2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)最新文献

筛选
英文 中文
Cognitive Modeling in Medical Pattern Semantic Understanding 医学模式语义理解中的认知建模
L. Ogiela, R. Tadeusiewicz, M. Ogiela
{"title":"Cognitive Modeling in Medical Pattern Semantic Understanding","authors":"L. Ogiela, R. Tadeusiewicz, M. Ogiela","doi":"10.1109/MUE.2008.47","DOIUrl":"https://doi.org/10.1109/MUE.2008.47","url":null,"abstract":"In the paper the new approach for cognitive modeling of some medical structures, using picture grammar have been presented. Especially was discussed the method of artificial intelligence dedicated to the syntactic-based semantic inference of selected RTG visualizations with particular attention to the leg bones. The presented methodology makes possible to describe for each biological structure, its semantic characteristics, and allow to formulate a semantic meaning of pathological deformation. Presented approach proofed that cognitive informatics based on semantic formalisms can be used to develop a new classes of intelligent computer-aided diagnosis systems. Such systems authors called UBIAS (understanding based image analysis systems).","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123714520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributive Key Management for Mobile Ad Hoc Networks 移动Ad Hoc网络的分布式密钥管理
M. Al-Shurman, S. Yoo, Bonam Kim
{"title":"Distributive Key Management for Mobile Ad Hoc Networks","authors":"M. Al-Shurman, S. Yoo, Bonam Kim","doi":"10.1109/MUE.2008.66","DOIUrl":"https://doi.org/10.1109/MUE.2008.66","url":null,"abstract":"Security of mobile ad hoc networks is built upon a reliable key management system to generate and distribute symmetric encryption/decryption keys for communicating parties. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks where central approaches will fail in such dynamic, high mobility networks. Threshold cryptography1 has been proposed to provide a reliable, distributive key management for networks. In an (n, t + 1) threshold system, there are n servers to provide key generation and distribution when needed for the whole network. From these n servers, any x servers (t < x les n) can co-operate and generate a key for any node. Until now, threshold cryptography has remained only a theory. No practical key management system has been proposed to use threshold cryptography that mentioned what kind of shares servers will have in common and the practical way of creating the key from these shares . In this paper, we will construct a practical (n, t + 1)-threshold key management system using maximum distance separable codes (MDS).","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126662206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigation of Secure Framework for Multipath MANET 多路径MANET安全框架研究
B. Vaidya, Dong-You Choi, Jong-An Park, Seung-Jo Han
{"title":"Investigation of Secure Framework for Multipath MANET","authors":"B. Vaidya, Dong-You Choi, Jong-An Park, Seung-Jo Han","doi":"10.1109/MUE.2008.104","DOIUrl":"https://doi.org/10.1109/MUE.2008.104","url":null,"abstract":"A wireless multihop ad hoc network is emerging as an important area for new developments in the ubiquitous network. Although ad hoc network is attractive solution, there are still some challenges in robustness and security issues. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is complete solution for end-to-end security for multpath wireless multihop network. We have analyzed the performance the proposed framework.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122130523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Colonic Polyp Detection by the Mapping Using Regional Unit Sphere 基于区域单位球映射的结肠息肉自动检测
Mira Park, Jesse S. Jin, R. Hofstetter, Min Xu, B. Kang
{"title":"Automatic Colonic Polyp Detection by the Mapping Using Regional Unit Sphere","authors":"Mira Park, Jesse S. Jin, R. Hofstetter, Min Xu, B. Kang","doi":"10.1109/MUE.2008.93","DOIUrl":"https://doi.org/10.1109/MUE.2008.93","url":null,"abstract":"Colonic polyps appear like elliptical protrusions on the inner wall of the colon. The many proposed algorithms assumed the shape of a polyp as a spherical cap, so the algorithms are not flexible when the polyps are irregular shapes. In this paper, we propose a mapping using regional unit sphere (MuRUS) method to overcome the problem caused by unexpected polyp shapes. The MuRUS has shape invariant and size invariant properties. Our method was applied to colon CT images from 3 7 patients each having a prone and supine scan. There are 45 colonscopically confirmed polyps. The results obtained by our algorithm were compared with those gold standards. 100% of polyps >= 10 mm in diameter were detected, 90% of polyps >= 6 mm in diameter were detected and 70% of polyps < 6 mm in diameter were detected at 7.0 FPs per patient.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122177209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Verification-Based Localization Method for Unstable Radio Sensor Networks in Smart Home Environments 智能家居环境下不稳定无线传感器网络基于验证的定位方法
