Yung-Feng Lu, Po-Hung Lin, Shih-Chun Chou, Rong-Sheng Wang
{"title":"Multimedia support framework for distributed web-based collaborative editing","authors":"Yung-Feng Lu, Po-Hung Lin, Shih-Chun Chou, Rong-Sheng Wang","doi":"10.1109/ISIC.2012.6449695","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449695","url":null,"abstract":"Web-based applications offer a range of the benefits over traditional desktop applications; they are good for wide accessibility, platform independence, rich user experience, dynamic content, high scalability easy-to-share, and easy-to-use. This paper proposes a web-based framework of multimedia support for collaborative editing. A transmission protocol that integrates OT with the consideration of transmission for large media file was also proposed. The proposed mechanism has advantages for integration of existed OT-based collaborative schemes. The storage requirement of collaborative systems is also reduced. We believe the proposed mechanism is usable for web-based collaborative applications.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power optimal partitioning for dynamically reconfigurable FPGA","authors":"Tzu-Chiang Tai","doi":"10.1109/ISIC.2012.6449702","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449702","url":null,"abstract":"To implement a circuit system on dynamically reconfigurable FPGAs (DRFPGAs), we must partition it into sub-circuits and execute each sub-circuit in order. Traditional partitioning methods focus on optimizing the number of communication buffers. In this paper, we study the partitioning problem targeting at power optimization for the DRFPGAs. We analyze the power consumption caused by the communication buffers in the partitioning. Then we transform a circuit system into the corresponding flow network and apply a flow-based algorithm to find the partitioning of optimal power consumption. Experimental results demonstrate the effectiveness of our method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple two steps algorithm for face recongition","authors":"Ming Zhao, Hu Jie","doi":"10.1109/ISIC.2012.6449698","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449698","url":null,"abstract":"In this paper, we propose a very simple face recognition method. This method first exploits a linear combination of all the training samples to express the test sample. Then it evaluates the capability of each class in expressing the test sample and assigns the test sample to the class that has the strongest capability. Using the expression result, the proposed method can classify the testing sample with a high accuracy. though the proposed method exploits only one training sample per class to perform classification, it might obtain a better performance than the nearest feature space (NFS) method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Degenerative disc segmentation and diagnosis technology using important features from MRI of spine in images","authors":"Ming-Chi Wu, Cheng-An Fang","doi":"10.1109/ISIC.2012.6449738","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449738","url":null,"abstract":"This paper focuses on the medical image segmentation techniques used in the study of spinal diseases. Medical reports have shown an increasing concern of the public on spinal diseases caused by disc degeneration. This paper presents an accurate and automated method to detect the abnormal disc. This method uses two standard models in conjunction with the threshold value to accurately identify the cartilage. Then we smooth out the images via morphological methods and find out the average height of the cartilage before we judge if a certain cartilages are lower in height than the normal range. Finally, we carefully label the degenerated parts of the disc. In comparison with the professional physician's manual segmentation, our image segmentation shows high accuracy, with the highest rate reaching 99.88.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123499206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang-Ho Chen, Chih-te Yang, T. Huang, Shui-Ching Chang
{"title":"An EPQ model with two levels of trade credit policy under supplier credits linked to ordering quantity based on the triangular fuzzy numbers","authors":"Liang-Ho Chen, Chih-te Yang, T. Huang, Shui-Ching Chang","doi":"10.1109/ISIC.2012.6449773","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449773","url":null,"abstract":"In real world, there are many uncertain conditions which cannot be absolutely pre-determined or controlled by the decision maker. Then, by the empirical experience in the market behavior, there are no fixed carrying cost rate, interest paid rate and interest earned rate. In this paper, we will extend Chen et al. [1] model with fuzzification in the carrying cost rate, interest paid rate and interest earned rate, simultaneously, based on the triangular fuzzy numbers to fit the real world. Then, in our new fuzzy model, we will discuss some conditions or theorems to find the optimal solution for the total variable cost per unit time in fuzzy sense. Moreover, we will take some examples to illustrate our proposed model.