2012 International Conference on Information Security and Intelligent Control最新文献

筛选
英文 中文
Diagnosing prostate diseases in color Doppler ultrasound images 彩色多普勒超声图像诊断前列腺疾病
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449753
Chuan-Yu Chang, Cheng-Min Fan, Y. Tsai
{"title":"Diagnosing prostate diseases in color Doppler ultrasound images","authors":"Chuan-Yu Chang, Cheng-Min Fan, Y. Tsai","doi":"10.1109/ISIC.2012.6449753","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449753","url":null,"abstract":"To detect early prostate cancer, physicians usually apply the color Doppler ultrasound imaging to visualize prostate. Since color Doppler ultrasound imaging provides blood flow information, differentiating the malignancy from benign prostate diseases by inspecting Doppler spectrum is not difficult. However, it is hand-held, time-consuming, and only limited in a small and static region, which might not represent the real status of the whole prostate. Therefore, this paper proposed a dynamic approach to estimate resistive index of blood flow in color Doppler ultrasound images. Experimental results show dynamic resistive index is better than conventional resistive index, and comparable with PSA test in diagnosing prostate cancer, indicating high performance of the proposed approach, which also reveals feasible and effective of it.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125198914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A modified energy efficient backup hierarchical clustering algorithm for WSN 一种改进的WSN节能备份分层聚类算法
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449704
Tan Xian
{"title":"A modified energy efficient backup hierarchical clustering algorithm for WSN","authors":"Tan Xian","doi":"10.1109/ISIC.2012.6449704","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449704","url":null,"abstract":"In this paper, we integrate the multi-hop technique with a backup-based clustering algorithm using the residual energy to organize sensors. By using an adaptive backup strategy as well as the residual energy, the algorithm not only realizes load balance among sensor node, but also achieves dynamic cluster head distribution across the network in a timeout manner. Simulation results also demonstrate our algorithm is more energy-efficient compared to other algorithms. Our algorithm is also easily extended to avoid the formation of forced cluster heads, thereby it achieves better network management, energy-efficiency and scalability.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121818418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient public key Homomorphic Encryption over integer plaintexts 整数明文的高效公钥同态加密
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449723
Y. Ramaiah, G. Kumari
{"title":"Efficient public key Homomorphic Encryption over integer plaintexts","authors":"Y. Ramaiah, G. Kumari","doi":"10.1109/ISIC.2012.6449723","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449723","url":null,"abstract":"Fully Homomorphic Encryption has become a hot research topic in light of the privacy concerns related to the emerging cloud computing paradigm. Existing fully homomorphic schemes are not truly practical due to their high computational complexities and huge message expansions. Targeting the construction of a homomorphic encryption scheme that is implementable for at least certain class of applications, this paper proposes a Somewhat Homomorphic public key encryption scheme, which can be viewed as a variant of the scheme devised by Van Dijk et.al, extended to larger message space. The proposed scheme is compact, semantically secure with significantly smaller public key, and is capable of encrypting integer plaintexts rather than single bits, with comparatively lower message expansion and computational complexities.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Image copy detection via dictionary learning and sparse coding 基于字典学习和稀疏编码的图像复制检测
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449751
Chih-Yang Lin, Li-Wei Kang, K. Muchtar, Jyh-Da Wei, C. Yeh
{"title":"Image copy detection via dictionary learning and sparse coding","authors":"Chih-Yang Lin, Li-Wei Kang, K. Muchtar, Jyh-Da Wei, C. Yeh","doi":"10.1109/ISIC.2012.6449751","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449751","url":null,"abstract":"In this paper, a new robust image hashing scheme for image authentication via dictionary-based sparse representation of images is proposed. For image hash extraction, we create an over-complete dictionary containing the prototype image atoms to build the hash for an image, where each image patch can be represented by sparse linear combinations of these atoms. The major contribution is to formulate the image authentication problem as a sparse coding problem. Based on the energy distribution of nonzero coefficients of the sparse representation for an image, the authentication of the image can be achieved. Simulation results have shown the proposed scheme is robust to several content-preserving image attacks defined in StirMark.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The DDRx memory controller extended for reconfigurable computing DDRx内存控制器扩展为可重构计算
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449701
J. Chiu, Kai-Ming Yang
{"title":"The DDRx memory controller extended for reconfigurable computing","authors":"J. Chiu, Kai-Ming Yang","doi":"10.1109/ISIC.2012.6449701","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449701","url":null,"abstract":"With the popularity of the DDRx memory there are a lot of applications in digital products and platforms and the reconfigurable computing system has potential to accelerate in large amounts of data computing. However, current trend is towards combining a microprocessor with one or many reconfigurable computing units. Thus, the massive data transfer among CPUs, memory modules and reconfigurable accelerators will be a big challenge for system bus. And then the system performance will be limited on the system bus bandwidth. In this paper, we propose the architecture to connect DDRx memory and reconfigurable FPGA directly and it can support the data transfer function between them bypassing system bus, called brain module controller, whose instruction set is created through the extension of DDRx memory controller's. By the controller functions, we can construct a Software-Hardware co-design platform with memory mapped methods.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134215580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient oil and gas pipeline monitoring systems based on wireless sensor networks 一种基于无线传感器网络的高效油气管道监测系统
