2014 International Conference on Computer, Communications, and Control Technology (I4CT)最新文献

筛选
英文 中文
Authentication system for medical images using Hilbert numbering 使用希尔伯特编号的医学图像认证系统
Syifak Izhar Hisham, Liew Siau-Chuin, J. Zain, N. Johari, N. W. Arshad, Gran Badshah
{"title":"Authentication system for medical images using Hilbert numbering","authors":"Syifak Izhar Hisham, Liew Siau-Chuin, J. Zain, N. Johari, N. W. Arshad, Gran Badshah","doi":"10.1109/I4CT.2014.6914174","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914174","url":null,"abstract":"Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of jurisdiction and personal identification. Nowadays, Hospital Information System (HIS) is used widely at hospitals and clinical departments and it handles thousands of crucial electronic data in medical. We have introduced a fragile watermarking method using spiral manner numbering which showed a good numbering system and excellent embedding, but due to the technique, it only embedded in square shape. We enhanced the scheme to the Hilbert numbering scheme, which is more compatible with medical image modalities, which is not only specific to square shape of image but applicable to all kinds of image.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reversible watermarking based on sorting prediction scheme 基于排序预测方案的可逆水印
Khalid Edris, M. Fakhreldin, Jasni Mohamed Zain, T. Kadir, Khalid Adam
{"title":"Reversible watermarking based on sorting prediction scheme","authors":"Khalid Edris, M. Fakhreldin, Jasni Mohamed Zain, T. Kadir, Khalid Adam","doi":"10.1109/I4CT.2014.6914227","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914227","url":null,"abstract":"Reversible watermarking has drawn a lot of interest in recent years. To be reversible mean the original digital carrier can be completely restored. Sachnev et al proposed reversible watermarking algorithm by combining prediction technology, histogram shifting technology and sorting technology, which has good performance, however, their method is against the characteristics of the human visual system. In this paper, we propose a reversible watermarking algorithm to improve Sachnev et al algorithm by using new sorting method. The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method. The results indicate that the proposed scheme can embed data with less distortion.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124283531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data warehouse for human resource by Ministry of Higher Education and Scientific Research 高等教育和科研部人力资源数据仓库
M. A. Mohammed, Mohammed Morad Anad
{"title":"Data warehouse for human resource by Ministry of Higher Education and Scientific Research","authors":"M. A. Mohammed, Mohammed Morad Anad","doi":"10.1109/I4CT.2014.6914170","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914170","url":null,"abstract":"The human resource has used the information technology long time ago because the companies are looking forward to hire the useful employees. Iraqi public and private organizations have problem to choose the right staff in the right position within the right time. The issues of choosing right person led to first administrative corruption, second waste the effort, third discarded the public money, fourth made the government less effective and fifth less efficiency government. Recently, Data warehouse is used to provide reports for public and private organizations' human resources. The reports and analysis that data warehouse provide can help the human resource personnel to select the right person in the right time for the suitable job. Ministry of Higher Education and Scientific Research (MOHESR) in Iraq can apply data warehouse to support its decision making. They can use it also to support human resource system in Iraq. This paper creates data warehouse architecture for human resource systems of public and private organizations which give authorized access for students' information of both public and private universities in Iraq. Moreover, the MOHESR can use this idea to increase its income by allowing the public and private organizations to find the proper staff through annual payment access.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Driver's health management system using nanosecond pulse near-field sensing technology 采用纳秒脉冲近场传感技术的驾驶员健康管理系统
Yen‐Hsien Lee, Shih-Tsung Liu, H. Lin, Wen-Jen Tseng
{"title":"Driver's health management system using nanosecond pulse near-field sensing technology","authors":"Yen‐Hsien Lee, Shih-Tsung Liu, H. Lin, Wen-Jen Tseng","doi":"10.1109/I4CT.2014.6914223","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914223","url":null,"abstract":"Long-term and continuous non-invasive driver's health monitoring has shown that it is the most important to measure driver's fatigue level and personal health status. Currently, there are many preferable methods, including ECG, EEG and EOG, to get the physiological parameters of driver. However, the size of the machine is large and the operation of monitors is difficult. The measurement procedure is limited by long-term, continuous measurement and also easy to cause discomfort. To improve these issues, the noncontact and non-pressurized measuring method will become an important innovation improvement. This paper presents a driver's health management system using noncontact physical sensor technology. The system contains three portions: (a) nanosecond pulse near-field sensing (NPNS) radar system, (b) physiological signal processing, and (c) controller area network (CAN) system. The experimental results show that the NPNS radar sensor can be applied to detect driver's health status and combined with car system for driving safety and health management.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inter-rater reliability of accessing the intelligibility of band-limited transformed speech using nonlinear frequency compression 利用非线性频率压缩获取带限变换语音可理解度的码间可靠性
Mohd Hairi Mohd Zaman, M. Mustafa, A. Hussain
{"title":"Inter-rater reliability of accessing the intelligibility of band-limited transformed speech using nonlinear frequency compression","authors":"Mohd Hairi Mohd Zaman, M. Mustafa, A. Hussain","doi":"10.1109/I4CT.2014.6914160","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914160","url":null,"abstract":"Speech intelligibility verification through a listening test session by human raters was conducted to assess the intelligibility of band-limited speech. The band-limited speech was generated using nonlinear frequency compression via spectral envelope transformation to assist individuals with high-frequency hearing loss. However, addressing the issue on the reliability of the assessment method is important because of the human factors that cause variability in the intelligibility test results. This study investigated the use of Cohen's Kappa coefficient to measure the inter-rater reliability in the intelligibility test. The inter-rater reliability was found to be high when Cohen's Kappa coefficient was over 0.6. The result indicates that the human raters showed a high level of agreement in assessing the intelligibility of the band-limited speech.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reconfigurable multiband antenna for WLAN and WiMAX applications 用于WLAN和WiMAX应用的可重构多频带天线