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A statistic approach for photo quality assessment","authors":"L. Lo, Ju-Chin Chen","doi":"10.1109/ISIC.2012.6449719","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449719","url":null,"abstract":"This study proposes a photo quality assessment based on the spatial relations of image patches. In order to investigate the components of high-quality photos, the image is decomposed into patches based on the color information. Then the color moment and histogram of oriented gradients (HOG) are extracted for the feature representation. Because the diverse types of photos, the photo with the segmented patches is assigned to a subtopic before further modeling. Different from the prior researches which model the spatial relations of image patches obtained from high quality photo, in our work the negative models are learned from the low quality photos as well to provide more discriminate assessment results. Note that the spatial information of location and size of image patch is modeled by Gaussian mixture model (GMM), and the likelihood probabilities in accordance with the positive and negative context models are integrated as the assessment score. The experimental results demonstrates that the usage of the low-quality photos can provide the significant improvement and the proposed system have the promising potential for the photo quality assessment.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic counting of packaged wafer die based on machine vision","authors":"Hsuan T. Chang, R. Pan","doi":"10.1109/ISIC.2012.6449759","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449759","url":null,"abstract":"This paper presents a robust method to automatically determine the number of packaged dies in the residual wafer image, in which most dies have been removed and packaged. We propose the die segmentation region detection algorithm based on vertically and horizontally cumulative histograms and die detection algorithm based on YCbCr color space. The abnormal cases of fractional dies in the wafer boundary and dropped dies during packaging are considered in the proposed method as well. In the experimental results, the proposed method achieves 100% accuracy in counting the number of packaged dies in the ten test cases.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A commutative encryption scheme based on ElGamal encryption","authors":"Kaibin Huang, R. Tso","doi":"10.1109/ISIC.2012.6449730","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449730","url":null,"abstract":"A commutative encryption is a kind of an encryption system that enables a plaintext to be encrypted more than once using different users' public keys. In this system, decryption is not required before the encryption/re-encryption processes. Moreover, the resulted ciphertext can be decrypted by the designated decrypters without considering the order of public keys used in the encryption/re-encryption processes. In other words, the order of keys used in encryption and in decryption do not affect the computational result. Commutative encryption scheme is found useful in many real life applications such as in secret sharing, database integration and etc. However, regardless of its usefulness, few paper demonstrates how to construct such kind of a commutative encryption. In this paper, we propose a new commutative encryption scheme based on the ElGamel encryption and provide the security proof in the random oracle model.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent fuzzy PID controller for a reconfigurable machine tool","authors":"S. M. Ndzabukelwayo, K. Mpofu, N. Tlale","doi":"10.1109/ISIC.2012.6449717","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449717","url":null,"abstract":"This paper gives an analysis of how intelligent control can be used to provide a viable solution in the development of a control system for a reconfigurable machine tool (RMT). Firstly, the principle of RMT is briefly explained and the challenges that hinder their development are inspected in order to bring forward the gap to be addressed by this paper. The objective in this paper is to look at the work that has been done by other scholars in the field of control and then integrating the knowledge from these in developing an open architecture (OA) based intelligent control system suitable for the RMT. The key focus areas in this paper are the analysis of commonly used controllers in industrial applications and the benefits of using open architecture control (OAC). Lastly a proposal on how the fuzzy-PID controller can be used in an OAC system for the RMT is given.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128788978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of active appearance model for dual-camera face recognition","authors":"Chuan-Yu Chang, Cyun-Siang Huang","doi":"10.1109/ISIC.2012.6449774","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449774","url":null,"abstract":"Face recognition is a very important topic in the field of pattern recognition. Traditional two-dimensional face recognition technologies using images taken by a single camera are easily influenced by expressions and poses resulting in low recognition accuracy. In this paper, a new three-dimensional face recognition technique is proposed. We apply a dual camera module to extract two images of simulated human eyes. The active appearance model is applied to find facial feature points. The disparity between the images of the left eye and the right eye is calculated and used to reconstruct a 3D face model. Twenty-four geometric features are extracted from the 3D face models and a multi-class support vector machine is then applied to face recognition. The experimental results show that the proposed method can reduce the influence of facial expressions and the risk of photo fraud.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}