Mojtaba Naghdi-Nasab, G. Mirjalily, S. Almodarresi
{"title":"Some Notes on Accuracy Constraints of Pixel Based Skin Color Detection","authors":"Mojtaba Naghdi-Nasab, G. Mirjalily, S. Almodarresi","doi":"10.1109/ICFCC.2009.107","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.107","url":null,"abstract":"In recent years color as a good cue that can be used in early stages of objects detection in digital images absorbed attention of the researchers. As a special problem, skin color detection gained high application in face detection, image content filtering and content aware video compression. In this paper, we address the problem of pixel-based skin color detection. At first, as a two class classification problem, we determine the upper bound of accessible accuracy for pixel-based skin color detection.Then the effect of the used color space on the classifier performance is examined theoretically. It is shown that which classifier can reach the upper bound of detection accuracy and then by an example we show why most parametric skin color modeling methods have validity problem.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-document Text Summarization: SimWithFirst Based Features and Sentence Co-selection Based Evaluation","authors":"Mohsin Ali, Monotosh Kumar Ghosh, A. Al-Mamun","doi":"10.1109/ICFCC.2009.42","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.42","url":null,"abstract":"Document summarization is an emerging technique for understanding the main purpose of any kind of documents. To visualize a large text document within a short duration and small visible area like PDA screen, summarization provides a greater flexibility and convenience. In this paper we study various text summarization techniques e.g. RANDOM, LEAD and MEAD. Then, we propose two techniques for both single and multi document text summarization. One is adding a new feature SimWithFirst (Similarity With First Sentence) with MEAD (Combination of Centroid, Position, and Length Features) called CPSL and another is the combination of LEAD and CPSL called LESM. Finally we simulate and compare the results of new techniques with conventional ones called MEAD with respect to some evaluation techniques. Simulation results demonstrate that CPSL shows better performance for short summarization than MEAD and for remaining cases it is almost similar to MEAD. Furthermore, simulation results demonstrate that LESM also shows better performance for short summarization than MEAD but for remaining cases it does not show better performance than MEAD.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Cover Angle-Based Broadcasting Algorithm for MANETs","authors":"I. Kahn, E. Peng, H. Qian","doi":"10.1109/ICFCC.2009.138","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.138","url":null,"abstract":"In this study, an improved cover angle-based broadcasting algorithms is proposed for Mobile Ad hoc Networks (MANETs) to minimize redundancy, contention and collision known as broadcast storm problem in the literature. The propose technique uses only cover angle concept for rebroadcast decision without using neighbors knowledge information’s or complex calculations. Through the analyses and extensive simulations, the results reveal the improve cover angle-based broadcasting algorithm exhibits superior performance in term of both delivery ratio and number of retransmission. The propose technique is fully distributed, simple and can be easily implemented in MANETs.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalability and Tracking Issues In Wireless Distributed Sensor Network","authors":"B. Alhadidi, Mahmoud Abu-Arr'a, Nadine Abu Rumman","doi":"10.1109/ICFCC.2009.110","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.110","url":null,"abstract":"Research work in the field of Wireless Sensor Networks(WSNs) is represented by a broad spectrum of applications, ranging from environmental monitoring to motion or tracking monitoring. Wireless sensor networks solved many distributed system problems related to scalability and real-time performance, which offer obvious advantages for systems with a large number of components. This system provides a good performance for any time and dose without degrading the degree of performance with the increased system size. In this paper, we present some of detection and tracking protocols defined in sensors over distributed tracking networks. The paper concludes by presenting recent research results in tracking methods, collaborative signal and information processing, tracking multiple moving objects in sensor fields,target classification and location.Keywords: WSNs; Collaborative Signal Processing; Target Localization; UW-API.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Knowledge and Rule Induction Methods for Enhancing Clinical Diagnosis: Success Stories","authors":"F. Shadabi, D. Sharma","doi":"10.1109/ICFCC.2009.140","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.140","url":null,"abstract":"The economic and social benefits of accurately predicting medical outcomes are very high. As a result, the problem of improving predictive models has attracted many researchers. Over the past few years there has been great interest in the use of advance knowledge discover techniques to mimic human functions. Research shows that such techniques can be applied in healthcare environments where an automated process must improve its performance based on previous data, adapt to changes and deal with uncertain and incomplete medical knowledge. The underlying purpose of this paper is to illustrate the utility of combining multi agent approach and hybrid machine learning and data mining techniques for producing predictive classifiers in clinical settings.