Yu-Cheng Fan, Hung-Shih Lin, H. Tsao, Ching-Chih Kuo
{"title":"Intelligent intra-field interpolation for motion compensated deinterlacing","authors":"Yu-Cheng Fan, Hung-Shih Lin, H. Tsao, Ching-Chih Kuo","doi":"10.1109/ITRE.2005.1503100","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503100","url":null,"abstract":"This paper proposes a novel intelligent intra-field interpolation for motion compensated deinterlacing. This method combines the advantage of cubic curve fitting interpolation and fuzzy edge interpolation to overcome resolution degradation caused by incorrect motion vector. The intelligent intra-field interpolation scheme alleviates resolution degradation in areas where object motion cannot be well tracked by motion estimation and produces deinterlaced pictures with better visual quality, less flicker, and imperceptible artifacts. Experimental results show that the developed method can indeed generate high quality intra-interpolation picture for motion areas.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128271618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting decision making for spatiotemporal phenomena","authors":"T. O. Ahmed, M. Miquel, R. Laurini","doi":"10.1109/ITRE.2005.1503161","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503161","url":null,"abstract":"Multidimensional structures are used in OLAP technology to aggregate and format data with the goal of optimizing responses to users' queries. These structures have been widely used in applications that deal with discrete dimensions. In this paper we present a brief survey of the different multidimensional models and propose a model that supports both discrete and continuous dimensions with more concentration on the latter. We first define continuous fields. Then we present our model, which is based on discrete and continuous basic cubes. By applying spatial and temporal interpolation functions to a sample of data of the discrete basic cube a continuous basic cube is constructed. Hypercubes are built by applying aggregation functions to basic cubes. Two classes of operations associated with continuous fields are also defined.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125415403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A streaming management CSCW consultation system for telemedicine","authors":"Chien-Cheng Lee, Cheng-Yuan Shih","doi":"10.1109/ITRE.2005.1503129","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503129","url":null,"abstract":"The teleconsultation is one kind of applications in the telemedicine system. It provides an environment to the physicians who at different places for discussing and diagnosing the disease cases. For implementing these functions, the computer-supported cooperative work (CSCW) is adopted in the teleconsultation system. The typical CSCW functions include video and voice conferencing, interactive information exchange, shared workspace, and drawing tools, etc. In order to utilize the resource of network efficiently during the teleconsultation, the data in CSCW should be transmitted by different strategies according to their characteristics. In this paper, we propose a streaming management mechanism for CSCW consultation system used in telemedicine. The mechanism designed by classifying the CSCW data and assigning them to the proper priorities according to their characteristics. Therefore, the mechanism can improve the system performance and provide a better transmission quality.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123171468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active learning through Web and PDA","authors":"H. Chiang, Feng-Lan Kuo","doi":"10.1109/ITRE.2005.1503172","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503172","url":null,"abstract":"Learner-centered Web-based environment has been reported to be effective because it promotes active learning and offers a setting where students can conduct learning at anytime using wired computers. This study presents a novel learning approach, integrating PDA into a Web-based reading environment, based on the theory of Second Language Acquisition (SLA), for enhancing EFL vocational high school students' reading comprehension. The design of the courseware Reading2U, accessible through Web or PDA, is based on Chapelle's criteria for CALL task appropriateness and evaluation. It has been evaluated by a group of seventeen English teachers, who showed positive attitude toward this integrated environment.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132003143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"De-centralized location management: minimizing privacy concerns for location based services","authors":"M. Zündt, G. Deo, M. Naumann, M. Ludwig","doi":"10.1109/ITRE.2005.1503057","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503057","url":null,"abstract":"For location-based services (LBS), security of location information (i.e. who has control) and user location privacy is a major concern. In this paper we investigate the risks associated with user's privacy- and location information-control, showing a peer-to-peer-based system framework as a possible approach. The focus is on peer-to-peer LBS relying on the IP multimedia subsystem (IMS), a future extension to GSM/UMTS core networks. A prototype peer-to-peer location-based instant messaging service has been implemented, demonstrating that such services can coexist with current cellular LBS system solutions. In addition to improving subscriber confidence about privacy and security issues in LBS, the proposed system has the potential of making location-service solutions more open and simple, thus leading to greater user acceptance hence prospective LBS market growth in the near future.