{"title":"Image classification using Partitioned-Feature based Classifier model","authors":"Dong-Chul Park","doi":"10.1109/AICCSA.2010.5586971","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586971","url":null,"abstract":"Classification of image data by using Partitioned-Feature based Classifier (PFC)is proposed in this paper. The PFC does not use concatenated feature vectors extracted from the original data at once to classify each datum, but uses extracted feature vectors to classify data separately. In the training stage, the contribution rate calculated from each feature vector group is drawn throughout the accuracy of each feature vector group and then, in the testing stage, the final classification result is obtained by applying weights corresponding to the contribution rate of each feature vector group. Experiments and results on Caltech image data set demonstrate that conventional clustering algorithms can improve their classification accuracy when the PFC model is used with them.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133308276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nejla Essaddi, Mohamed Hamdi, S. Habib, N. Boudriga
{"title":"Optimizing area coverage in Wireless Sensor Networks","authors":"Nejla Essaddi, Mohamed Hamdi, S. Habib, N. Boudriga","doi":"10.1109/AICCSA.2010.5587010","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587010","url":null,"abstract":"Wireless Sensor Networks (WSNs) have inspired tremendous research interest in since the mid-1990s. Advancement in wireless communication and miniature electromechanical systems (MEMSs) have enabled the development of low-cost, low power, multi-functional, tiny sensor nodes that can sense the environment, perform data processing, and communicate with each other untethered over short distances. Most of the applications deployed over WSNs require strong coverage requirements, especially those related to the detection and tracking of distributed events. Moreover, these events are forwarded to the analysis center(s) through a set of sink nodes that locally gather data emanating from the elementary sensors. This paper proposes a coverage control scheme that adapts to the situation where multiple sink nodes are deployed within the monitored area. On the opposite to traditional coverage approaches that aim at guaranteeing a uniform density distribution, we place the sensor nodes in a manner that increases the coverage degree according to their proximity to a sink node. To reduce the complexity of the optimization process, we consider a discrete search space by structuring the monitored into a uniform grid. An evolutionary algorithm is then used to choose whether to activate or not sensor nodes within every cell of the grid. We conducted a set of simulations in order to evaluate the performance of the proposed strategy, mainly in ensuring multi-target tracking.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical performance evaluation of a fast authentication scheme in wireless access networks","authors":"J. Hassan, B. Landfeldt","doi":"10.1109/AICCSA.2010.5587042","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587042","url":null,"abstract":"Wireless access using contributed access points is fast becoming a reality. Technological means are now available for realizing this “anywhere anytime” low-cost wireless access whereby un-utilized wireless resources can be harnessed to form a collaborative network for public access. The success of such access facilities depend largely on the provisioning of fast authentication among the access points. This is crucial for supporting real-time applications such as Voice Over IP (VoIP). In our earlier work, we had developed an inter-domain fast authentication scheme based on the concept of “trust-clouds”. A trust-cloud is formed among neighbouring access points based on a relationship among the owners of the access points. Fast authentication among these inter-domain sites is achieved through cooperation among the trust-cloud members. In previous work, we theoretically formulated the concept of trust-clouds. In this paper we report on the implementation and experimental results of the “trust-clouds” fast authentication concept on legacy hardware. The experimental results verify that the trust-cloud framework can yield significant delay gains for the authentication process when handing off between administrative domains. It is also shown that no special computing platform is needed to achieve these benefits, indeed our testbed was implemented on low end hardware.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134063775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zainab Al Rahamneh, Mohammad Reyalat, A. Sheta, S. Aljahdali
{"title":"Forecasting stock exchange using soft computing techniques","authors":"Zainab Al Rahamneh, Mohammad Reyalat, A. Sheta, S. Aljahdali","doi":"10.1109/AICCSA.2010.5587001","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587001","url":null,"abstract":"The financial industry is becoming more and more dependent on advanced computer technologies in order to maintain competitiveness in a global economy. Fuzzy logic represents an exciting technology with a wide scope for potential applications. There is a growing interest both in the field of fuzzy logic computing and in the financial world in explaining the use of fuzzy logic to forecast the future changes in prices of stocks, exchange rates, commodities, and other financial time series. Fuzzy algorithms are intensively used for the identification of dynamic models, combining both numerical and heuristic knowledge. Fuzzy logic provides a remarkably simple way to draw definite conclusions from vague, ambiguous or imprecise information. In this paper, we are investigating the ability of Fuzzy logic (FL) to tackle the financial time series forecasting problems. Experimental results on set of applications indicated that fuzzy logic can effectively solve these types of problems. In order to examine the effectiveness of fuzzy logic applied to forecasting, the comparison with Artificial Neural Networks (ANNs) is performed.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122839663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Debnath, C. Salgado, M. Peralta, D. Riesco, G. Montejano
