{"title":"Markov Random Field-Structured Direct Sum Residual Vector Quantization for Classification","authors":"S. A. Ali Khan, C. Barnes","doi":"10.1109/FUTURETECH.2010.5482752","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482752","url":null,"abstract":"Multistage RVQs with optimal direct sum decoder codebooks have been successfully designed and implemented for data compression. The same design concept has yielded good results in the application of image-content classification and has also provided an effective platform to perform image driven data mining (IDDM). To make it computationally feasible, the current design methods entail encoder codebook designed in a sequential but suboptimal manner. Based on the sub-optimal codebook design approach, the sequential search path is greedy based on a stage wise nearest-neighborhood strategy instead of a direct sum nearest-neighborhood requirement. Markov random field (MRF) provides a suitable framework to exploit the structure of multistage residual vector quantizers with optimal direct-sum direct sum decoder codebooks combined with sequential-search encoders to achieve optimized classification in the maximum aposteriori sense (MAP).","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121298525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PIMSI: A Partial Image Spam Inspector","authors":"Pattaraporn Klangpraphant, P. Bhattarakosol","doi":"10.1109/FUTURETECH.2010.5482767","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482767","url":null,"abstract":"Abstract - at the present time, the high enlargement of spam e-mail is not easy to preclude and the spam is vastly stretch. These spam e-mails cause various problems to the Internet users, for instance full mailbox, and wasting time. Consequently, prodigious methods have been proposed but most of them have some limitations in mapping features and the processing times. Therefore, this paper proposed a novel method that can detect a set of image spam e- mail called a Partial Image Spam Inspector (PIMSI). The method focuses on spam that consists of both texts and images over the e-mail system. The significant feature of this technique is that it will sensitively protect the distribution of all messages which have a partial similarity of spam e- mail. As a result, users will have a green mailbox as wishes.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chi-Yuan Chen, Yao-Hsin Chou, H. Chao, Chi-Hsiang Lo
{"title":"Toward Secure Centralized Spectrum Sensing by Utilizing Geographical Information","authors":"Chi-Yuan Chen, Yao-Hsin Chou, H. Chao, Chi-Hsiang Lo","doi":"10.1109/FUTURETECH.2010.5482726","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482726","url":null,"abstract":"Spectrum utilization becomes more and more important while new techniques keep increasing and the spectrum bands remain finite. Cognitive Radio (CR) is a revolutionary technology to make use of the spectrum more effectively. In order to avoid the interference to the primary user, spectrum sensing must be sensitive. Cooperative Spectrum Sensing (CSS) is one way to increase the reliability of spectrum sensing. The information fusion technique is a key component of CSS. In this paper, we adopt a grid-like model for CR networks, and we utilize geographical information with reputational weights to propose a two-level fusion scheme called Secure Centralized Spectrum Sensing (SCSS). The simulation results show that as the attackers present high density aggregation at some areas, the correct sensing ratio of SCSS is increasing as well even when the number of attackers is very large.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116494937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. H. Trojahn, J. L. Gonçalves, J. Mattos, L. S. Da Rosa Junior, L. Agostini
{"title":"A Media Processing Implementation Using Libvlc for the Ginga Middleware","authors":"T. H. Trojahn, J. L. Gonçalves, J. Mattos, L. S. Da Rosa Junior, L. Agostini","doi":"10.1109/FUTURETECH.2010.5482748","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482748","url":null,"abstract":"The Brazilian middleware for Digital TV, known as Ginga, is currently divided in two subsystems: the declarative, named Ginga Nested Context Language (Ginga-NCL), and the procedural Ginga-Java (Ginga-J). The Ginga Development Network Project GingaCDN) is a effort to created a unique middleware including the reference implementation of a Ginga middleware composed by the Ginga-NCL and the Ginga-J environments in a common core named Ginga Commom Core (GingaCC), reaching a full modular version of the middleware. The aim of this work is to present the Media processing implementation, one of the GingaCC components.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"2 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130822441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provision of Flowable Services in Cloud Computing Environments","authors":"Yishui Zhu, Roman Y. Shtykh, Qun Jin","doi":"10.1109/FUTURETECH.2010.5482722","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482722","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Properties of Message Delivery Path in Opportunistic Networks","authors":"Q. Cai, J. Niu","doi":"10.1109/FUTURETECH.2010.5482772","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482772","url":null,"abstract":"One of the main challenges in opportunistic networks is how to deliver messages effectively. Mobile nodes have to rely on encounter opportunities to exchange data due to no complete end-to-end path existing in such networks. In this paper, based on in-depth analysis of encounter occurrence process and contact frequency, we find that both of them exhibit unique power-law distributions. The great majority of contacts occurred in short period of time shows that mobile nodes cluster into communities during moving, which indicates the spatial dependency existing among them. The fact that most node pairs only encountered a few times implies that the network connectivity greatly depends on those rare contacts. Using Time Evolving Graph (TEG) theory we analyze the Minimum Delay Path (MDP) for each node pair and find that although there are large number of nodes in networks, the average length of MDP is relative small, which indicates that communities are inherently organized into a hierarchy structure as human society is, and some rare encounters have a significant influence on the average length of MDP as well as the message delivery delay. Our results suggest that decentralized community detection algorithms will achieve optimal message delivery performance with the help of node encounter history information about inter-community.