2012 International Conference on Information Security and Intelligent Control最新文献

筛选
英文 中文
Automated assessment of breast cancer lymphatic infiltration by H&E image H&E影像对乳腺癌淋巴浸润的自动评估
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449741
Yung-Lung Kuo, C. Ko, Ming-Ji Lee
{"title":"Automated assessment of breast cancer lymphatic infiltration by H&E image","authors":"Yung-Lung Kuo, C. Ko, Ming-Ji Lee","doi":"10.1109/ISIC.2012.6449741","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449741","url":null,"abstract":"The occurrence of invasive breast cancer and lymphatic infiltration is highly relative. Although medical screening and imaging technology has been considerable progress, there are still many patients with metastasis phenomenon of axillary lymph gland at the first inspection of breast cancer. In order to avoid breast cancer cells transferring by lymphatic system, physicians recommend breast cancer patients lymphadenectomy. However, it is estimated that about 70% in early breast cancer patients undergoing unnecessary lymphadenectomy. At present, lymphatic infiltration examination is performed via microscopes and concludes the results by physician experience and expertise. It is time consuming, labor intensive, and prone to inter-observer discrepancy. Therefore, in this article, we present a multistage model of automatic system of lymphatic infiltration assessment. And the experimental results not only prove the agreement of the lymphatic infiltration between the proposed scheme and expert pathologist but also confirmed that this system can greatly reduce the clinician's burden.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a Context Aware Exercise System paper 上下文感知练习系统的设计论文
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449713
Wen-Fong Wang, Wei-Jing Liou
{"title":"Design of a Context Aware Exercise System paper","authors":"Wen-Fong Wang, Wei-Jing Liou","doi":"10.1109/ISIC.2012.6449713","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449713","url":null,"abstract":"Recently, context aware has become a popular topic in ubiquitous computing. Most context-aware research combines embedded system devices with context-aware systems to realize a ubiquitous environment. This study proposes a Daily Exercise Context Aware Ontology Model (DEOCAM) and builds a Context Aware Exercise System (CAES), which is free of space limitation. CAES is composed of three parts: Personal Exercise Management System (PEMS), Context Aware System (CAS) and Context Sharing Network Platform (CSNP). The purpose of the system is to recognize the daily activities of users, which is helpful in exercise monitoring for health management. Our experimental results show that the system is effective and feasible for daily activity contexts recognition and moving distance computation.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low-complexity data-fusion algorithm based on adaptive weighting for location estimation 一种基于自适应加权的低复杂度数据融合算法
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449764
Yih-Shyh Chiou, F. Tsai, Sheng-Cheng Yeh
{"title":"A low-complexity data-fusion algorithm based on adaptive weighting for location estimation","authors":"Yih-Shyh Chiou, F. Tsai, Sheng-Cheng Yeh","doi":"10.1109/ISIC.2012.6449764","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449764","url":null,"abstract":"In this paper, a tracking scheme based on adaptive weighted technique is proposed to reduce the computational load of traditional data-fusion algorithm for heterogeneous measurements. For the location-estimation technique with the data fusion of radio-based ranging measurement and speed-based sensing measurement, the proposed tracking scheme based on the Bayesian approach is handled by a state space model; a weighted technique with the reliability of message passing is based on the error propagation law. As compared with a traditional data-fusion algorithm based on a Kalman filtering approach, the proposed scheme that combines radio ranging measurement with speed sensing measurement for data fusion has much lower computational complexity with acceptable location accuracy.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133764722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A simple testing structure for analog circuits 模拟电路的简单测试结构
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449699
Hsin-Wen Ting
{"title":"A simple testing structure for analog circuits","authors":"Hsin-Wen Ting","doi":"10.1109/ISIC.2012.6449699","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449699","url":null,"abstract":"This paper presents a simple current-mode testing structure for analog circuit. The proposed structure is designed by the concept of the switch-current (SI) circuit. The proposed structure moderates the rigorous matching requirement and nonidealities induced by the conventional scan based testing structure. The proposed analog testing structure is divided into two operating modes that are self evaluation mode and built-in test mode. The loading phase and reading phase are both performed to complete the individual operating modes. As a result, the proposed testing structure itself can be evaluated in prior to the actual testing. This structure is digitally controlled and can be configured to accomplish a wider range of analog signal or verify more analog device under test (DUT). Simulation results also demonstrate the effectiveness of the proposed analog testing structure.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133368595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On “controlled quantum teleportation and secure direct communication” “受控量子隐形传态与安全直接通信”研究
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449727
Shih-Hung Kao, T. Hwang
{"title":"On “controlled quantum teleportation and secure direct communication”","authors":"Shih-Hung Kao, T. Hwang","doi":"10.1109/ISIC.2012.6449727","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449727","url":null,"abstract":"Based on the controlled quantum teleportation protocol, a controlled quantum secure direct communication scheme (CQSDC) protocol, which transmits a one-bit message via the Greenberger-Horne-Zeilinger entangled state, is presented by Gao et al. in [Chinese Phys. Vol. 14 (2005), No. 5, p. 893]. However, through this article we want to enlighten of the fact that, due to a flaw in the control function, receiver can reveal the whole secret message without help from the controller.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quadratic permutation polynomial interleaver for LTE turbo coding LTE turbo编码的二次置换多项式交织器
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449769
