{"title":"Secure spatial trajectory prediction based on traffic flows","authors":"Wen-Chen Hu, H. Yang, N. Kaabouch","doi":"10.1109/EIT.2016.7535328","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535328","url":null,"abstract":"The ubiquity of smartphones has many developers join the mobile app development. Location-based services (LBSs), one of the mobile applications, have attracted a great attention recently. This research proposes a location-based service, spatial trajectory prediction, which is to predict the forthcoming locations of the human travel routes. It could be used in a variety of purposes such as travel recommendations and traffic control and planning. The proposed method is based on the previous traffic flows, a weighted graph. It predicts the spatial trajectory by finding a path with a maximal weight and within a length. A modified algorithm of the longest path is used to find the maximum-weight path. If the length of the path is over the limit specified by the user, the next maximum-weight path is used and the length is checked again. The process is repeated if necessary. Experimental results show the proposed method works, but further tests are needed to validate its effectiveness.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129429738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Haider, Minhal Alhashim, K. Tavakolian, R. Fazel-Rezai
{"title":"Computer-assisted image processing technique for tracking wound progress","authors":"Ali Haider, Minhal Alhashim, K. Tavakolian, R. Fazel-Rezai","doi":"10.1109/EIT.2016.7535333","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535333","url":null,"abstract":"The purpose of this study was to develop an algorithm to support the decisions of expert physicians in the management of wound healing. The goal was to work towards the development of an image processing algorithm for quantifying the progress of healing of skin wounds. For this algorithm development, multiple wound images were obtained from patients in clinical settings to monitor the status of wound healing after excision of skin lesions. Dermatologists applied Vaseline and novel experimental natural ointment (NENO) at two different spots on the same subject. The developed algorithm was evaluated for its compatibility to monitor the healing as well as a potential tool to compare the efficacy of Vaseline and NENO to heal the wound. Skin color was used as a feature to measure wound progress. Based on the temporal change of the skin color, decisions were made on whether the wound is healing or expanding. The proposed processing technique was able to detect the color change within the range of 10% to 90%.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124578400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alphablend - a self-adjusting algorithm for reducing artifacts in JPEG compressed images","authors":"R. Marsh, Riddhiman Goswami","doi":"10.1109/EIT.2016.7535259","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535259","url":null,"abstract":"In this paper we present a computationally efficient algorithm for reducing the blocky and Gibbs oscillation artifacts commonly present in JPEG compressed images. The algorithm alpha-blends a smoothed version of the image with the original image; however, the blending is controlled by a limit factor that considers the amount of compression present and any local edge information derived from the application of a Prewitt filter. In addition, the actual value of the blending coefficient (α) is derived from the local Mean Structural Similarity Index Measure (MSSIM) which is also adjusted by a factor that also considers the amount of compression present. We also present our results as well as the results for a variety of other papers whose authors used other post compression, filtering methods.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reputation-based service migration for moving target defense","authors":"Yanjun Zuo","doi":"10.1109/EIT.2016.7535247","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535247","url":null,"abstract":"As a proactive security approach, service migration can be used as a mechanism for moving target defense. By strategically moving services to different platforms, the system changes the service locations and the underlying platform configurations so that potential attackers cannot identify and target those services. This form of moving target increases the barriers for the attackers and make the system more unpredictable for outsiders. In this paper, we present a reputation-based service migration scheme to select the destination platform for each service to migrate periodically or on-demand. In a system where the platforms have different levels of security, quality, reliability, and communication capability to support user services, it is pertinent to choose the appropriate platform for each service as the new hosting infrastructure. The ability and quality of each platform to support user services is reflected on its reputation as evaluated by a set of agents in the system. The reputation of a platform is assessed based on a set of categorical factors. For each factor, a category reputation is determined from the perspective of that factor. We use a transferable belief-based model to combine multiple agents' opinions towards a platform's category reputation. Those category reputations are then aggregated to the overall reputation of the platform. Given the reputations of different platforms in the system, a service is to migrate to a platform with a high level of reputation.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware and multicore architecture: Challenges and potential enhancements from software engineering perspective","authors":"Saleh M. Alnaeli, A. D. A. Taha, Sam B. Binder","doi":"10.1109/EIT.2016.7535325","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535325","url":null,"abstract":"An empirical study that examines challenges middleware software systems have to take full advantages of multicore technology is presented. The study is conducted on 9 open source middleware systems containing over 3.39 million lines of code. Each system is analyzed and the inhibitors to parallelization are detected and presented. Additionally, some challenges in analyzing, adapting, and re-engineering middleware systems to better utilize modern multi-core architectures are determined including function side effects. Function side effects categorized based on their types and the complexity they pose in conducting inter-procedural static analysis. The data shows that the most prevalent inhibitor by far is functions called within for-loops that have side effects. Moreover, the study shows that parameters by reference and global variables modification are the most prevalent side effects that poses the greatest challenges in re-engineering middleware systems to improve their parallelizability to better utilize multi-core architectures. That is, conducting accurate program analysis with existing software engineering tools becomes exigent and impractical with those side effects. The study suggests some software engineering techniques (e.g., refactoring) that have the potential to improve the parallelizability of middleware systems.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129434333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Lyubimov, S. P. Gladyshev, D. Istselemov, N. Belyaev
