2010 5th International Conference on Future Information Technology最新文献

筛选
英文 中文
Markov Random Field-Structured Direct Sum Residual Vector Quantization for Classification 用于分类的马尔可夫随机场结构直接和残差矢量量化
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482752
S. A. Ali Khan, C. Barnes
{"title":"Markov Random Field-Structured Direct Sum Residual Vector Quantization for Classification","authors":"S. A. Ali Khan, C. Barnes","doi":"10.1109/FUTURETECH.2010.5482752","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482752","url":null,"abstract":"Multistage RVQs with optimal direct sum decoder codebooks have been successfully designed and implemented for data compression. The same design concept has yielded good results in the application of image-content classification and has also provided an effective platform to perform image driven data mining (IDDM). To make it computationally feasible, the current design methods entail encoder codebook designed in a sequential but suboptimal manner. Based on the sub-optimal codebook design approach, the sequential search path is greedy based on a stage wise nearest-neighborhood strategy instead of a direct sum nearest-neighborhood requirement. Markov random field (MRF) provides a suitable framework to exploit the structure of multistage residual vector quantizers with optimal direct-sum direct sum decoder codebooks combined with sequential-search encoders to achieve optimized classification in the maximum aposteriori sense (MAP).","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121298525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PIMSI: A Partial Image Spam Inspector 部分图像垃圾邮件检查器
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482767
Pattaraporn Klangpraphant, P. Bhattarakosol
{"title":"PIMSI: A Partial Image Spam Inspector","authors":"Pattaraporn Klangpraphant, P. Bhattarakosol","doi":"10.1109/FUTURETECH.2010.5482767","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482767","url":null,"abstract":"Abstract - at the present time, the high enlargement of spam e-mail is not easy to preclude and the spam is vastly stretch. These spam e-mails cause various problems to the Internet users, for instance full mailbox, and wasting time. Consequently, prodigious methods have been proposed but most of them have some limitations in mapping features and the processing times. Therefore, this paper proposed a novel method that can detect a set of image spam e- mail called a Partial Image Spam Inspector (PIMSI). The method focuses on spam that consists of both texts and images over the e-mail system. The significant feature of this technique is that it will sensitively protect the distribution of all messages which have a partial similarity of spam e- mail. As a result, users will have a green mailbox as wishes.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Toward Secure Centralized Spectrum Sensing by Utilizing Geographical Information 利用地理信息实现安全的集中频谱感知
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482726
Chi-Yuan Chen, Yao-Hsin Chou, H. Chao, Chi-Hsiang Lo
{"title":"Toward Secure Centralized Spectrum Sensing by Utilizing Geographical Information","authors":"Chi-Yuan Chen, Yao-Hsin Chou, H. Chao, Chi-Hsiang Lo","doi":"10.1109/FUTURETECH.2010.5482726","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482726","url":null,"abstract":"Spectrum utilization becomes more and more important while new techniques keep increasing and the spectrum bands remain finite. Cognitive Radio (CR) is a revolutionary technology to make use of the spectrum more effectively. In order to avoid the interference to the primary user, spectrum sensing must be sensitive. Cooperative Spectrum Sensing (CSS) is one way to increase the reliability of spectrum sensing. The information fusion technique is a key component of CSS. In this paper, we adopt a grid-like model for CR networks, and we utilize geographical information with reputational weights to propose a two-level fusion scheme called Secure Centralized Spectrum Sensing (SCSS). The simulation results show that as the attackers present high density aggregation at some areas, the correct sensing ratio of SCSS is increasing as well even when the number of attackers is very large.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116494937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Media Processing Implementation Using Libvlc for the Ginga Middleware 基于Libvlc的Ginga中间件媒体处理实现
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482748
T. H. Trojahn, J. L. Gonçalves, J. Mattos, L. S. Da Rosa Junior, L. Agostini
{"title":"A Media Processing Implementation Using Libvlc for the Ginga Middleware","authors":"T. H. Trojahn, J. L. Gonçalves, J. Mattos, L. S. Da Rosa Junior, L. Agostini","doi":"10.1109/FUTURETECH.2010.5482748","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482748","url":null,"abstract":"The Brazilian middleware for Digital TV, known as Ginga, is currently divided in two subsystems: the declarative, named Ginga Nested Context Language (Ginga-NCL), and the procedural Ginga-Java (Ginga-J). The Ginga Development Network Project GingaCDN) is a effort to created a unique middleware including the reference implementation of a Ginga middleware composed by the Ginga-NCL and the Ginga-J environments in a common core named Ginga Commom Core (GingaCC), reaching a full modular version of the middleware. The aim of this work is to present the Media processing implementation, one of the GingaCC components.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"2 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130822441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Provision of Flowable Services in Cloud Computing Environments 云计算环境中流动服务的提供
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482722
Yishui Zhu, Roman Y. Shtykh, Qun Jin
{"title":"Provision of Flowable Services in Cloud Computing Environments","authors":"Yishui Zhu, Roman Y. Shtykh, Qun Jin","doi":"10.1109/FUTURETECH.2010.5482722","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482722","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Properties of Message Delivery Path in Opportunistic Networks 机会网络中消息传递路径的特性
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482772
Q. Cai, J. Niu