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HMS: History-Based Multi-Keywords Search in Unstructured Peer-to-Peer Systems","authors":"Xiaojing Sun, Feng Hong, Zhongwen Guo","doi":"10.1109/FUTURETECH.2010.5482724","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482724","url":null,"abstract":"Peer-to-peer approaches bring one perfect alternative for the Web content search. However, how to search and retrieve the data based on the content query is still an open problem for peer-to-peer systems. In this paper we propose Historybased Multi-keywords Search(HMS) in unstructured peer-to-peer systems, which only requires each peer to maintain partial query information of its neighbors, and exploit these information to autonomously find, for each query, how many neighbors and which neighbors are likely to answer. The simulations prove that HMS can limit the traffic of query messages while keeping the high quality of query results.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121538387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical Analysis and Structure Optimization of Large Photovoltaic Module","authors":"Ratheesh R. Thankalekshmi, Qinru Qiu, K. Man","doi":"10.1109/FUTURETECH.2010.5482687","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482687","url":null,"abstract":"There has been an increasing interest in powering electronic systems using solar energy. Designers are seeking for techniques to manufacture solar panels using low cost material in a massive scale. This will likely lead to wide process variation and hence unreliable performance. This paper considers the impact of the process variations on the output power of large Photovoltaic (PV) module by modeling each PV cell as a current source whose short circuit current is a normal random variable. The probability distribution of the overall output power of an NxM PV module is analytically derived. The proposed statistical analysis technique will enable the designer to predict the maximum output power of a PV module for a given confidence level. This analysis also reveals that, when the size and the manufacturing technology are given, the efficiency of a PV module is determined by its topology. The proposed power prediction model can be applied to find the optimal structure of the PV module that maximizes the energy harvesting rate at the given confidence level.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Activity Recognition via an Accelerometer-Enabled-Smartphone Using Kernel Discriminant Analysis","authors":"A. M. Khan, Y-K. Lee, S. Lee, T.-S. Kim","doi":"10.1109/FUTURETECH.2010.5482729","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482729","url":null,"abstract":"Nowadays many people use smartphones with built-in accelerometers which makes these smartphones capable of recognizing daily activities. However, mobile phones are carried along freely instead of a firm attachment to a body part. Since the output of any body-worn triaxial accelerometer varies for the same physical activity at different positions on a subject's body, the acceleration data thus could vary significantly for the same activity which could result in high within-class variance. Therefore, realization of activity-aware smartphones requires a recognition method that could function independent of phone's position along subjects' bodies. In this study, we present a method to address this problem. The proposed method is validated using five daily physical activities. Activity data is collected from five body positions using a smartphone with a built-in triaxial accelerometer. Features including autoregressive coefficients and signal magnitude area are calculated. Kernel Discriminant Analysis is then employed to extract the significant non-linear discriminating features which maximize the between-class variance and minimize the within-class variance. Final classification is performed by means of artificial neural nets. The average accuracy of about 96% illustrates the effectiveness of the proposed method.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124962832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Jan, Muhammad Shah, Azhar Rauf, Mohd Shoaib Amir Khan, Saeed Mahfooz
{"title":"Access Control Mechanism For Web Databases By Using Parameterized Cursor","authors":"Z. Jan, Muhammad Shah, Azhar Rauf, Mohd Shoaib Amir Khan, Saeed Mahfooz","doi":"10.1109/FUTURETECH.2010.5482721","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482721","url":null,"abstract":"Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the most dangerous threats to web applications. SQL Injection technique is mostly an attack on data driven web applications. By providing especially built user input through the web form fields, the attacker can access and modify the contents of the underlying database of a web application. This research work presents a technique, which will be used for the detection and prevention from SQL Injection. The parameterized cursor is used to implement the concept. The user session information will be passed as a parameter to cursor. If the user is an authorized user then the cursor will fetch the desired tuples else will fail to execute. This research work can easily be adopted and implemented in any platform and database. An example application is developed in Oracle Internet Developer suite 10g and Oracle Database 10g to test the performance against SQL Injection.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124330980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}