Yong-Ming Huang, Ding-Chau Wang, Chao-Chun Chen
{"title":"A Verification-Based Localization Method for Unstable Radio Sensor Networks in Smart Home Environments","authors":"Yong-Ming Huang, Ding-Chau Wang, Chao-Chun Chen","doi":"10.1109/MUE.2008.32","DOIUrl":"https://doi.org/10.1109/MUE.2008.32","url":null,"abstract":"One of the key technologies of the ubiquitous sensor networks is localization. Most localization techniques nowadays apply ranging techniques to compute the location of the object wireless sensor network. Although the RSSI-based ranging technology is widely used and a cost-effective solution for localization in wireless sensor networks, a wireless ad hoc network is a fading signal environment that comprises noises. The noises cause RSSI to be unstable and lead to abrupt distance estimates. In this paper, we propose a verification-based localization method (VBLM) that determines whether a received signal is a noise. Our basic idea is that the unknown node uses another neighboring beacon to assist to verify the quality of received signal. The experimental results show that VBLM indeed reduces the localization error in the unstable radio sensor networks.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Novel Topic Extraction Method Based on Bursts in Video Streams 一种基于视频流突发的主题提取方法
Kimiaki Shirahama, K. Uehara
{"title":"A Novel Topic Extraction Method Based on Bursts in Video Streams","authors":"Kimiaki Shirahama, K. Uehara","doi":"10.1109/MUE.2008.101","DOIUrl":"https://doi.org/10.1109/MUE.2008.101","url":null,"abstract":"In this paper, we introduce a novel topic extraction method. Firstly, we divide a video into events based on target character's appearance and disappearance. Specifically, each event is an interval where the target character performs a certain action. And, it is characterized by a specific pattern of shots where the character appears and shots where he/she disappears. Then, we define a \"topic\" as an event where the target character performs an interesting action (e.g. fight, chase, kiss and so on). We extract such topics as events containing abnormal patterns, called \"bursts\". The experiments on different videos validate that character's appearance and disappearance are effective for obtaining semantically meaningful events. From these events, we could extract many interesting topics.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Transcoding Architecture for Adapting MPEG-21 Digital Items in Mobile Networks 移动网络中适应MPEG-21数字项目的转码体系结构
Tz-Heng Hsu, Yueh-Heng Li, Meng-Shu Chiang
{"title":"A Transcoding Architecture for Adapting MPEG-21 Digital Items in Mobile Networks","authors":"Tz-Heng Hsu, Yueh-Heng Li, Meng-Shu Chiang","doi":"10.1109/MUE.2008.88","DOIUrl":"https://doi.org/10.1109/MUE.2008.88","url":null,"abstract":"Due to the vast size, real-time requirement, QoS consideration, etc., of mobile devices, techniques like multimedia transcoding are developed to satisfy the need of surfing the multimedia services using mobile devices. In this paper, we will propose a transcoding proxy architecture for adapting MPEG-21 digital items in mobile networks. Our proposed multimedia proxy system will cover the following concerns: (1) design a system architecture for the proposed multimedia proxy with MPEG-21 digital item adaptation, and (2) develop a cache and replacement policy for adapted MPEG-21 digital items. The proposed transcoding proxy adopts fine-grain cache and replacement algorithms for different multimedia objects and a cache scheme to smooth the delay variations of a cached object during subsequent playbacks.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124625800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Live Streaming Media Architecture for Peer-to-Peer Network 一种新的点对点网络实时流媒体架构