{"title":"Optimization of the Business Process metrics definition according to the BPDM standard and its formal definition in OCL","authors":"N. Debnath, C. Salgado, M. Peralta, D. Riesco, G. Montejano","doi":"10.1109/AICCSA.2010.5586986","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586986","url":null,"abstract":"Business Process Management combines a vision focused on processes and a functionalities integration view to enhance an organization's effectiveness. It provides ways to implement the processes and provides functionalities to control and modify their workflows. A very useful tool to achieve this control is a set of process models, as they supply a description of the process structure and complexity. Considering the importance of Business Processes models, the use of metrics may be the key to obtain high quality models that are useful as support to improve the processes maintenance, updating and adaptation. Based on metamodels of the BPDM standard, a proposal of metrics for Business Processes models is submitted; these metrics are specified in OCL and their application results are outlined in a study case.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129676308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel Geocast technique with hole detection in underwater sensor networks","authors":"S. K. Dhurandher, M. Obaidat, Megha Gupta","doi":"10.1109/AICCSA.2010.5587038","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587038","url":null,"abstract":"Most of the work on geocasting has been done for mobile ad-hoc networks and vehicular ad-hoc networks. This paper presents a novel Geocast technique with the hole detection in the geocast region for underwater environment. The proposed model named as Routing and Multicast Tree based Geocasting (RMTG) has been designed for underwater sensor networks. Here we propose a theoretical model for underwater geocasting RMTG that uses greedy forwarding and previous hop handshaking to route the packets towards the geocast region. This technique further disseminates the data within the geocast region by creating a multicast shortest path tree. The technique also proposes a method of hole detection inside the geocast region and a virtual area based routing around the boundaries of the geocast region to reach the geocast region from opposite side. This model provides an efficient geocast technique in terms of node mobility handling, lesser memory utilization, lesser calculations and a better end to end latency. In addition to this the proposed model does not use flooding inside the geocast region that is used in most of the geocasting techniques and also for guaranteed data delivery inside the geocast region, the proposed model does not use the planarization graph concepts.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in e-Infrastructures for computational sciences and engineering","authors":"W. Gentzsch","doi":"10.1109/AICCSA.2010.5587048","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587048","url":null,"abstract":"Over the last 50 years, computational sciences and engineering have advanced the development of new and ever faster and better computers, algorithms, and software tools, and vice versa, computers have advanced sciences. But the better the technologies the more demanding our computational science applications. This progress is everywhere, at the level of technologies and computer architectures, at the middleware level, at the algorithm and application level, and even at the level of computing paradigms, where we evolved from mainframes, to vector and parallel computers, to grids and clouds, recently. We successfully optimized our algorithms and mapped them to the underlying architecture, e.g. with overlapping communication with computation, better load balancing through domain decomposition into parallel processes, or using library routines optimized for the specific architecture and processors. In our presentation, we will concentrate on the use of grid and cloud technologies for HPC, focusing on the European EU-funded DEISA Distributed European Infrastructure for Supercomputing Applications project, analyzing different HPC loads and their suitability for grids and for clouds, and taking a closer look at lessons learned and recommendations on how to build sustainable e-Infrastructures for computational sciences and engineering in the future.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of WiMAX QoS in a developing country's environment","authors":"E. Sedoyeka, Z. Hunaiti, Daniel Tairo","doi":"10.1109/AICCSA.2010.5586935","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586935","url":null,"abstract":"This paper presents findings from a study which investigated WiMAX Quality of Service (QoS) as experienced by the end users. The research was conducted in Tanzania, a developing country in East Africa, testing a commercially available WiMAX broadband service. The researchers conducted technical evaluations by testing throughput, packet losses, delay and link stability. They also investigated non-technical issues like helpline facilities and overall users' experienced QoS. Results show that WiMAX is capable of tackling technical challenges faced by developing areas by delivering low cost broadband connectivity with good QoS. This paper is suitable for academicians looking into WiMAX technology and its capabilities especially as a fixed wireless broadband solution. It is also suitable for those who are looking for solutions for connectivity challenges facing developing and remote areas. The authors have presented primary data in this paper with discussions that give others a room to draw their conclusions.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122219707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracking human face features in thermal images for respiration monitoring","authors":"F. Al-Khalidi, R. Saatchi, D. Burke, H. Elphick","doi":"10.1109/AICCSA.2010.5586994","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586994","url":null,"abstract":"A method has been developed to track a region related to respiration process in thermal images. The respiration region of interest (ROI) consisted of the skin area around the tip of the nose. The method was then used as part of a non-contact respiration rate monitoring that determined the skin temperature changes caused by respiration. The ROI was located by the first determining the relevant salient features of the human face physiology. These features were the warmest and coldest facial points. The tracking method was tested on thermal video images containing no head movements, small random and regular head movements. The method proved valuable for tracking the ROI in all these head movement types. It was also possible to use this tracking method to monitor respiration rate involving a number of head movement types. Currently, more investigations are underway to improve the tracking method so that it can track the ROI in cases larger head movements.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Donald elliptic projection for VH coordinates and calculation of air mileage","authors":"Pankaj D. Patil, Gongzhu Hu, S. Murthy","doi":"10.1109/AICCSA.2010.5586989","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586989","url":null,"abstract":"Geographic coordinate system (represented in latitude and longitude) considers earth as a perfect sphere. But in fact its shape is slightly elliptical. This assumption puts limitations on the accuracy of distance calculated between any two points on earth. While this small error is neglected in most distance calculator algorithms, applications demanding perfect distance between any two points need alternative way to compute that. One approach to solve this problem is Jay K. Donald's elliptic projection. In this paper we briefly describe the back-ground of elliptical projection and presents an implementation of the algorithm that yields geographical coordinates from given vertical-horizontal pair. The vertical and horizontal coordinates can be used to calculate near perfect air mileage between two points. Experiments on some sample real addresses show that the calculated aerial distances are more accurate than the ones calculated by methods that do not consider earth's oblate spheroid shape.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"1 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}