2012 International Conference on Information Security and Intelligent Control最新文献

筛选
英文 中文
Multimedia support framework for distributed web-based collaborative editing 分布式网络协同编辑的多媒体支持框架
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449695
Yung-Feng Lu, Po-Hung Lin, Shih-Chun Chou, Rong-Sheng Wang
{"title":"Multimedia support framework for distributed web-based collaborative editing","authors":"Yung-Feng Lu, Po-Hung Lin, Shih-Chun Chou, Rong-Sheng Wang","doi":"10.1109/ISIC.2012.6449695","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449695","url":null,"abstract":"Web-based applications offer a range of the benefits over traditional desktop applications; they are good for wide accessibility, platform independence, rich user experience, dynamic content, high scalability easy-to-share, and easy-to-use. This paper proposes a web-based framework of multimedia support for collaborative editing. A transmission protocol that integrates OT with the consideration of transmission for large media file was also proposed. The proposed mechanism has advantages for integration of existed OT-based collaborative schemes. The storage requirement of collaborative systems is also reduced. We believe the proposed mechanism is usable for web-based collaborative applications.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power optimal partitioning for dynamically reconfigurable FPGA 动态可重构FPGA电源最优分区
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449702
Tzu-Chiang Tai
{"title":"Power optimal partitioning for dynamically reconfigurable FPGA","authors":"Tzu-Chiang Tai","doi":"10.1109/ISIC.2012.6449702","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449702","url":null,"abstract":"To implement a circuit system on dynamically reconfigurable FPGAs (DRFPGAs), we must partition it into sub-circuits and execute each sub-circuit in order. Traditional partitioning methods focus on optimizing the number of communication buffers. In this paper, we study the partitioning problem targeting at power optimization for the DRFPGAs. We analyze the power consumption caused by the communication buffers in the partitioning. Then we transform a circuit system into the corresponding flow network and apply a flow-based algorithm to find the partitioning of optimal power consumption. Experimental results demonstrate the effectiveness of our method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A simple two steps algorithm for face recongition 一个简单的两步人脸识别算法
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449698
Ming Zhao, Hu Jie
{"title":"A simple two steps algorithm for face recongition","authors":"Ming Zhao, Hu Jie","doi":"10.1109/ISIC.2012.6449698","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449698","url":null,"abstract":"In this paper, we propose a very simple face recognition method. This method first exploits a linear combination of all the training samples to express the test sample. Then it evaluates the capability of each class in expressing the test sample and assigns the test sample to the class that has the strongest capability. Using the expression result, the proposed method can classify the testing sample with a high accuracy. though the proposed method exploits only one training sample per class to perform classification, it might obtain a better performance than the nearest feature space (NFS) method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Degenerative disc segmentation and diagnosis technology using important features from MRI of spine in images 利用脊柱MRI图像中的重要特征进行退变椎间盘分割与诊断技术
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449738
Ming-Chi Wu, Cheng-An Fang
{"title":"Degenerative disc segmentation and diagnosis technology using important features from MRI of spine in images","authors":"Ming-Chi Wu, Cheng-An Fang","doi":"10.1109/ISIC.2012.6449738","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449738","url":null,"abstract":"This paper focuses on the medical image segmentation techniques used in the study of spinal diseases. Medical reports have shown an increasing concern of the public on spinal diseases caused by disc degeneration. This paper presents an accurate and automated method to detect the abnormal disc. This method uses two standard models in conjunction with the threshold value to accurately identify the cartilage. Then we smooth out the images via morphological methods and find out the average height of the cartilage before we judge if a certain cartilages are lower in height than the normal range. Finally, we carefully label the degenerated parts of the disc. In comparison with the professional physician's manual segmentation, our image segmentation shows high accuracy, with the highest rate reaching 99.88.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123499206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An EPQ model with two levels of trade credit policy under supplier credits linked to ordering quantity based on the triangular fuzzy numbers 基于三角模糊数的供应商信用与订货量挂钩的两级贸易信用政策EPQ模型
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449773
Liang-Ho Chen, Chih-te Yang, T. Huang, Shui-Ching Chang
{"title":"An EPQ model with two levels of trade credit policy under supplier credits linked to ordering quantity based on the triangular fuzzy numbers","authors":"Liang-Ho Chen, Chih-te Yang, T. Huang, Shui-Ching Chang","doi":"10.1109/ISIC.2012.6449773","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449773","url":null,"abstract":"In real world, there are many uncertain conditions which cannot be absolutely pre-determined or controlled by the decision maker. Then, by the empirical experience in the market behavior, there are no fixed carrying cost rate, interest paid rate and interest earned rate. In this paper, we will extend Chen et al. [1] model with fuzzification in the carrying cost rate, interest paid rate and interest earned rate, simultaneously, based on the triangular fuzzy numbers to fit the real world. Then, in our new fuzzy model, we will discuss some conditions or theorems to find the optimal solution for the total variable cost per unit time in fuzzy sense. Moreover, we will take some examples to illustrate our proposed model.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A statistic approach for photo quality assessment 一种用于照片质量评价的统计方法
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449719
L. Lo, Ju-Chin Chen
