{"title":"Objective measurements of distorted image quality evaluation","authors":"R. Sakuldee, S. Udomhunsakul","doi":"10.1109/ICCCE.2008.4580768","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580768","url":null,"abstract":"Measurement of the quality of distorted image still remains an important issue. In this paper, we propose a new objective measurement, denoted as image quality score (IQS) that better matches the visual information fidelity (VIF) than using fundamental image quality measurements. IQS can be used to measure the quality of gray scale image in different distortion types such as blurring, additive Gaussian noise, impulsive salt & pepper noise and JPEG2000 images. From the experiments, we found that IQS correlates well with the judgment of human observers. Moreover, it gives the result of distorted image quality from 1 to 5 (unacceptable to excellent quality).","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microcontroller based standalone PV system for wireless sensor node","authors":"Md. Anwarul Azim, S.M. Ariful Huda, Hafizal Mohammad, Nowshad Amin","doi":"10.1109/ICCCE.2008.4580784","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580784","url":null,"abstract":"This study integrates the photovoltaic panel power monitoring, the charge controller as well as switching options for remote monitoring applications of any wireless sensor network. To increase the life time of a sensor node, recharge cycle is optimized in such a way that the battery is not charged randomly even though sunlight is available on PV panel, rather it is charged while discharge reaches to a certain predefined limit. Thus, it increases the storage battery life time by reducing the recharge cycle. Here, a powerful PIC microcontroller is used for future enhancement of a complete sensor node solution for environmental monitoring application. However, cost-efficiency can be obtained by selecting optimum hardware for particular device of specific applications with the same methodology described in this paper.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Morphology approach for features extraction in retinal images for diabetic retionopathy diagnosis","authors":"Ibrahim Abdurrazaq, S. Hati, C. Eswaran","doi":"10.1109/ICCCE.2008.4580830","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580830","url":null,"abstract":"In this paper, a novel approach for vessels extraction edge-based image segmentation is proposed. Vessels segmentation and extraction play an important role in supporting computer assistance for diagnosis of Diabetic Retinopathy (DR). Diabetic Retinopathy is a severe and widely spread eye disease. The algorithms to detect and extract vessels from retinal images are mainly based on morphological filtering and segmentation methods. We proposed an image segmentation algorithm by integrating mathematical morphological edge detector with TopHat technique. In this paper, theoretical backgrounds and procedure illustrations of the proposed algorithm are presented. Furthermore, the proposed algorithm has been evaluated on several images of publicly available database. The results are compared with those obtained by other known methods as well as with the golden images. It is shown that the proposed method can yield a specificity value as high as 82%, which is comparable to the results obtained by other known methods.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated web/mobile remote surveillance system","authors":"S. A. Hameed, A. Abdullah","doi":"10.1109/ICCCE.2008.4580633","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580633","url":null,"abstract":"Most computers have connections to networks, which can be exploited through security cracking to gain access to any confidential data that may be stored on the computer. Thus, it is important to create some type of detection and prevention of the network from being attacked. Intrusion detection systems monitor computer networks looking for evidence of malicious actions. Networks are complex systems, and a comprehensive intrusion detection solution has to be able to manage event streams with different content, speed, level of abstraction, and accessibility. The current network surveillance system like network intrusion detection system (NIDS) has many defects, such as low detection ability, lack of effective response mechanism, poor manageability, etc. Besides, other problems are; it only has a single function of detecting intrusion and supports and experts needed to configure different layout of NIDS makes the systems not flexible and also upgrade intolerant. The main goal for this project is to design an IPS (intrusion prevention system), a network surveillance, analysis, and response system for high-speed network. In addition, the system provides a networking surveillance tools featured with alert monitoring systems with fast response system. The system also has the ability of remote surveillance system that will be integrated with the web and mobile access. We have developed a prototype system and demonstrated usefulness of our approaches. In regards to speed and latency, our result analysis have shown that our anomaly and signature detection capable enough to block an attack in fast response time.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116481945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Failure recovery of composite semantic web services using subgraph replacement","authors":"H. Saboohi, A. Amini, H. Abolhassani","doi":"10.1109/ICCCE.2008.4580652","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580652","url":null,"abstract":"Web services foster functionality of current web to service oriented architecture. Nascent semantic web is capable of automating activities by annotating shared ontological semantics to documents and services. Although, a zillion web services with diversity have been made since the inception of its diffusion, it is not a panacea for software development and it is still in its infancy. A middle agent (broker) simplifies the interaction of service providers and service requester, especially in the case that an atomic web service cannot fulfill userpsilas need. The broker composes a desired value-added service and orchestrates the execution of bundled sub-processes. It is inevitable that several constitutive web services may fail during the execution and become unavailable. In this paper, we propose replacement of a sequence of semantic web services in lieu of old composition subgraph which includes perished web service(s) that jeopardized the completion of whole process. We try to perform finding foreseeable replacing graphs, and their compatible alternative subgraphs and ranking of them before exploitation of composite web service. Furthermore, we illuminate an approach for resolving functional differences between old and new subgraphs.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117107498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Siasar djahantighi, M. Norouzifard, S. H. Davarpanah, M. H. Shenassa