{"title":"Universal software-hardware measurement complex for testing wide range of synchronous machines","authors":"E. Lyubimov, S. P. Gladyshev, D. Istselemov, N. Belyaev","doi":"10.1109/EIT.2016.7535249","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535249","url":null,"abstract":"Synchronous electrical machines need to be tested after fabrication and also during maintenance. For this purpose can be useful suggested new measurement complex. The software structure of the considered measurement complex was designed in compliance with: Russian, IEC, and IEEE standards for testing synchronous machines. The software of measurement complex was designed on base “LabVIEW®” development metods and is orientated to work with National Instruments hardware. The measurement system software was tested using a designed peculiar laboratory test stand, which is based on the 700W G273 alternator. It also was tested by using (HIL) model of the 800kW STD-800 synchronous motor. The testing results show operability and high accuracy of the measurement system.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Baccalaureate programs in computer forensics","authors":"Jigang Liu","doi":"10.1109/EIT.2016.7535309","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535309","url":null,"abstract":"Since the first baccalaureate program in computer forensics was introduced in 2004, this emerging multi-disciplinary field has been gradually accepted by the academia as the interest and demand of the knowledge and technology in computer security and forensics has been constantly grown. In this paper, all the baccalaureate programs in computer forensics currently offered in the U.S., based on the information available on the internet, are studied. In addition to the different types of the institutions and their geographical locations, the structures of the curricula in terms of the course offerings from various disciplines, levels and sequences of the courses, and other requirements, such as practical exercises and professional internships, are primarily analyzed. Moreover, the other resources for computer forensic education, e.g. national education centers for computer forensics and the recommended professional education standards, are discussed. It is hoped that the discussion and analysis presented in this work will be beneficial to those who are currently running or planning to start a baccalaureate program in computer forensics or in any other emerging fields.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116376014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contusion (bruise) segmentation & diagnosis: A graphical user interphase approach","authors":"Benjamin D. Johnson, R. Fazel-Rezai","doi":"10.1109/EIT.2016.7535332","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535332","url":null,"abstract":"The medical field has been turning to technology to provide new treatments, techniques, and protocol. Over the past decade the industry has become heavily reliant on technology to vastly improve medical care. With the help of modern image processing techniques diagnosis of many illnesses have been improved as well as preparation for surgical procedures such as tumor removal have become more effective and have led to better outcomes. Although there has been a significant impact in these areas there are still many treatment areas that could benefit with the help of image processing techniques. One such area is contusion (bruise) diagnosis and treatment. This paper presents two graphical user interface technologies that could help medical professionals more effectively diagnosis and treat patient's bruising.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116931554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alex Myers, Md Anam Mahmud, A. Abdelgawad, K. Yelamarthi
{"title":"Toward integrating Structural Health Monitoring with Internet of Things (IoT)","authors":"Alex Myers, Md Anam Mahmud, A. Abdelgawad, K. Yelamarthi","doi":"10.1109/EIT.2016.7535280","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535280","url":null,"abstract":"Most of the existing Structural Health Monitoring (SHM) systems are vulnerable to environmental and operational damages. Yet, majority of these systems cannot detect the size and location of the damage. Guided wave techniques are widely used to detect damage in structures due to its sensitivity to different changes in the structure. Finding a mathematical model for such system will help to implement a reliable and efficient low-cost SHM system. Moreover, it can lead to integrate the SHM with the Internet of Things (IoT) for rapid response, off-loading computational power, store data, and and remotely monitoring. In this paper, a mathematical model is proposed to detect the size and location of damages in physical structures using piezoelectric sensor. The proposed model combines both pitch-catch and pulse-echo techniques, and has been verified through out simulations using ABAQUS/Explicit finite element software.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117054887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A prototype graphics framework for interactive instruction of computer hardware concepts","authors":"M. Chandramouli, Siva-Teja Chittamuru","doi":"10.1109/EIT.2016.7535252","DOIUrl":"https://doi.org/10.1109/EIT.2016.7535252","url":null,"abstract":"This study explains the design and implementation of an interactive graphics framework for `fun-based' interactive instruction of computer hardware and architecture for engineering and technology (ET) students. The system helps students to visualize internal peripherals of a computer and assemble them onto a motherboard to examine results immediately making the course interesting, fun and easily understandable which a conventional text document may not do so. Computer architecture is a complex course which is difficult for both instructors to teach and students to understand effectively using a conventional textbook. Many studies have been conducted regarding the abilities of engineering students on computer architecture. Learning about the hardware components and practicing the assembly process greatly enhances the skill sets of students and allows them to gain sufficient mastery over the underlying concepts. To this end, to facilitate interactive and fun-filled learning, this research employs a learner-centric, user-friendly graphics framework to teach hardware and computer architecture concepts.","PeriodicalId":333489,"journal":{"name":"2016 IEEE International Conference on Electro Information Technology (EIT)","volume":"31 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}