Third International Conference on Information Technology and Applications (ICITA'05)最新文献

筛选
英文 中文
Using image contour recognition in GIS navigation 图像轮廓识别在GIS导航中的应用
Wei Lai, Donggang Yu, J. Tanaka, Cai Fei
{"title":"Using image contour recognition in GIS navigation","authors":"Wei Lai, Donggang Yu, J. Tanaka, Cai Fei","doi":"10.1109/ICITA.2005.297","DOIUrl":"https://doi.org/10.1109/ICITA.2005.297","url":null,"abstract":"This paper presents an approach of using image contour recognition in the navigation for enterprise geographic information systems (GIS). The extraction of object mark images is based on some morphological structural patterns which are described by morphological structural points, contour property, and other geometrical data in a binary image of enterprise geographic information map. Some preprocessing methods, contour smooth following, linearization and extraction patterns of structural points, are introduced. If a focus point of a map is selected, based on the extracted object mark image, a dynamic layout and navigation diagram is constructed, which consists of three underlying views: a graph navigation view, an image layout view, and an enterprise information view. In the diagram each object mark image is represented by a node, the relation information between two nodes is represented by an edge. If a node is selected, the new dynamic layout and navigation diagram is found based on the extracted object mark images around the selected node, which contains the relation with the previous diagram. Therefore a dynamic layout adjustment and navigation for enterprise GIS is determined.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems 一种用于入侵检测系统的多媒体流分类方案
Oge Marques, Pierre Baillargeon
{"title":"A Multimedia Traffic Classification Scheme for Intrusion Detection Systems","authors":"Oge Marques, Pierre Baillargeon","doi":"10.1109/ICITA.2005.28","DOIUrl":"https://doi.org/10.1109/ICITA.2005.28","url":null,"abstract":"Intrusion detection systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasingly higher bandwidths, which sometimes force them to let some data go by without being checked for possible malicious activity. This paper presents a novel method to improve the performance of IDS based on multimedia traffic classification. In the proposed method, the IDS has additional knowledge about common multimedia file formats and uses this knowledge to perform a more detailed analysis of packets carrying that type of data. If the structure and selected contents of the data are compliant, the corresponding stream is tagged accordingly, and the IDS is spared from further work on that stream. Otherwise, an anomaly is detected and reported. Our experiments using Snort confirm that this additional specialized knowledge results in substantial computational savings, without significant overhead for processing non-multimedia data","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A 3D reconstruction algorithm based on 3D deformable atlas 一种基于三维可变形图谱的三维重建算法
Ying Zhu, S. Belkasim
{"title":"A 3D reconstruction algorithm based on 3D deformable atlas","authors":"Ying Zhu, S. Belkasim","doi":"10.1109/ICITA.2005.3","DOIUrl":"https://doi.org/10.1109/ICITA.2005.3","url":null,"abstract":"Reconstructing 3D models from 2D images is an important problem in visualization, particularly in medical and biological visualization. We present a new algorithm for 3D model reconstruction from 2D-images. In our approach, a 3D atlas is deformed to fit the feature data set in the target images. Compared with existing 3D reconstruction techniques, our approach is more efficient and easier to control. The resultant model has good inherent connectivity and smoothness. The resolution of the final model is determined by the resolution of reference model rather than the dataset. The model generates highly detailed view with a limited number of images. This algorithm has been successfully applied to medical simulation.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel traffic independent NNC for dynamic buffer tuning to shorten the RTT of a TCP channel 一种新的流量无关的NNC,用于动态缓冲调整以缩短TCP通道的RTT
Wilfred W. K. Lin, Allan K. Y. Wong, T. Dillon
{"title":"A novel traffic independent NNC for dynamic buffer tuning to shorten the RTT of a TCP channel","authors":"Wilfred W. K. Lin, Allan K. Y. Wong, T. Dillon","doi":"10.1109/ICITA.2005.39","DOIUrl":"https://doi.org/10.1109/ICITA.2005.39","url":null,"abstract":"The proposed neural network controller (NNC) is for user/server level dynamic buffer tuning. It eliminates overflow by making the buffer length always cover the queue length adaptively on the fly. The NNC and the AQM (active queue management) mechanism(s) at the system/router level together form a unified buffer overflow prevention solution for the TCP channels. The NNC provides the following advantages: a) it prevents the AQM resources dished out already at the system level from being wasted, b) it shortens the service roundtrip time (RTT) by eliminating the chance of retransmission due to user-level overflow, and c) it alleviates network congestion. The NNC operates by the {0,/spl Delta/}/sup 2/ objective function and the principle is to maintain the given /spl Delta/ safety margin about the reference point symbolically represented by the \"0\" in {0,/spl Delta/}/sup 2/. The NNC stability and precision are traffic pattern independent for its statistical nature. This independence makes the NNC immensely suitable for Internet applications because Internet traffic can be LRD (long-range dependence), SRD (short-range dependence) or multifractal, and switch suddenly.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131309997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes 用DFT扩频码降低MC/DS CDMA系统的PAPR
Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, H. Ryu