{"title":"Using natural language processing in order to create SQL queries","authors":"F. Siasar djahantighi, M. Norouzifard, S. H. Davarpanah, M. H. Shenassa","doi":"10.1109/ICCCE.2008.4580674","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580674","url":null,"abstract":"Using query language for dealing with databases is always a professional and complex problem. This complexity causes the userpsilas usage of data existing in database limits to use definite reports there are in some pre implemented softwares. However, you can create this opportunity that each none professional user transfers his questions and requirements to computer in natural language and derives his desired data by natural language processing. In this paper we represent a method for building a ldquonatural languages interfaces to data basesrdquo (NLIDB) system. This system prepares an ldquoexpert systemrdquo implemented in prolog which it can identify synonymous words in any language. It first parses the input sentences, and then the natural language expressions are transformed to SQL language.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey of the current voter verification algorithms","authors":"M. Javid Moayed, A. A. Abdul Ghani, R. Mahmod","doi":"10.1109/ICCCE.2008.4580639","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580639","url":null,"abstract":"Security in voting system especially in voter verification for satisfaction voter about her votes in cast and counted as intended is one of the most important topics in voting systems. There are ballot of cryptographic election protocols which they encrypt content ballot separate from the voter intended, therefore they canpsilat do ensure that the voting booth records the correct vote. Nowadays, there is a little method that they combined voter intended and ballot encryption together. Every one of these methods has private property and some advantages and disadvantages. For developing in this array, knowing all same methods and comparing them is very helpful. In this article was tried to introduce current same method in voter verification and then compare them.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128538905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A basic sequential algorithmic scheme approach for classification of modulation based on neural network","authors":"N. Ahmadi, R. Berangi","doi":"10.1109/ICCCE.2008.4580667","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580667","url":null,"abstract":"In this paper modulated signal symbols constellation utilizing TTSAS clustering algorithm, which is a specific kind of BSAS clustering, and matching with standard templates, is used for classification of QAM modulation. TTSAS algorithm used in this paper is implemented by Hamming neural network. The simulation results show the capability of this method for modulation classification with high accuracy and appropriate convergence in the presence of noise.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an input matching network for RF CMOS LNAs using stack inductors","authors":"M. Zarifi, J. Frounchi","doi":"10.1109/ICCCE.2008.4580689","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580689","url":null,"abstract":"This paper presents a low noise amplifier (LNA) with an input impedance matching technique using mutual coupled stack inductors. Two different input matching methodologies using mutual inductors are evaluated in terms of their effect on the gain and NF of RF CMOS LNAs in 2.4 GHz. Design guidelines to improve the gain-NF performance of CMOS LNAs are developed by means of analytical expressions. Moreover, it is demonstrated that the NF of the LNA can be minimized in negative mutual coefficient methods by properly choosing the size of the active and passive components. A 2.5-GHz global system for Bluetooth communication LNA using this technique is designed and simulated using 0.35-um standard 2P4M complementary metal oxide semiconductor technology. It achieves an 18-dB gain, 2.47-dB noise figure, and -5.2-dBm input referred IIP3 with -100m for coupling coefficient. The LNA draws 6.4 mA from a single 3.3-V power supply.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Photo-realistic text-driven malay talking head with multiple expression","authors":"T. Tan, S. Salleh, Kim-Mey Chew, Sheau-Chyi Lim","doi":"10.1109/ICCCE.2008.4580697","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580697","url":null,"abstract":"In this decade of information technology, talking heads become more and more common as parts of modern computer-user interface. A talking head can add entertainment value to a program and make it more engaging. While talking heads with multiple expressions, it can let listeners to identify speakerpsilas emotional state easily. But, generating animated talking heads that look like real people is a very challenging task, and so far all synthesized heads are still far from reaching this goal. Hence, the purpose of this work is to construct a natural, photo-realistic in appearance of talking heads which exhibit proper articulation by the lips that are synchronized with the speech. Moreover, realistic head movements, as well as emotional expressions that harmonize with the spoken text also added. And these talking heads are driven by English and Malay text. Photogram Metrics technique is applied to a model with photo-realistic face, while sample-based approach is implemented in facial movements of the Talking Heads to bypass the complexities linked to analytical modeling. Then, the talking heads will form the audio-visual text-to-speech synthesis (AV-TTS) system and transformed into modules so that can be exported to any application.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}