Ching-Lung Chi, Chih-Hsiao Kuo
{"title":"Quadratic permutation polynomial interleaver for LTE turbo coding","authors":"Ching-Lung Chi, Chih-Hsiao Kuo","doi":"10.1109/ISIC.2012.6449769","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449769","url":null,"abstract":"Interleaver is an important component of turbo code and has a strong impact on its error correcting performance. Quadratic permutation polynomial (QPP) interleaver is a contention-free interleaver which is suitable for parallel turbo decoder implementation. To improve the performance of LTE QPP interleaver, largest-spread and maximum-spread QPP interleavers are analyzed for Long Term Evolution (LTE) turbo codes in this paper. Compared with LTE QPP interleaver, those algorithms have low computing complexity and better performances from simulation results.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123264903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An improved classifier based on nearest feature line 一种基于最近特征线的改进分类器
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449771
Youfu Du, Ming Zhao, Q. Feng
{"title":"An improved classifier based on nearest feature line","authors":"Youfu Du, Ming Zhao, Q. Feng","doi":"10.1109/ISIC.2012.6449771","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449771","url":null,"abstract":"An improved classifier based on nearest feature line, is proposed in this paper. The new classifier is called as limited nearest feature line (LNFL). The purpose of LNFL is to improve the miss-classification of nearest feature line when the prototypes in NFL are far away from the query sample. A lot of experiments are executed on ORL and AR face database. And the detailed comparison result is given to show that LNFL is better than nearest feature line and nearest neighbor.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123670511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual attention guided images abstraction using sparse coding 利用稀疏编码的视觉注意力引导图像抽象
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449749
Duan-Yu Chen, T. Chang
{"title":"Visual attention guided images abstraction using sparse coding","authors":"Duan-Yu Chen, T. Chang","doi":"10.1109/ISIC.2012.6449749","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449749","url":null,"abstract":"Given the increasing number of mobile platforms, a key technical challenge is how to provide efficient image processing application on resource-limited mobile devices. This paper proposes a novel technique for mobile image abstraction on mobile platform. In order to reduce the computation complexity, the image abstraction process is conducted on a cloud computing system. In this technique, captured images are analyzed to detect visual salient area, which is then provided for adaptive detail preservation of abstraction. To further reduce the image size for efficient transmission between mobile device and cloud computing system while maintaining the visual quality of abstracted image, the derived algorithm regards the salient regions as the dictionary in sparse representation, and selects the salient regions that minimize the residual output error iteratively, thus the resulting regions have a direct correspondence to the performance requirements of the given problem. Experimental results obtained using extensive datasets captured under uncontrolled conditions show the efficacy of the proposed system for conducting image abstraction on mobile platform using sparse representation.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117044677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Photo-consistent 3D model deformation for novel view image synthesis 用于新型视图图像合成的与照片一致的三维模型变形
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449758
Meng-Hsuan Chia, Chien-Hsing He, H. Lin
{"title":"Photo-consistent 3D model deformation for novel view image synthesis","authors":"Meng-Hsuan Chia, Chien-Hsing He, H. Lin","doi":"10.1109/ISIC.2012.6449758","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449758","url":null,"abstract":"In this paper, a system is designed for improving the quality of novel view synthesis. To make the virtual view synthesis look better, the basic idea is to perform model refinement with important camera information of the novel view. In this system, we first use the reconstructed visual hull from shape from silhouette and then refine this 3D model based on the view dependency. The 3D points of the model are classified into the outline points and the non-outline points according to the virtual viewpoint. To refine the model, both of the outline points and the non-outline points are used to move the 3D points iteratively by minimizing energy function until convergence. The key energy is the photo-consistency energy with additional smoothness energy and contour/visual hull energy. The latter two energy terms can avoid the local minimum when calculating the photo-consistency energy. Finally, we render the novel view image using view-dependent image synthesis by blending the pixel values from reference cameras near the virtual camera.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A greedy approach for floopanning mass modules 一种贪婪的方法来打开质量模块
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449696
Jyh-Perng Fang, Yang-Lang Chang, Jong Yu Jen, Tai-Long Wang
{"title":"A greedy approach for floopanning mass modules","authors":"Jyh-Perng Fang, Yang-Lang Chang, Jong Yu Jen, Tai-Long Wang","doi":"10.1109/ISIC.2012.6449696","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449696","url":null,"abstract":"Because of its efficiency in evaluating area cost and perturbation, slicing structure had been widely used to represent a floorplan in a VLSI decades ago. Due to the possibility of relatively higher dead space, slicing structure is almost replaced by non-slicing structure to represent a floorplan or placement now. However, with the fast growing of chip complexity, the amount of modules/transistors in a chip lengthens the computation time for flooplanning dramatically. Besides, since the dimension of bounding box should be fixed, the constraint of dead space in a floorplan is not as tight as we thought before. In other words, it is possible that slicing structure is a good representation for floorpan with mass modules. For a slicing structure, we propose a greedy approach with a relaxed Polish expression and implement our approach based on simulated annealing algorithm. The experimental results show that the proposed approach works efficiently and the result is competent.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信