{"title":"PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes","authors":"Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, H. Ryu","doi":"10.1109/ICITA.2005.205","DOIUrl":"https://doi.org/10.1109/ICITA.2005.205","url":null,"abstract":"Multi-carrier direct sequence code division multiple access (MC/DS CDMA) technique is one of the optimum technique for the reverse link mobile transmission. However, because of multi-carrier property, large PAPR (peak to average ratio) may be generated in MC/DS CDMA system. In this paper, DFT spreading code is applied to reduce high PAPR efficiently. As results, about 6 dB PAPR can be achieved at CCDF of 10 -3 in the MC/DS CDMA system with 12 data carriers. SER performance can be improved significantly compared with conventional MC/DS CDMA system with nonlinear HPA","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121605402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Quantum NN vs. NN in signal recognition 量子神经网络与神经网络在信号识别中的对比
Xin-Yi Tsai, Yu-Ju Chen, Huang-Chu Huang, Shang-Jen Chuang, R. Hwang
{"title":"Quantum NN vs. NN in signal recognition","authors":"Xin-Yi Tsai, Yu-Ju Chen, Huang-Chu Huang, Shang-Jen Chuang, R. Hwang","doi":"10.1109/ICITA.2005.228","DOIUrl":"https://doi.org/10.1109/ICITA.2005.228","url":null,"abstract":"In this paper, the signal recognition by using quantum neural network (QNN) is studied and simulated. The signals with fuzziness distributed in the boundary of two different types of signals could be effectively recognized due to the structure of QNN's hidden units. To demonstrate the capability of QNN in recognition, the signals in a two-dimension (NC2) non-convex system is simulated. All the experiments are also performed by using the traditional neural network (NN) for a comparison.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks 基于透明缓存的移动自组织网络机制
Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee
{"title":"A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks","authors":"Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee","doi":"10.1109/ICITA.2005.47","DOIUrl":"https://doi.org/10.1109/ICITA.2005.47","url":null,"abstract":"Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the relay among all mobile nodes. However, a MANET is a self-organizing and adaptive wireless network formed by the dynamic gathering of mobile nodes, and the topology of a MANET frequently changes. To cope with the intrinsic properties of MANETs, a transparent cache-based mechanism is proposed in this paper. With the aid of the mechanism, the repetition of data and data path occurring in a MANET could be cached in some special mobile nodes. Routes and time span to access data are therefore shortened, and the data reusable rate is enhanced to reduce the use of bandwidth and the power consumption of battery","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automatic seal imprint verification system for bank check processing 自动印鉴系统,用于银行支票处理
K. Ueda, Ken'ichi Matsuo
{"title":"Automatic seal imprint verification system for bank check processing","authors":"K. Ueda, Ken'ichi Matsuo","doi":"10.1109/ICITA.2005.81","DOIUrl":"https://doi.org/10.1109/ICITA.2005.81","url":null,"abstract":"In this paper, we propose a multi-expert seal imprint verification system. The system has been specifically designed for applications in the Japanese bank check processing. A difficult problem encountered in automatic seal imprint verification is that the system is required an extremely low error rate despite of using a small number of reference data for training. To conquer this problem, it combines two different algorithms for seal imprint verification. A seal imprint is first extracted from bank check image based on color features. The first verification algorithm is based on a method using local and global features of seal imprint. The second algorithm uses a special correlation based on a global approach. The two algorithms are combined in the multi-expert system by a voting strategy. Experimental results showed that the combination of the two algorithms improves significantly the verification performance both on \"false-acceptance error rate\" and \"false-rejection error rate\".","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121339776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Iris Feature Extraction Using 2D Phase Congruency 基于二维相位一致性的虹膜特征提取
Xiaoyan Yuan, P. Shi
{"title":"Iris Feature Extraction Using 2D Phase Congruency","authors":"Xiaoyan Yuan, P. Shi","doi":"10.1109/ICITA.2005.166","DOIUrl":"https://doi.org/10.1109/ICITA.2005.166","url":null,"abstract":"Iris feature extraction is the crucial stage of the whole iris recognition process for personal identification. A brief survey is made firstly in this paper on the methods that feasibly implemented in iris feature extraction. Because the iris capture devices in use are mostly exposed to the natural scene, so the natural illumination or other variant conditions sometimes can greatly influence the iris images captured and further impact the recognition result. Out of this consideration, we made some experimental try to extract the iris feature using the 2D phase congruency, which invariant to changes in intensity or contrast, to try to avoid those problems","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Multimedia Multicast Using SPLIT and Layered FEC 使用SPLIT和分层FEC的多媒体组播
N. Chilamkurti, B. Soh
{"title":"Multimedia Multicast Using SPLIT and Layered FEC","authors":"N. Chilamkurti, B. Soh","doi":"10.1109/ICITA.2005.185","DOIUrl":"https://doi.org/10.1109/ICITA.2005.185","url":null,"abstract":"In this paper, we propose the use of layered forward error correction (FEC) as an error control mechanism in a layered video protocol known as \"SPLIT\". By organizing FEC into multiple layers, a receiver can obtain different level of protection with respect to the channel capacity. By effectively dropping data layers, overall effective bandwidth can also be achieved. In our work, we integrated Reed-Solomon based FEC error control into SPLIT protocol, which is a priority based protocol. We used NS-2 simulator to evaluate FEC on SPLIT protocol and the results show that the video quality can be significantly improved at the same communication rate when layered FEC is used","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信