{"title":"A statistic approach for photo quality assessment","authors":"L. Lo, Ju-Chin Chen","doi":"10.1109/ISIC.2012.6449719","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449719","url":null,"abstract":"This study proposes a photo quality assessment based on the spatial relations of image patches. In order to investigate the components of high-quality photos, the image is decomposed into patches based on the color information. Then the color moment and histogram of oriented gradients (HOG) are extracted for the feature representation. Because the diverse types of photos, the photo with the segmented patches is assigned to a subtopic before further modeling. Different from the prior researches which model the spatial relations of image patches obtained from high quality photo, in our work the negative models are learned from the low quality photos as well to provide more discriminate assessment results. Note that the spatial information of location and size of image patch is modeled by Gaussian mixture model (GMM), and the likelihood probabilities in accordance with the positive and negative context models are integrated as the assessment score. The experimental results demonstrates that the usage of the low-quality photos can provide the significant improvement and the proposed system have the promising potential for the photo quality assessment.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automatic counting of packaged wafer die based on machine vision 基于机器视觉的封装晶圆片模具自动计数
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449759
Hsuan T. Chang, R. Pan
{"title":"Automatic counting of packaged wafer die based on machine vision","authors":"Hsuan T. Chang, R. Pan","doi":"10.1109/ISIC.2012.6449759","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449759","url":null,"abstract":"This paper presents a robust method to automatically determine the number of packaged dies in the residual wafer image, in which most dies have been removed and packaged. We propose the die segmentation region detection algorithm based on vertically and horizontally cumulative histograms and die detection algorithm based on YCbCr color space. The abnormal cases of fractional dies in the wafer boundary and dropped dies during packaging are considered in the proposed method as well. In the experimental results, the proposed method achieves 100% accuracy in counting the number of packaged dies in the ten test cases.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A commutative encryption scheme based on ElGamal encryption 一种基于ElGamal加密的交换加密方案
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449730
Kaibin Huang, R. Tso
{"title":"A commutative encryption scheme based on ElGamal encryption","authors":"Kaibin Huang, R. Tso","doi":"10.1109/ISIC.2012.6449730","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449730","url":null,"abstract":"A commutative encryption is a kind of an encryption system that enables a plaintext to be encrypted more than once using different users' public keys. In this system, decryption is not required before the encryption/re-encryption processes. Moreover, the resulted ciphertext can be decrypted by the designated decrypters without considering the order of public keys used in the encryption/re-encryption processes. In other words, the order of keys used in encryption and in decryption do not affect the computational result. Commutative encryption scheme is found useful in many real life applications such as in secret sharing, database integration and etc. However, regardless of its usefulness, few paper demonstrates how to construct such kind of a commutative encryption. In this paper, we propose a new commutative encryption scheme based on the ElGamel encryption and provide the security proof in the random oracle model.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An intelligent fuzzy PID controller for a reconfigurable machine tool 一种可重构机床的智能模糊PID控制器
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449717
S. M. Ndzabukelwayo, K. Mpofu, N. Tlale
{"title":"An intelligent fuzzy PID controller for a reconfigurable machine tool","authors":"S. M. Ndzabukelwayo, K. Mpofu, N. Tlale","doi":"10.1109/ISIC.2012.6449717","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449717","url":null,"abstract":"This paper gives an analysis of how intelligent control can be used to provide a viable solution in the development of a control system for a reconfigurable machine tool (RMT). Firstly, the principle of RMT is briefly explained and the challenges that hinder their development are inspected in order to bring forward the gap to be addressed by this paper. The objective in this paper is to look at the work that has been done by other scholars in the field of control and then integrating the knowledge from these in developing an open architecture (OA) based intelligent control system suitable for the RMT. The key focus areas in this paper are the analysis of commonly used controllers in industrial applications and the benefits of using open architecture control (OAC). Lastly a proposal on how the fuzzy-PID controller can be used in an OAC system for the RMT is given.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128788978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application of active appearance model for dual-camera face recognition 主动外观模型在双摄像头人脸识别中的应用
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449774
Chuan-Yu Chang, Cyun-Siang Huang
{"title":"Application of active appearance model for dual-camera face recognition","authors":"Chuan-Yu Chang, Cyun-Siang Huang","doi":"10.1109/ISIC.2012.6449774","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449774","url":null,"abstract":"Face recognition is a very important topic in the field of pattern recognition. Traditional two-dimensional face recognition technologies using images taken by a single camera are easily influenced by expressions and poses resulting in low recognition accuracy. In this paper, a new three-dimensional face recognition technique is proposed. We apply a dual camera module to extract two images of simulated human eyes. The active appearance model is applied to find facial feature points. The disparity between the images of the left eye and the right eye is calculated and used to reconstruct a 3D face model. Twenty-four geometric features are extracted from the 3D face models and a multi-class support vector machine is then applied to face recognition. The experimental results show that the proposed method can reduce the influence of facial expressions and the risk of photo fraud.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信