{"title":"Diagnosing prostate diseases in color Doppler ultrasound images","authors":"Chuan-Yu Chang, Cheng-Min Fan, Y. Tsai","doi":"10.1109/ISIC.2012.6449753","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449753","url":null,"abstract":"To detect early prostate cancer, physicians usually apply the color Doppler ultrasound imaging to visualize prostate. Since color Doppler ultrasound imaging provides blood flow information, differentiating the malignancy from benign prostate diseases by inspecting Doppler spectrum is not difficult. However, it is hand-held, time-consuming, and only limited in a small and static region, which might not represent the real status of the whole prostate. Therefore, this paper proposed a dynamic approach to estimate resistive index of blood flow in color Doppler ultrasound images. Experimental results show dynamic resistive index is better than conventional resistive index, and comparable with PSA test in diagnosing prostate cancer, indicating high performance of the proposed approach, which also reveals feasible and effective of it.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125198914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A modified energy efficient backup hierarchical clustering algorithm for WSN","authors":"Tan Xian","doi":"10.1109/ISIC.2012.6449704","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449704","url":null,"abstract":"In this paper, we integrate the multi-hop technique with a backup-based clustering algorithm using the residual energy to organize sensors. By using an adaptive backup strategy as well as the residual energy, the algorithm not only realizes load balance among sensor node, but also achieves dynamic cluster head distribution across the network in a timeout manner. Simulation results also demonstrate our algorithm is more energy-efficient compared to other algorithms. Our algorithm is also easily extended to avoid the formation of forced cluster heads, thereby it achieves better network management, energy-efficiency and scalability.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121818418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient public key Homomorphic Encryption over integer plaintexts","authors":"Y. Ramaiah, G. Kumari","doi":"10.1109/ISIC.2012.6449723","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449723","url":null,"abstract":"Fully Homomorphic Encryption has become a hot research topic in light of the privacy concerns related to the emerging cloud computing paradigm. Existing fully homomorphic schemes are not truly practical due to their high computational complexities and huge message expansions. Targeting the construction of a homomorphic encryption scheme that is implementable for at least certain class of applications, this paper proposes a Somewhat Homomorphic public key encryption scheme, which can be viewed as a variant of the scheme devised by Van Dijk et.al, extended to larger message space. The proposed scheme is compact, semantically secure with significantly smaller public key, and is capable of encrypting integer plaintexts rather than single bits, with comparatively lower message expansion and computational complexities.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chih-Yang Lin, Li-Wei Kang, K. Muchtar, Jyh-Da Wei, C. Yeh
{"title":"Image copy detection via dictionary learning and sparse coding","authors":"Chih-Yang Lin, Li-Wei Kang, K. Muchtar, Jyh-Da Wei, C. Yeh","doi":"10.1109/ISIC.2012.6449751","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449751","url":null,"abstract":"In this paper, a new robust image hashing scheme for image authentication via dictionary-based sparse representation of images is proposed. For image hash extraction, we create an over-complete dictionary containing the prototype image atoms to build the hash for an image, where each image patch can be represented by sparse linear combinations of these atoms. The major contribution is to formulate the image authentication problem as a sparse coding problem. Based on the energy distribution of nonzero coefficients of the sparse representation for an image, the authentication of the image can be achieved. Simulation results have shown the proposed scheme is robust to several content-preserving image attacks defined in StirMark.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The DDRx memory controller extended for reconfigurable computing","authors":"J. Chiu, Kai-Ming Yang","doi":"10.1109/ISIC.2012.6449701","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449701","url":null,"abstract":"With the popularity of the DDRx memory there are a lot of applications in digital products and platforms and the reconfigurable computing system has potential to accelerate in large amounts of data computing. However, current trend is towards combining a microprocessor with one or many reconfigurable computing units. Thus, the massive data transfer among CPUs, memory modules and reconfigurable accelerators will be a big challenge for system bus. And then the system performance will be limited on the system bus bandwidth. In this paper, we propose the architecture to connect DDRx memory and reconfigurable FPGA directly and it can support the data transfer function between them bypassing system bus, called brain module controller, whose instruction set is created through the extension of DDRx memory controller's. By the controller functions, we can construct a Software-Hardware co-design platform with memory mapped methods.