By Topic

Hybrid Information Technology, 2006. ICHIT '06. International Conference on

Date 9-11 Nov. 2006

Go

Filter Results

Displaying Results 1 - 25 of 128
  • 2006 International Conference on Hybrid Information Technology - Cover

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • 2006 International Conference on Hybrid Information Technology - Title Page

    Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • 2006 International Conference on Hybrid Information Technology - Copyright

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • 2006 International Conference on Hybrid Information Technology - Table of contents

    Page(s): v - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Welcome from the General Chairs

    Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB)  
    Freely Available from IEEE
  • Welcome from the Program Chairs

    Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • Conference organizers

    Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • IWSH 2006 International Program Committee

    Page(s): xx
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • AMTA 2006 International Program Committee

    Page(s): xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • Action Representation for Natural Language Interfaces to Agent Systems

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB) |  | HTML iconHTML  

    In this paper, we outline a framework for the development of natural language interfaces to agent systems, with a focus on action representation. The architecture comprises a natural language parser and case frame based analysis for semantic representation for the linguistic content of the input. The knowledge base, used as core instance of the mapping and interpretation process, features a representation of actions and related objects in a conceptual hierarchy, which is suited to provide a connection to the artificial agent??s repertoire of actions. The framework thus features representations of actions, specifically designed to link linguistic inputs of the human user to the action set of an artificial agent. The framework has been employed in the development of various agent systems and their natural language interfaces, including simulated household robots, an interior design system, a travel planner, a cook, and a remote controlled toy car.. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3-D Display of the Wall Motion for Regional Cardiac Muscle from Ultrasonic B-mode Image -Wall Motion of Thickness, Thickening Rate using Contour of Inner and Outer Wall-

    Page(s): 6 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1020 KB) |  | HTML iconHTML  

    We have developed extracting the inner and outer walls of the cardiac muscle from a set of ultrasonic B-mode images. In this paper, we propose a new 3-D (radius, angle and time) display method of the motion function on the inner wall to evaluate the motion of the myocardium objectively. Its method displays the time transition of a cardiac wall during one cardiac cycle, and it is colored the thickness or the thickening rate of the myocardium on the surface of the 3-D object. The inner and outer walls of the heart are extracted from a set of ultrasonic B-mode Images. We implemented 3-D display system using C language and DirectX 3D in MS-Windows. We calculate the position of the points for 3-D display from the contour lines of the cardiac muscle by the cubic spline curve. The curve connects smoothly between one point and the other one point. And we found the thickness and thickening rate by using the contour lines of the cardiac muscle. We define the thickness by the shortest distance between the outer wall and the inner wall, and we calculate the thickness rate from the obtained thickness. We add the rotation view of the 3-D object to see the every side of myocardium. We confirmed the usefulness of our 3-D display. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color Image Segmentation that Preserves Boundary by using Mean Shift Algorithm and Region Merging Method

    Page(s): 13 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB) |  | HTML iconHTML  

    Mean shift algorithm is a nonparametric statistical method for seeking the main modes of a point sample distribution. This process achieves a high quality, discontinuity preserving spatial filtering. For the segmentation task, the convergence points sufficiently close in the joint domain are fused to obtain the homogeneous regions in the image. However, a color image is segmented differently according to the inputted spatial parameter or range parameter and the image is broken into many small regions in case of the small parameter. In this paper, to improve this demerit, we propose the method that groups similar regions using region merging method for oversegmented images. The proposed method converts an over-segmented image in RGB color space into in HSI color space and merges similar regions by hue information. Here, to preserve edge information, the proposed method use by region merging constraints to decide whether regions is merged or not. After then, we merge the regions in RGB color space for nonprocessed regions in HSI color space. Experimental results show the proposed method is superior to conventional methods in region's segmentation results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of WIPI Runtime Engine

    Page(s): 19 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    Wireless Internet Platform for Interoperability (WIPI) is a standard wireless Internet platform whose mounting is required by law for all terminals in Korea starting April 2005. We designed and implemented a WIPI runtime engine to support Clet, a WIPI-C application program. The implementation method of a dynamic linker and a loader, two core technologies of the runtime engine, was also described. The proposed runtime engine passed the Platform Certificate Tool (PCT) test, WIPI specifications?? certification tool that guarantees the interoperability of the engine and ensures that it functions properly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Cooperative Cache Replacement Policy for Mobile P2P Environments