{"title":"Properties of Message Delivery Path in Opportunistic Networks","authors":"Q. Cai, J. Niu","doi":"10.1109/FUTURETECH.2010.5482772","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482772","url":null,"abstract":"One of the main challenges in opportunistic networks is how to deliver messages effectively. Mobile nodes have to rely on encounter opportunities to exchange data due to no complete end-to-end path existing in such networks. In this paper, based on in-depth analysis of encounter occurrence process and contact frequency, we find that both of them exhibit unique power-law distributions. The great majority of contacts occurred in short period of time shows that mobile nodes cluster into communities during moving, which indicates the spatial dependency existing among them. The fact that most node pairs only encountered a few times implies that the network connectivity greatly depends on those rare contacts. Using Time Evolving Graph (TEG) theory we analyze the Minimum Delay Path (MDP) for each node pair and find that although there are large number of nodes in networks, the average length of MDP is relative small, which indicates that communities are inherently organized into a hierarchy structure as human society is, and some rare encounters have a significant influence on the average length of MDP as well as the message delivery delay. Our results suggest that decentralized community detection algorithms will achieve optimal message delivery performance with the help of node encounter history information about inter-community.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HMS: History-Based Multi-Keywords Search in Unstructured Peer-to-Peer Systems 非结构化点对点系统中基于历史的多关键词搜索
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482724
Xiaojing Sun, Feng Hong, Zhongwen Guo
{"title":"HMS: History-Based Multi-Keywords Search in Unstructured Peer-to-Peer Systems","authors":"Xiaojing Sun, Feng Hong, Zhongwen Guo","doi":"10.1109/FUTURETECH.2010.5482724","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482724","url":null,"abstract":"Peer-to-peer approaches bring one perfect alternative for the Web content search. However, how to search and retrieve the data based on the content query is still an open problem for peer-to-peer systems. In this paper we propose Historybased Multi-keywords Search(HMS) in unstructured peer-to-peer systems, which only requires each peer to maintain partial query information of its neighbors, and exploit these information to autonomously find, for each query, how many neighbors and which neighbors are likely to answer. The simulations prove that HMS can limit the traffic of query messages while keeping the high quality of query results.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121538387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical Analysis and Structure Optimization of Large Photovoltaic Module 大型光伏组件的统计分析与结构优化
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482687
Ratheesh R. Thankalekshmi, Qinru Qiu, K. Man
{"title":"Statistical Analysis and Structure Optimization of Large Photovoltaic Module","authors":"Ratheesh R. Thankalekshmi, Qinru Qiu, K. Man","doi":"10.1109/FUTURETECH.2010.5482687","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482687","url":null,"abstract":"There has been an increasing interest in powering electronic systems using solar energy. Designers are seeking for techniques to manufacture solar panels using low cost material in a massive scale. This will likely lead to wide process variation and hence unreliable performance. This paper considers the impact of the process variations on the output power of large Photovoltaic (PV) module by modeling each PV cell as a current source whose short circuit current is a normal random variable. The probability distribution of the overall output power of an NxM PV module is analytically derived. The proposed statistical analysis technique will enable the designer to predict the maximum output power of a PV module for a given confidence level. This analysis also reveals that, when the size and the manufacturing technology are given, the efficiency of a PV module is determined by its topology. The proposed power prediction model can be applied to find the optimal structure of the PV module that maximizes the energy harvesting rate at the given confidence level.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human Activity Recognition via an Accelerometer-Enabled-Smartphone Using Kernel Discriminant Analysis 基于核判别分析的加速计智能手机人类活动识别
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482729
A. M. Khan, Y-K. Lee, S. Lee, T.-S. Kim
{"title":"Human Activity Recognition via an Accelerometer-Enabled-Smartphone Using Kernel Discriminant Analysis","authors":"A. M. Khan, Y-K. Lee, S. Lee, T.-S. Kim","doi":"10.1109/FUTURETECH.2010.5482729","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482729","url":null,"abstract":"Nowadays many people use smartphones with built-in accelerometers which makes these smartphones capable of recognizing daily activities. However, mobile phones are carried along freely instead of a firm attachment to a body part. Since the output of any body-worn triaxial accelerometer varies for the same physical activity at different positions on a subject's body, the acceleration data thus could vary significantly for the same activity which could result in high within-class variance. Therefore, realization of activity-aware smartphones requires a recognition method that could function independent of phone's position along subjects' bodies. In this study, we present a method to address this problem. The proposed method is validated using five daily physical activities. Activity data is collected from five body positions using a smartphone with a built-in triaxial accelerometer. Features including autoregressive coefficients and signal magnitude area are calculated. Kernel Discriminant Analysis is then employed to extract the significant non-linear discriminating features which maximize the between-class variance and minimize the within-class variance. Final classification is performed by means of artificial neural nets. The average accuracy of about 96% illustrates the effectiveness of the proposed method.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124962832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 246
Access Control Mechanism For Web Databases By Using Parameterized Cursor 基于参数化游标的Web数据库访问控制机制
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482721
Z. Jan, Muhammad Shah, Azhar Rauf, Mohd Shoaib Amir Khan, Saeed Mahfooz
{"title":"Access Control Mechanism For Web Databases By Using Parameterized Cursor","authors":"Z. Jan, Muhammad Shah, Azhar Rauf, Mohd Shoaib Amir Khan, Saeed Mahfooz","doi":"10.1109/FUTURETECH.2010.5482721","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482721","url":null,"abstract":"Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the most dangerous threats to web applications. SQL Injection technique is mostly an attack on data driven web applications. By providing especially built user input through the web form fields, the attacker can access and modify the contents of the underlying database of a web application. This research work presents a technique, which will be used for the detection and prevention from SQL Injection. The parameterized cursor is used to implement the concept. The user session information will be passed as a parameter to cursor. If the user is an authorized user then the cursor will fetch the desired tuples else will fail to execute. This research work can easily be adopted and implemented in any platform and database. An example application is developed in Oracle Internet Developer suite 10g and Oracle Database 10g to test the performance against SQL Injection.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124330980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信