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134215580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient oil and gas pipeline monitoring systems based on wireless sensor networks","authors":"Huaping Yu, Mei Guo","doi":"10.1109/ISIC.2012.6449735","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449735","url":null,"abstract":"Wireless sensor networks (WSN) is considered an effective technique to collect oil and gas transmission pipeline information. The studies that use conventional technologies (such as GPRS, microwave, radio modem and cables etc.) to collect these pipelines state information have the disadvantages of high cost of system maintenance and long data packet delay. The usage of WSN in oil and gas pipeline monitoring system is expected to be able to overcome the above difficulties. This paper proposes an efficient pipeline state information collection algorithm based on sensor node line deployment strategy and data fusion strategy in WSN. And the analysis result of this algorithm shows that the proposed algorithm can remarkably improve the network performances on delay and energy, ensure the urgency data to be propagated effectively and prolong the network life span. It is characterized with high performance, low cost and control efficiency.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Against the breaches: Data loss prevention for online travelling services","authors":"A. Chen, Huei-Chung Chu, Sou-Chein Wu","doi":"10.1109/ISIC.2012.6449761","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449761","url":null,"abstract":"Contemporary businesses have fully utilized information technologies and networks to integrate all the activities of business. The data flow spanning the whole value chain involves abundant confidential and sensitive information, which could cause grave aftermaths if critical information is leaked. This study provides a comprehensive approach for data leakage prevention by taking online travelling services as sample case. Three axes for all-over data leakage prevention is concluded as (1) Maintain secure physical environment; (2) Adopt adequate data leakage technologies; (3) Establish appropriate data protection arrangements and fulfill the requirements continuously.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128527754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview on RFID-based games and its value chain in the games industry","authors":"Yu-Chih Huang","doi":"10.1109/ISIC.2012.6449763","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449763","url":null,"abstract":"The use of radio frequency identification (RFID) technologies is growing rapidly in recently. Its applications have been in successful use for many years in public transport, ticketing and access control cards, and, more recently, government identity cards and passports, and in manufacturing supply chains management and logistics for goods distribution. However, RFID application is an initial stage in the games industry. Up to now, it still has not yet had a concrete research figure to be referenced. Therefore, in this study review papers and patents to investigate the type of RFID implementation in games industry, and then proposes a system framework and discussion in the view of games value chain by a prototype of RFID smartcard management information system. The goal of this research was to discover if the features of the ubiquitous game somehow influence the process of playing and in what ways are employed when playing in the RFID new application. Hopefully, this paper may be referenced by games industry in implementation the application of RFID.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A health management application with QR-Code input and rule inference","authors":"H. Hsu, Min-Ho Chang, N. Y. Yen","doi":"10.1109/ISIC.2012.6449722","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449722","url":null,"abstract":"Mobile phone is an indispensable tool in modern life. Each person can have more than one mobile phones, or even smart phones. Apple iPhone, leading the trend of smart phone applications, has brought many previously unthinkable possibilities in recent years. We have developed a health management application (app) run on iPhone. It uses the QR-Code to input calorie and nutrition information of food, snacks and drinks. This is a novel way to record what the user eats/drinks. A set of diet rules is also built within the app. With these data, the app can provide diet recommendations to the user following the rules. We aim to utilize the ease-of-use of the smart phone to achieve personal health management anytime, anywhere.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel OVSF-based multi-rate “OCDMA-PON and its optimal configuration”","authors":"Yih-Fuh Wang","doi":"10.1109/ISIC.2012.6449725","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449725","url":null,"abstract":"A flexible optical metropolitan-area network (OMAN) structured with code division multiple access-passive optical network (CDMA-PON) linkage is proposed to support multimedia services with multi-rate or various quality of service (QoS) by equipped OCDMA-OVSF code. For the optimally lightpath placement, a GMGA (Genetically Modified Genetic Algorithm) [1] scheme is involved and a MGMGA (Modified GMGA) is developed to quickly process the optimization of configuration. For evaluating performance, we compared GMGA and MGMGA with simple genetic algorithm (SGA) as running placement. Simulation results reveal that the performance of both GMGA and MGMGA can converge to near optimal solutions. However, MGMGA is very efficient even though it is not faster than SGA.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}