the illegal activities of professional identity fraudsters based on knowledge discovered from their own histories. We also raise some problems of applied data mining in crime control and criminal suppression. It is known that detecting crime from data analysis can be difficult because daily activities of criminal generate large amounts of data and stem from various formats. In addition, the quality of data analysis depends greatly on background knowledge of analyst. A criminal can range from civil infraction such as illegal driving to terrorism mass murder such as the 9/11 attacks, therefore it is difficult to model the perfect algorithm to cover all of them. Finally, this paper proposes a guideline to overcome the problem.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115408867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hashed Multiple Lists: A Stream Filter for Processing Continuous Query with Multiple Attributes in Geosensor Networks","authors":"Dong Gyu Lee, Y. Jung, Young Wook Lee, K. Ryu","doi":"10.1109/CIT.2008.WORKSHOPS.87","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.87","url":null,"abstract":"Many researches for processing continuous query are important to be processed in real time on data stream environments. Continuous query should be inserted and searched in real time on data stream environments. Some indexing techniques are applied in order to process continuous queries. Previous work is not able to support the dynamic insertion and deletion operation for building an index previously. The performance of insertion and search operation are also slowed because of large number and wide range of interval inserted. Therefore, in order to solve those problems, we propose hashed multiple lists to process continuous queries in real time in geosensor networks. Proposed technique shows the fast linear insertion and search performance in the performance evaluation. It can be utilized the location based service, u-healthcare, data stream management system, and context-awareness system.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Diffusion Model to Forecast New Products for Realizing Early Decision on Production, Sales, and Inventory","authors":"S. Munakata, M. Tezuka","doi":"10.1109/CIT.2008.WORKSHOPS.68","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.68","url":null,"abstract":"In order to avoid excess or shortage of inventory and to maintain appropriate inventory level, consumer-goods manufacturers have to balance demand and supply. Fluctuation of the demand of regular items is relatively stable, which allows statistical time series forecasting methods work well. As a result, the inventory level of the regular items can be maintained properly. On the other hand, accurate forecast of new products is difficult to achieve. Thus, the problem is to realize accurate forecast of new products and to enable early decision making on adjustment of production schedule. This paper proposes a new demand forecasting model that is an extension of the traditional exponential diffusion models. We examined the forecasting performance of the models just after the release of the item when the small number of model calibration data is available. This paper shows that the proposed model has the best performance and enables early decision making.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129474735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quadric Polynomial Interpolation Based on Minimum Local Stretching Energy","authors":"Shanshan Gao, Jing Chi, Caiming Zhang","doi":"10.1109/CIT.2008.WORKSHOPS.79","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.79","url":null,"abstract":"This paper presents a method to construct C1 polynomial surface with scattered data points. At first the given data points are divided into triangular networks, and then at the adjacent region of each point a C1 piecewise quadric interpolation patch is constructed. Objective function according to the stretching strain energy is constructed. Minimizing the objective function to determine the unknown quantities, and at last achieves fair interpolating surface. The constructed surface has the shape suggested by the given data points. At last comparison examples are included to prove the efficiency of the new method.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Source Identification and Separation Using Global Matrix Parameters of ICA","authors":"G. Naik, D.K. Kumar, M. Palaniswami","doi":"10.1109/CIT.2008.WORKSHOPS.58","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.58","url":null,"abstract":"Successful separation of independent sources using blind source separation (BSS) techniques requires estimating the number of independent sources in the mixture. Independent component analysis (ICA) is on of the widely used BSS techniques for source separation and identification in audio and bio signal processing. This paper has proposed the use of determinant of the global matrix of ICA as a measure of the number of independent and dependent sources in a mixture of signals. The paper reports experimental verification of the proposed technique where the values of the determinant are seen to be closely based on the number of dependent sources in the mixture.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130845825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of Information Security Management Practices in Indian Pubic Sector Banks","authors":"H. Diwakar, A. Naik","doi":"10.1109/CIT.2008.WORKSHOPS.115","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.115","url":null,"abstract":"The initiation of financial deregulation, globalization and hence the arrival of new techno-savvy market players with customer centric business model, posed a great challenge to the public sector banks (PSB) in India, who are in banking business for more than a century. These banks quickly realized the need for technology based banking solutions as the only way to be in business and hence onward have started introducing technology based solutions at a faster pace, without reforming their Information security management at similar pace, thus exposing themselves to Information system related security threats. In this paper, using case study research design and methods an investigative study conducted on the preparedness and the currently prevalent IT security management practices of PSBs is discussed. The potential vulnerabilities that exist in the system with specific reference to data leaks, suggestions to safeguard these banks from such threats are presented.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable WiMAX Multicast Applications","authors":"Jiann-Liang Chen, Kung-Cheng Wang","doi":"10.1109/CIT.2008.WORKSHOPS.53","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.53","url":null,"abstract":"This study proposes a reliable multicast mechanism for WiMAX applications. The proposed mechanism is based on the core-based tree data forwarding architecture and IGMP group management, and can handle the data sending to the receivers successfully with error recovery and fast-handoff. A WiMAX multicast mechanism with mobility applications is also presented. Simulation results indicate that the proposed multicast mechanism can reduce the network load by about 35% and the average delay by about 29%.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}