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449735
Huaping Yu, Mei Guo
{"title":"An efficient oil and gas pipeline monitoring systems based on wireless sensor networks","authors":"Huaping Yu, Mei Guo","doi":"10.1109/ISIC.2012.6449735","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449735","url":null,"abstract":"Wireless sensor networks (WSN) is considered an effective technique to collect oil and gas transmission pipeline information. The studies that use conventional technologies (such as GPRS, microwave, radio modem and cables etc.) to collect these pipelines state information have the disadvantages of high cost of system maintenance and long data packet delay. The usage of WSN in oil and gas pipeline monitoring system is expected to be able to overcome the above difficulties. This paper proposes an efficient pipeline state information collection algorithm based on sensor node line deployment strategy and data fusion strategy in WSN. And the analysis result of this algorithm shows that the proposed algorithm can remarkably improve the network performances on delay and energy, ensure the urgency data to be propagated effectively and prolong the network life span. It is characterized with high performance, low cost and control efficiency.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Against the breaches: Data loss prevention for online travelling services 防范漏洞:在线旅游服务的数据丢失预防
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449761
A. Chen, Huei-Chung Chu, Sou-Chein Wu
{"title":"Against the breaches: Data loss prevention for online travelling services","authors":"A. Chen, Huei-Chung Chu, Sou-Chein Wu","doi":"10.1109/ISIC.2012.6449761","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449761","url":null,"abstract":"Contemporary businesses have fully utilized information technologies and networks to integrate all the activities of business. The data flow spanning the whole value chain involves abundant confidential and sensitive information, which could cause grave aftermaths if critical information is leaked. This study provides a comprehensive approach for data leakage prevention by taking online travelling services as sample case. Three axes for all-over data leakage prevention is concluded as (1) Maintain secure physical environment; (2) Adopt adequate data leakage technologies; (3) Establish appropriate data protection arrangements and fulfill the requirements continuously.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128527754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An overview on RFID-based games and its value chain in the games industry 基于rfid的游戏及其在游戏产业中的价值链概述
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449763
Yu-Chih Huang
{"title":"An overview on RFID-based games and its value chain in the games industry","authors":"Yu-Chih Huang","doi":"10.1109/ISIC.2012.6449763","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449763","url":null,"abstract":"The use of radio frequency identification (RFID) technologies is growing rapidly in recently. Its applications have been in successful use for many years in public transport, ticketing and access control cards, and, more recently, government identity cards and passports, and in manufacturing supply chains management and logistics for goods distribution. However, RFID application is an initial stage in the games industry. Up to now, it still has not yet had a concrete research figure to be referenced. Therefore, in this study review papers and patents to investigate the type of RFID implementation in games industry, and then proposes a system framework and discussion in the view of games value chain by a prototype of RFID smartcard management information system. The goal of this research was to discover if the features of the ubiquitous game somehow influence the process of playing and in what ways are employed when playing in the RFID new application. Hopefully, this paper may be referenced by games industry in implementation the application of RFID.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A health management application with QR-Code input and rule inference 具有qr码输入和规则推理的运行状况管理应用程序
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449722
H. Hsu, Min-Ho Chang, N. Y. Yen
{"title":"A health management application with QR-Code input and rule inference","authors":"H. Hsu, Min-Ho Chang, N. Y. Yen","doi":"10.1109/ISIC.2012.6449722","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449722","url":null,"abstract":"Mobile phone is an indispensable tool in modern life. Each person can have more than one mobile phones, or even smart phones. Apple iPhone, leading the trend of smart phone applications, has brought many previously unthinkable possibilities in recent years. We have developed a health management application (app) run on iPhone. It uses the QR-Code to input calorie and nutrition information of food, snacks and drinks. This is a novel way to record what the user eats/drinks. A set of diet rules is also built within the app. With these data, the app can provide diet recommendations to the user following the rules. We aim to utilize the ease-of-use of the smart phone to achieve personal health management anytime, anywhere.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A novel OVSF-based multi-rate “OCDMA-PON and its optimal configuration” 基于ovsf的新型多速率OCDMA-PON及其优化配置
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449725
Yih-Fuh Wang
{"title":"A novel OVSF-based multi-rate “OCDMA-PON and its optimal configuration”","authors":"Yih-Fuh Wang","doi":"10.1109/ISIC.2012.6449725","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449725","url":null,"abstract":"A flexible optical metropolitan-area network (OMAN) structured with code division multiple access-passive optical network (CDMA-PON) linkage is proposed to support multimedia services with multi-rate or various quality of service (QoS) by equipped OCDMA-OVSF code. For the optimally lightpath placement, a GMGA (Genetically Modified Genetic Algorithm) [1] scheme is involved and a MGMGA (Modified GMGA) is developed to quickly process the optimization of configuration. For evaluating performance, we compared GMGA and MGMGA with simple genetic algorithm (SGA) as running placement. Simulation results reveal that the performance of both GMGA and MGMGA can converge to near optimal solutions. However, MGMGA is very efficient even though it is not faster than SGA.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信