    Page(s): 24 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    Recent researches in cooperative caching systems combined with P2P (peer-to-peer) web caching for mobile environments have been made quite actively owing to the advances in mobile technology. The hybrid cooperative caching technology in mobile environments enables P2P systems to achieve improved caching performance by utilizing the caches in neighbor peers. However, there is an important limitation of mobile caching system that the cache space of a mobile device is generally restricted. In this paper, we propose an effective cooperative cache replacement policy for mobile P2P environments that exploiting the sizes of objects in a system. The proposed replacement policy stores smaller objects in the local cache of each peer and stores larger objects in the local cache of its "idle" neighbor peer who has the least activity among its peers. The activity of a peer is determined by the request frequency and the latest request time. We compared the proposed replacement policy with the existing replacement policies for various mobile environments. The experiment results show that the proposed replacement policy achieves better performance than the existing replacement policies in terms of the hit ratio and the byte hit ratio. Especially when the cache size is reasonably small, the proposed replacement policy shows outstanding performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Susceptibility to Chronic Hepatitis using Single Nucleotide Polymorphism Data and Support Vector Machine

    Page(s): 31 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (129 KB) |  | HTML iconHTML  

    SVM(Support VectorMachine) is used to predict the susceptibility to Chronic Hepatitis from SNP(single nucleotide polymorphism) data. SVM is trained to predict the susceptibility using SNPs. SVM is able to distinguish Hepatitis between normal and Chronic Hepatitis with an accuracy of 75.61% which are much better than random guessing. With more SNPs and other features, SVM prediction using SNP data can be a potential tool for predicting susceptibility to Chronic Hepatitis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Time-Frequency Analysis Method for Mechanical Failure Detection

    Page(s): 36 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1055 KB) |  | HTML iconHTML  

    This research will attempt to analyze the effectiveness of the Empirical Mode Decomposition (EMD) in diagnostics of gearboxes operating under non-stationary rotational speed. For this, a simple software program for signal processing and extraction of mechanical failure detection was developed and tested. The primary aim is to reveal the nonlinear behavior of the system by using time frequency methods as an alternative to Fourier analysis methodology. Both simulated and experimental response data are analyzed by applying EMD and time-frequency analysis. The following examples demonstrate the improvements in the detection of gear faults. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Analysis of Hsieh-Sun's Deniable Authentication Protocol

    Page(s): 45 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (168 KB) |  | HTML iconHTML  

    In 2004, Hsieh and Sun showed that Fan et al.'s deniable protocol does not posse the denial property; that is, a cheating receiver can prove the source of the received message to a third party. Furthermore, they also presented a modification of Fan et al.'s protocol to overcome the security flaw. However, the current paper points out an error in Hsieh-Sun's cryptanalysis on Fan et al.'s deniable authentication protocol and demonstrate that Hsieh-Sun's improved deniable authentication protocol still does not posse the deniable property and is susceptible to a malicious receiver's impersonation attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Depth-Oriented Decomposition Indexing for Searching Structured Documents Using Thesaurus

    Page(s): 49 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1941 KB) |  | HTML iconHTML  

    The Purpose of this study was to generate structural documents to improve search performance of an information search system by using a thesaurus, a related-information b/t words for the information search, and to study a search technique for searching structural documents. In order to accomplish these purpose, we proposed using the DODI(Depth-Oriented Decomposition Index) technique. This index technique, using a thesaurus, was able to search related information through a search algorithm, and was therefore able to efficiently search for information. In addition, we established a structural save system to save the structural document generated by this index technique, in a database through OpenXML, and to generate an XML reformatted document, by using ForXML method. Index techniques to use thesaurus can use effectively to study is abbreviated word in studying of medical terminologies, original word, Chinese character borrowed word, purity Hangul terminology, actuality pronunciation hearing, anatomy that use by this research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech/Music Discrimination Based on Spectral Peak Analysis and Multi-layer Perceptron