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"59 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130744468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-agent System Approach for Medical Image Segmentation","authors":"M. Chitsaz, Woo Chaw Seng","doi":"10.1109/ICFCC.2009.25","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.25","url":null,"abstract":"Image segmentation still requires improvements although there have been research works since the last few decades. This is coming due to some issues. Firstly, most image segmentation solutions are problem-based. Secondly, medical image segmentation methods generally have restrictions because medical images have very similar gray level and texture among the interested objects. The goal of this work is to design a framework to extract simultaneously several objects of interest from Computed Tomography (CT) images by using some priori-knowledge. Our method used properties of agent in a multi-agent environment. The input image is divided into several sub-images, and each agent works on a sub-image and tries to mark each pixel as a specific region by means of given priori-knowledge. During this time the local agent marks each cell of sub-image individually. Moderator agent checks the outcome of all agents’ work to produce final segmented image. The experimental results for cranial CT images demonstrated segmentation accuracy around 90%.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rostami, A. Mazandarani, Seyed Mohammad Hoseininasab, Narges Zeighami, A. A. Khodaparast
{"title":"Load-Efficient Maximum-Throughput Peer-to-Peer Multicast in the Internet","authors":"M. Rostami, A. Mazandarani, Seyed Mohammad Hoseininasab, Narges Zeighami, A. A. Khodaparast","doi":"10.1109/ICFCC.2009.92","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.92","url":null,"abstract":"Data distribution in the existing peer-to-peer multicast protocols is performed from source node by delivering data to multicast nodes over a tree, multi-tree, or mesh path structure covering all the multicast nodes. The existing algorithms try to maximize throughput, minimize latency, or minimize load on network but not to achieve all the three goals at the same time. In this paper, we propose a network optimization problem called LEMT to minimize the load imposed on the network while achieving the maximum multicast throughput. We divide LEMT into a number of Partial-LEMT problems and propose a polynomial-time algorithm called PLDD that finds an approximated solution for LEMT. PLDD is able to adapt to heterogeneous multicast groups and needs a node (such as the source) aware of global topology to schedule block transfers between the nodes. Comparison to the existing mesh-based algorithms shows improvement on multicast throughput, load, and latency.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"9 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Code Structure for Enhanced Double Weight (EDW) Code for Spectral Amplitude Coding OCDMA System","authors":"A. Zahid, F. Hasoon, S. Shaari","doi":"10.1109/ICFCC.2009.26","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.26","url":null,"abstract":"This paper presents a new structure for spectral amplitude coding optical code division multiple access systems based on the enhanced double weight (EDW) code. The new structure is based on mathematical model and step sequences. The reconstruction is carried for higher weighted code to build the code matrix by rules which will make high level weight inspection automatic sequenced and mathematically formed. Some simulation results are shown with comparison on performance.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115543176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Peer-to-Peer Access Control Management Based on Web of Trust","authors":"Dehua Chen, Jiajin Le, Junyin Wei","doi":"10.1109/ICFCC.2009.77","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.77","url":null,"abstract":"Trust is considered to be a powerful approach for managing access control in P2P (Peer-to-Peer)network. In this paper, we present a P2P access control management architecture based on web of trust, a web of mutual trust relationships among peers.In our architecture, whether a client peer is granted access right or not depends on its global trust value which is computed by aggregating the recommendation from friend peers. Our proposed approach focus on the collaboration among peers and its ideas are practicable.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Evaluation of Measuring Parameters for Data Warehouse","authors":"I. Khan, V. Athavale, Shiv Kumar, Neetesh Gupta","doi":"10.1109/ICFCC.2009.39","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.39","url":null,"abstract":"Data Mining and warehousing is very challenging and interesting field in Computer Science and Information Technology. This field is still in its infant stage and thus a limited documentation on Data Warehousing processes available. As we know that now a days the definition of Educational Institutions are going to be changed and they are now being taken into consideration as a business oriented Organizations. The sizes of such Institutions are growing and to keep all the academic data DBMS will not suffice. The only thing which can be deal with large, Huge Academic Data is Data Warehouse. To design and Measurement of quality of a Data Warehouse for Educational Institute is very much needed and we must need an understanding about this Technology","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}