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Directed geographical traceback","authors":"Zhiqiang Gao, N. Ansari","doi":"10.1109/ITRE.2005.1503108","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503108","url":null,"abstract":"In this paper, a new mechanism for IP traceback based on the geographic information rather than the traditional IP address information is proposed. The proposed solution possesses several desirable features such as fast convergence (the attack source can be identified with a single packet), lightweight (imposing little computational overhead on routers), and improved robustness. In addition, a service provider can implement this scheme without revealing its internal network topology. Furthermore, the new marking scheme allows the victim to defend against DDoS attacks without counting on its ISP, which is an important improvement.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134537596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The anatomy of a course in cluster and grid computing","authors":"Chao-Tung Yang, Kuan-Ching Li","doi":"10.1109/ITRE.2005.1503152","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503152","url":null,"abstract":"Cluster and grid computing is a relatively new interdisciplinary field, where computer science, engineering and computational biology are its core supporting disciplines. The rise of cluster and grid computing discipline brings to computer science faculty members new opportunities and challenges, both in education and in research. In this paper, we explore issues in teaching cluster and grid computing, the developing of curricula, and thoughts to foster student to work on research projects in cluster and grid computing.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin Zhi, Chung-Horng Lung, Xia Xu, A. Srinivasan, Yi Lei
{"title":"Securing RSVP and RSVP-TE signaling protocols and their performance study","authors":"Jin Zhi, Chung-Horng Lung, Xia Xu, A. Srinivasan, Yi Lei","doi":"10.1109/ITRE.2005.1503074","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503074","url":null,"abstract":"RSVP and RSVP-TE are signaling protocols used to set up paths and/or support quality of service (QoS) requirements in IP and MPLS-based networks, respectively. This paper analyzes an authentication mechanism for securing the RSVP and RSVP-TE control messages, and studies their performance. This design and implementation of the authentication mechanism, which is based on RFC2747, using four commonly adopted hash algorithms - MD5, RIPEMD160, SHA-1, and SHA-256, not only improves security, but also provides useful information from the performance aspect. The time for authenticating the signaling messages depends on the algorithm used, and increases slightly in the order of MD5, SHA-1, RIPEMD160 and SHA-256. The performance of the RSVP-TE with multiple sessions was measured.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127800505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed automatic camera control system tracking markers for distance education","authors":"Noritaka Osawa, K. Asai","doi":"10.1109/ITRE.2005.1503146","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503146","url":null,"abstract":"We have developed an automatic camera control system for distance education. The system can calculate the 3D position and orientation of a marker by using the ARToolkit library, which is a software library for building augmented reality applications. It can track a target indicated by the visual marker. According to the 3D position and orientation of the marker that is recognized, the system controls a pan/tilt/zoom video camera to track a target indicated by the 3D position and orientation of the recognized marker. Our system has functions such as marker prioritization, 3D marker offsets, and automatic position reset. These functions can alleviate the workload of lecturers who conduct lectures independently. Our system is based on distributed processing through IP multicasting, and flexibly supports various hardware configurations.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software reliability prediction and analysis during operational use","authors":"Chin-Yu Huang, Chu-Ti Lin, C. Sue","doi":"10.1109/ITRE.2005.1503132","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503132","url":null,"abstract":"In reality, the fault detection (or correction) phenomenon and software reliability estimation in the operational phase are different from that in the testing phase. The fault removal continues at a slower rate during the operational phase. In this paper, we will investigate some techniques for software reliability prediction and measurement in the operational phase. We first review how some software reliability growth models (SRGMs) based on non-homogeneous Poisson processes (NHPPs) can be readily derived based on a unified theory for NHPP models. Under this general framework, we can not only verify some conventional SRGMs but also derive some new SRGMs that can be used for software reliability measurement in the operational phase. That is, based on the unified theory, we can incorporate the concept of multiple changepoints into software reliability modeling. We can formularize and simulate the fault detection process in the operational phase. Some numerical illustrations based on real software failure data are also presented. The experimental results show that the proposed models can easily reflect the possible changes of fault detection process and offer quantitative analysis on software failure behavior in field operation.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}