{"title":"Masking Based Segmentation of Diseased MRI Images","authors":"A. De, R. Das, A. Bhattacharjee, D. Sharma","doi":"10.1109/ICISA.2010.5480274","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480274","url":null,"abstract":"We have devised a new technique to segment an diseased MRI image wherein the diseased part is segregated using a masking based thresholding technique together with entropy maximization. The particle swarm optimization technique (PSO) is used to get the region of interest (ROI) of the MRI image. The mask used is a variable mask. The rectangular mask is grown using an algorithm provided in the subsequent sections using similarity of neighbourhood pixels. Tests on various diseased MRI images show that small diseased objects are successfully extracted irrespective of the complexity of the background and difference in intensity levels and class sizes. Previous works are based on bimodal images whereas our work is based on multimodal images.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Encryption Using ECG Signals with Chaotic Henon Map","authors":"Ching-Kun Chen, Chun-Liang Lin, Yen-Ming Chiu","doi":"10.1109/ICISA.2010.5480266","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480266","url":null,"abstract":"Electrocardiogram (ECG) signals varying from person to person, it could possibly be applied as a tool for biometric recognition. This paper attempts to introduce an individual feature of ECG with a chaotic Henon map for cryptography. The encryption system utilizes a portable instrument (Heart Pal) to collect ECG signals from the encrypted person and applies an intelligent algorithm based on Chaos theory to generate initial keys for chaotic Henon map. High quality randomness of ECG signals results in a widely expanded key space which would be an ideal key generator for data encryption.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Food Recommendation System Using Clustering Analysis for Diabetic Patients","authors":"Maiyaporn Phanich, Phathrajarin Pholkul, Suphakant Phimoltares","doi":"10.1109/ICISA.2010.5480416","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480416","url":null,"abstract":"Food and nutrition are a key to have good health. They are important for everyone to maintain a healthy diet especially for diabetic patients who have several limitations. Nutrition therapy is a major solution to prevent, manage and control diabetes by managing the nutrition based on the belief that food provides vital medicine and maintains a good health. Typically, diabetic patients need to avoid additional sugar and fat so the food pyramid is recommended to the patients for finding the substitution from the same food group. However, there is still a dietary diversity within food groups that can affect the diabetic patients. In this study, we proposed Food Recommendation System (FRS) by using food clustering analysis for diabetic patients. Our system will recommend the proper substituted foods in the context of nutrition and food characteristic. We used Self-Organizing Map (SOM) and K-mean clustering for food clustering analysis which is based on the similarity of eight significant nutrients for diabetic patient. At the end, the FRS was evaluated by nutritionists and it has performed very well and useful for nutrition area.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114573872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conceptualizing and Generalizing Access Control","authors":"S. Al-Fedaghi","doi":"10.1109/ICISA.2010.5480356","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480356","url":null,"abstract":"Access control models traditionally have been used to indicate which subjects have access to which objects. This paper conceptualizes access control in terms of information flow. A fundamental concept in this flow is that objects are \"things that flow\", i.e., that are received, processed, created, released, and transferred. The resulting diagrammatic description specifies the stream of flow between subjects and the system. Accordingly, security policies and constraints can be declared to control the flow in the stream. The paper gives an illustration of this flow-based description and provides examples from the security field that generalize the known access control methods.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132260323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Method on Illegal Use Using PCA under HER Environment","authors":"Donghwi Lee, Byong Hun Kim, Kuinam J. Kim","doi":"10.1109/ICISA.2010.5480257","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480257","url":null,"abstract":"Electronic information used under EHR(Electronic Health Recode) environment can be searched, modified or deleted in all the systems connected with EHR system inside a hospital, thanks to network systems. Inside a hospital, after logging in EHR system, RBAC system, which allots proper rights to users, is being used. In RBAC(Role-based access control), users' role can be misused or abused through packet modulation by network intrusion and modulation on log-in information of users. Current RBAC system is preventing misuse or abuse of users by managing authority allotment included in role, but users' information that is abused through network modulation can be detected through efficient network monitoring and network traffic analysis. However, in the environment where EHR system is connected even to the Internet, much analysis time is needed to find abused and misused roles only by