    Page(s): 56 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    This study presents a new Speech/Music discrimination method based on spectral peak feature and Multilayer Perceptron. The focus was on feature extraction that reflects spectral peak duration characteristics and high performance using small number of train dataset. Spectral peak features were extracted from audio spectral peak tracks and the feature was normalized by length of segment. Then, we grouping the frequency channel to reflect the spectral distribution. For train, only 25 seconds of speech (Korean) and 50 seconds of music are used. This method was evaluated on speech and music for 24,258 seconds of audio data. An average accuracy was 96.58% for speech and 91.82% for music. The results of this experiment found that proposed method was suitable for Speech/Music discrimination. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heart Motion Evaluation Indexes Using Ultrasonic RF Signal

    Page(s): 62 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (497 KB) |  | HTML iconHTML  

    Our research group has developed the tracking method of regional myocardium from ultrasonic radio frequency (RF) signal. The tracking method employs a hierarchical correlation method. In addition, we regarded the correlation coefficient as the confidence coefficient. If it is not high, the tracking position is corrected by neighbor points. The tracking method can detect the movement of myocardium very well if the RF signal is clear. In this research, we investigate the moving distance based on the tracking position that includes less error. As a result, the contributions of the distance are different between normal example and disorder example. We propose three indexes defined by the amounts of statistics for the evaluation of a heart motion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 Secure Multicast Conferencing

    Page(s): 68 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (683 KB) |  | HTML iconHTML  

    This paper describes the implementation of a system to provide IPv6 secure multicast conferencing, to prove that it can be developed with existing technologies. In these IPv6 secure multicast conferencing systems, there is a set of conferencing clients that can send and receive audio/video data, and a GCKS (Group Controller Key Server) that can manage multicast group. The main problem in such a system is the management and distribution of the keying data including rekeying when a user leaves the multicast group. Standardization of structure and keying data exchange for secure multicast by IETF Multicast Security Working Group (MSEC). We propose a system that integrates different existing technologies into a Windows-based environment. Audio and video data are transmitted using RTP (Real Time Protocol) through multicast protocols. Also we evaluate performance of IPv6 secure multicast application and conclude adding security in application does not damage a real-time characteristic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Authenticated Key Exchange protocol based on EC using Signcryption Scheme

    Page(s): 74 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (235 KB) |  | HTML iconHTML  

    A Signcryption proposed by Yuliang Zheng in 1997 is a hybrid public key primitive that combines a digital signature and an encryption. It provides more efficient method than a straightforward composition of a signature scheme with an encryption scheme. In a mobile communication environment, the authenticated key agreement protocol should be designed to have lower computational complexity and memory requirements. Therefore, in this paper, our proposed method that efficient authenticated key exchange protocol using Signcryption scheme and based on EC using Signcryption in mobile and wireless network. And we analyze computational cost and security requirements of proposed protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Ad Hoc Routing Using Rough Set Theory

    Page(s): 80 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (163 KB) |  | HTML iconHTML  

    Mobile ad hoc networks are formed dynamically without any infrastructure and each node is responsible for routing information among them. Rough set theory is a mathematical tool to deal with vagueness and uncertainty. In this paper a routing protocol for mobile adhoc networks that uses rough set theory is proposed. The performance of the protocol is compared with that of an existing routing protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Brightness Information in Satellite Image Data Search using Distributed Genetic Algorithm

    Page(s): 84 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (583 KB) |  | HTML iconHTML  

    Tokyo University of Information Sciences maintains and distributes MODIS (Moderate Resolution Imaging Spectroradiometer) satellite data as part of the research output for Frontier project. An intelligent image search system is being developed as part of the project, in order to retrieve requested images such as matching images patterns or forest and field fires extraction. The intelligent image search system applies genetic algorithm (GA) in the search algorithm. When searching for a target image area within the MODIS image database, it is possible that the search algorithm cannot match the optimal location when the brightness of the search image data and MODIS data image are very different. In order to solve this problem, we extended the search algorithm by implementing brightness information in the GA chromosome, so that brightness is adjusted within the GA image search. Further, we implemented the image search as distributed genetic algorithm search over a PC cluster network, in order to increase the search speed within the satellite image database. We tested the proposed system and verified the effectiveness of distributed genetic algorithm for the distributed MODIS satellite database search process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.