N. Sahar, M. Islam, N. Misran
{"title":"A reconfigurable multiband antenna for WLAN and WiMAX applications","authors":"N. Sahar, M. Islam, N. Misran","doi":"10.1109/I4CT.2014.6914166","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914166","url":null,"abstract":"An U-shaped patches loaded with dipole antenna designed for multiband antenna is proposed. The antenna can be reconfigured as single band at 3.5 GHz and dual-band frequencies at 2.4 GHz and 5.2 as required in WiMAX and WLAN applications. The length slot and length of U-shaped patch can be varied to adjust the desired upper frequency as well as the bandwidth. Moreover, the lower frequency also can be tuned by varying the dipole arms for both elements. The gains are performed 2.1 dB, 2 dB and 5.54 dB for single and dual band respectively with total efficiency is greater than 90%. The design methodology and antenna measurement results are both presented and discussed in this letter.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131230166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new Orthogonal - Diamond Search algorithm for Motion Estimation 一种新的运动估计正交菱形搜索算法
N. A. Hamid, A. M. Darsono, N. A. Manap, R. A. Manap, H. Sulaiman
{"title":"A new Orthogonal - Diamond Search algorithm for Motion Estimation","authors":"N. A. Hamid, A. M. Darsono, N. A. Manap, R. A. Manap, H. Sulaiman","doi":"10.1109/I4CT.2014.6914228","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914228","url":null,"abstract":"Many fast Block Matching Algorithm or BMA have been proposed and developed in recent years in order to reduce the computational cost while maintaining the quality of the video signal. In this paper, a new Orthogonal-Diamond Search (ODS) is proposed which employs an orthogonal-shaped search pattern in the first step and then is switched into small diamond-shaped search pattern for the next step. The proposed algorithm and several established algorithms, namely Full Search (FS), Three-Step Search (TSS) and Diamond Search (DS) are implemented using MATLAB and their performance are being compared and analyzed in terms of computational complexity, peak signal-to-noise ratio (PSNR), and number of search points. Simulation result shows that the proposed algorithm can find motion vector with fewer number of search points while maintains close performance of video quality with other selected algorithms.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Contactless energy transfer using acoustic approach - A review 声学方法的非接触式能量传递。综述
T. Zaid, S. Saat, Y. Yusop, N. Jamal
{"title":"Contactless energy transfer using acoustic approach - A review","authors":"T. Zaid, S. Saat, Y. Yusop, N. Jamal","doi":"10.1109/I4CT.2014.6914209","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914209","url":null,"abstract":"A coupled of ultrasonic transducer can act as a power transmission device by means of Acoustic Energy Transfer (AET). This method is relatively new method of contactless energy transfer and could be an alternative to the currently established technologies for the contactless transmission of power, such as inductive power transfer (IPT) and capacitive coupled power transfer (CPT). This paper presents a review on energy transmission through ultrasonic transducers as a source of power that has been applied by various researchers. Through this review, we hope that a better understanding of AET concept can be established and therefore can have a bright future.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133919382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Sharing of attacks information across clouds for improving security: A conceptual framework 跨云共享攻击信息以提高安全性:一个概念性框架
A. Waqas, Zulkefli Muhammed Yusof, Asadullah Shah, Nadeem Mahmood
{"title":"Sharing of attacks information across clouds for improving security: A conceptual framework","authors":"A. Waqas, Zulkefli Muhammed Yusof, Asadullah Shah, Nadeem Mahmood","doi":"10.1109/I4CT.2014.6914185","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914185","url":null,"abstract":"Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. It is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. The cloud environment is required to have efficient security techniques as it contains precious assets such as data, users, technologies, resources and business transactions. Most of the proposed architectures for cloud computing implementations are for individual clouds which do not allow the sharing of attack information with other clouds and hence the other clouds are not able to safe themselves from the same attack. The aim of this research is to propose a conceptual framework for connected or federated clouds that can share information regarding attacks and attackers for securing themselves.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Advantage and drawback of support vector machine functionality 支持向量机功能的优缺点
Sasan Karamizadeh, Shahidan M. Abdullah, M. Halimi, J. Shayan, Mohammad Javad Rajabi
{"title":"Advantage and drawback of support vector machine functionality","authors":"Sasan Karamizadeh, Shahidan M. Abdullah, M. Halimi, J. Shayan, Mohammad Javad Rajabi","doi":"10.1109/I4CT.2014.6914146","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914146","url":null,"abstract":"Support Vector Machine(SVM)is one of the most efficient machine learning algorithms, which is mostly used for pattern recognition since its introduction in 1990s. SVMs vast variety of usage, such as face and speech recognition, face detection and image recognition has turned it into a very useful algorithm. This has also been applied to many pattern classification problems such as image recognition, speech recognition, text categorization, face detection, and faulty card detection.Statistics was collected from journals and electronic sources published in the period of 2000 to 2013. Pattern recognition aims to classify data based on either a priori knowledge or statistical information extracted from raw data, which is a powerful tool in data separation in many disciplines. The Support Vector Machine (SVM) is a kind of algorithms in biometrics. It is a statistics technical and used orthogonal transformation to convert a set of observations of possibly correlated variables into a set of values of linearly uncorrelated variables.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书