monitoring network traffic. In this thesis, we, using Principal Component Analysis, can draw principal components of related data transmitted from RBAC system, make linear transformation, analyze correlation and detect use of improper role efficiently among a lot of network traffic","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133963309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D CAPTCHA: A Next Generation of the CAPTCHA","authors":"Montree Imsamai, Suphakant Phimoltares","doi":"10.1109/ICISA.2010.5480258","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480258","url":null,"abstract":"Nowadays, the Internet is now becoming a part of our everyday lives. Many services, including Email, search engine, and web board on Internet, are provided with free of charge and unintentionally turns them into vulnerability services. Many software robots or, in short term, bots are developed with purpose to use such services illegally and automatically. Thus, web sites employ human authentication mechanism called Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) to counter this attack. Unfortunately, many CAPTCHA have been already broken by bots and some CAPTCHA are difficult to read by human. In this paper, a new CAPTCHA method called 3D CAPTCHA is proposed to provide an enhanced protection from bots. This method based on assumption that human can recognize 3D character image better than Optical Character Recognition (OCR) software bots.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Enhanced Security Techniques of BGP for DRDoS Attack","authors":"Jaehoon Sun, Y. Sun","doi":"10.1109/ICISA.2010.5480354","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480354","url":null,"abstract":"Internet routing protocols currently in use in the typical protocol of the existing BGP protocol to strengthen the security of the BGP protocol by comparison with research on emerging issues of the AS-Path, IP Fake, DRDoS BGP protocol must be used when such the information you need, but due to malicious attack, or an incorrect setting can prevent the global Internet network operating in an effective response to threat information to the model are presented.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"10 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113934400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation Framework for Ontology Modularization Approaches","authors":"Sunju Oh, H. Yeom","doi":"10.1109/ICISA.2010.5480401","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480401","url":null,"abstract":"In this research, we devise a novel evaluation framework for ontology modularization to measure both the quality of ontology modules and the logical consistency during the modularization process. To measure the quality of ontology modules, we introduce module size, module cohesion, and module coupling metrics derived from the theory of software engineering. In addition, the evaluating modularization process to guarantee the logical consistency of entities and axioms during modularization is also included in the proposed framework. Empirical experiments are performed, and the experimental results indicate that our evaluation framework for ontology modularization is valid and works well. The ultimate goal of this research is to build an ontology modularization evaluation framework, enabling ontology engineers to compare and apply easily the different modularization approaches to produce qualifying ontology modules.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Classes of UBIAS and E-UBIAS Cognitive Vision Systems","authors":"M. Ogiela, R. Tadeusiewicz, L. Ogiela","doi":"10.1109/ICISA.2010.5480418","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480418","url":null,"abstract":"This paper describes new classes of specialised information systems called UBIAS and E-UBIAS. Such systems belong to the group of cognitive reasoning systems and are designed for the semantic analysis of complex patterns having the form of biomedical images. These systems are predecessors of a new generation of intelligent systems for understanding of merit content of medical visual data, and using this data as biometric characteristics.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127442051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Performance of Collision Arbitration for ISO/IEC 18000-6 RFID Standard","authors":"Jiang-Whai Dai, Ling-Feng Chiang, Shih-Chia Chen","doi":"10.1109/ICISA.2010.5480565","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480565","url":null,"abstract":"For multiple random accesses, a low throughput due to channel contention is the major limitation. The most latency occurs in the contention phase and, therefore, reducing the delay time thus becomes a relevant task. A collision occurs in real network access if two or more packets are simultaneously transmitted. Hence, the contention must be resolved when applying a protocol in the wireless data network. RFID anti-collision of ISO/IEC 18000-6 [1] adopts the concept of tree [2] expansion in order to reduce the delay time and enhance the throughput. In this paper, we want to point out the important of ths probability factors. Analyses results indicate that the variety of the mean delay time performance is insignificant related to its probability factors. However, the impact on the throughput performance due to these probability factors is significant.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"34 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}