Jiujun Cheng, Chungang Yan, Kuifei Yu, Jian Ma
{"title":"A New Live Streaming Media Architecture for Peer-to-Peer Network","authors":"Jiujun Cheng, Chungang Yan, Kuifei Yu, Jian Ma","doi":"10.1109/MUE.2008.43","DOIUrl":"https://doi.org/10.1109/MUE.2008.43","url":null,"abstract":"In P2P network, live streaming media distribution in a large scale P2P network and the impact on the real-time caused by the dynamicity of peers are still not well resolved. In order to address this problem, a relative stable P2P network architecture for live streaming media is presented. Our approach is that the architecture combines tree with clusters, and some super-peers are reserved in the clusters for peers' joining and departure, which is likely to be significant in a highly dynamic environment. In addition, the maximum accepted connection of each super- peer and its average disposing delay are adopted to select the optimal father peer. The experiment results show that the new architecture assures the improvement of real-time and live streaming media distribution in the large-scale P2P network, and at the same time, improves the scalability of the P2P network.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"78 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120917067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Personal Identity Verification Approach Using a Discrete Wavelet Transform of the ECG Signal 基于心电信号离散小波变换的身份验证方法
C. Chiu, Chou-Min Chuang, Chih-Yu Hsu
{"title":"A Novel Personal Identity Verification Approach Using a Discrete Wavelet Transform of the ECG Signal","authors":"C. Chiu, Chou-Min Chuang, Chih-Yu Hsu","doi":"10.1109/MUE.2008.67","DOIUrl":"https://doi.org/10.1109/MUE.2008.67","url":null,"abstract":"The purpose of this research is to develop a real time system for individual verification with the electrocardiogram (ECG) signal. The ECG signal varies from person to person and it can be used as a new biometric for individual verification. The discrete wavelet transform extract signal features by wavelet coefficients of one-lead ECG signal. Using the proposed approach on 35 normal subjects and 10 arrhythmia patients, 100% verification rate was obtained for normal subjects and 81% verification rate for arrhythmia patients. Furthermore, the performance of the ECG verification system was evaluated by the false acceptance rate (FAR) and false rejection rate (FRR). The FAR was 0.83% and FRR was 0.86%for a database containing only 35 normal subjects. When 10 arrhythmia patients were added into the database, the FAR became 12.50% and the FRR 5.11%. The experimental results demonstrate that the proposed system works very well for normal subjects.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116732321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Developing Proactive Information Delivery System through Bluetooth in Ubiquitous Networks 泛在网络中基于蓝牙的主动信息传递系统的开发
Eric J. Ballance, Hwajung Lee
{"title":"Developing Proactive Information Delivery System through Bluetooth in Ubiquitous Networks","authors":"Eric J. Ballance, Hwajung Lee","doi":"10.1109/MUE.2008.109","DOIUrl":"https://doi.org/10.1109/MUE.2008.109","url":null,"abstract":"Ubiquitous and pervasive computing (UPC) is a popular paradigm whose purpose is to emerge computers into the real world, to serve humans where the ubiquitous network is the underneath infrastructure. In order to provide ubiquitous services (u-Service) which deliver useful information to service users without human intervention, this paper implements a proactive information delivery system using Bluetooth technology. Bluetooth is a low- powered networking service that supports several protocol profiles, most importantly file transfer. Combined together, ubiquitous computing and Bluetooth have the potential to furnish ubiquitous solutions (u-Solutions) that are efficient, employ simplified design characteristics, and collaboratively perform functions they are otherwise not capable. Thus, this paper first addresses the current Bluetooth technology. Then, it suggests and develops the proactive information delivery system utilizing Bluetooth and ubiquitous computing network concepts. The proactive information delivery system can be used in many ubiquitous applications such as ubiquitous commerce (u-Commerce) and ubiquitous education (u-Education).","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124115336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信