By Topic

2006 International Conference on Hybrid Information Technology

9-11 Nov. 2006

Go

Filter Results

Displaying Results 1 - 25 of 128
  • 2006 International Conference on Hybrid Information Technology - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • 2006 International Conference on Hybrid Information Technology - Title Page

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • 2006 International Conference on Hybrid Information Technology - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 2006 International Conference on Hybrid Information Technology - Table of contents

    Publication Year: 2006, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Welcome from the General Chairs

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (33 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Program Chairs

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • IWSH 2006 International Program Committee

    Publication Year: 2006, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • AMTA 2006 International Program Committee

    Publication Year: 2006, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Action Representation for Natural Language Interfaces to Agent Systems

    Publication Year: 2006, Page(s):1 - 5
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    In this paper, we outline a framework for the development of natural language interfaces to agent systems, with a focus on action representation. The architecture comprises a natural language parser and case frame based analysis for semantic representation for the linguistic content of the input. The knowledge base, used as core instance of the mapping and interpretation process, features a repres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3-D Display of the Wall Motion for Regional Cardiac Muscle from Ultrasonic B-mode Image -Wall Motion of Thickness, Thickening Rate using Contour of Inner and Outer Wall-

    Publication Year: 2006, Page(s):6 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1020 KB) | HTML iconHTML

    We have developed extracting the inner and outer walls of the cardiac muscle from a set of ultrasonic B-mode images. In this paper, we propose a new 3-D (radius, angle and time) display method of the motion function on the inner wall to evaluate the motion of the myocardium objectively. Its method displays the time transition of a cardiac wall during one cardiac cycle, and it is colored the thickn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color Image Segmentation that Preserves Boundary by using Mean Shift Algorithm and Region Merging Method

    Publication Year: 2006, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Mean shift algorithm is a nonparametric statistical method for seeking the main modes of a point sample distribution. This process achieves a high quality, discontinuity preserving spatial filtering. For the segmentation task, the convergence points sufficiently close in the joint domain are fused to obtain the homogeneous regions in the image. However, a color image is segmented differently accor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of WIPI Runtime Engine

    Publication Year: 2006, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Wireless Internet Platform for Interoperability (WIPI) is a standard wireless Internet platform whose mounting is required by law for all terminals in Korea starting April 2005. We designed and implemented a WIPI runtime engine to support Clet, a WIPI-C application program. The implementation method of a dynamic linker and a loader, two core technologies of the runtime engine, was also described. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Cooperative Cache Replacement Policy for Mobile P2P Environments

    Publication Year: 2006, Page(s):24 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Recent researches in cooperative caching systems combined with P2P (peer-to-peer) web caching for mobile environments have been made quite actively owing to the advances in mobile technology. The hybrid cooperative caching technology in mobile environments enables P2P systems to achieve improved caching performance by utilizing the caches in neighbor peers. However, there is an important limitatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Susceptibility to Chronic Hepatitis using Single Nucleotide Polymorphism Data and Support Vector Machine

    Publication Year: 2006, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    SVM(Support VectorMachine) is used to predict the susceptibility to Chronic Hepatitis from SNP(single nucleotide polymorphism) data. SVM is trained to predict the susceptibility using SNPs. SVM is able to distinguish Hepatitis between normal and Chronic Hepatitis with an accuracy of 75.61% which are much better than random guessing. With more SNPs and other features, SVM prediction using SNP data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Time-Frequency Analysis Method for Mechanical Failure Detection

    Publication Year: 2006, Page(s):36 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1055 KB) | HTML iconHTML

    This research will attempt to analyze the effectiveness of the Empirical Mode Decomposition (EMD) in diagnostics of gearboxes operating under non-stationary rotational speed. For this, a simple software program for signal processing and extraction of mechanical failure detection was developed and tested. The primary aim is to reveal the nonlinear behavior of the system by using time frequency meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Analysis of Hsieh-Sun's Deniable Authentication Protocol

    Publication Year: 2006, Page(s):45 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    In 2004, Hsieh and Sun showed that Fan et al.'s deniable protocol does not posse the denial property; that is, a cheating receiver can prove the source of the received message to a third party. Furthermore, they also presented a modification of Fan et al.'s protocol to overcome the security flaw. However, the current paper points out an error in Hsieh-Sun's cryptanalysis on Fan et al.'s deniable a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Depth-Oriented Decomposition Indexing for Searching Structured Documents Using Thesaurus

    Publication Year: 2006, Page(s):49 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1941 KB) | HTML iconHTML

    The Purpose of this study was to generate structural documents to improve search performance of an information search system by using a thesaurus, a related-information b/t words for the information search, and to study a search technique for searching structural documents. In order to accomplish these purpose, we proposed using the DODI(Depth-Oriented Decomposition Index) technique. This index te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech/Music Discrimination Based on Spectral Peak Analysis and Multi-layer Perceptron

    Publication Year: 2006, Page(s):56 - 61
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This study presents a new Speech/Music discrimination method based on spectral peak feature and Multilayer Perceptron. The focus was on feature extraction that reflects spectral peak duration characteristics and high performance using small number of train dataset. Spectral peak features were extracted from audio spectral peak tracks and the feature was normalized by length of segment. Then, we gr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heart Motion Evaluation Indexes Using Ultrasonic RF Signal

    Publication Year: 2006, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Our research group has developed the tracking method of regional myocardium from ultrasonic radio frequency (RF) signal. The tracking method employs a hierarchical correlation method. In addition, we regarded the correlation coefficient as the confidence coefficient. If it is not high, the tracking position is corrected by neighbor points. The tracking method can detect the movement of myocardium ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 Secure Multicast Conferencing

    Publication Year: 2006, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB) | HTML iconHTML

    This paper describes the implementation of a system to provide IPv6 secure multicast conferencing, to prove that it can be developed with existing technologies. In these IPv6 secure multicast conferencing systems, there is a set of conferencing clients that can send and receive audio/video data, and a GCKS (Group Controller Key Server) that can manage multicast group. The main problem in such a sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Authenticated Key Exchange protocol based on EC using Signcryption Scheme

    Publication Year: 2006, Page(s):74 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    A Signcryption proposed by Yuliang Zheng in 1997 is a hybrid public key primitive that combines a digital signature and an encryption. It provides more efficient method than a straightforward composition of a signature scheme with an encryption scheme. In a mobile communication environment, the authenticated key agreement protocol should be designed to have lower computational complexity and memor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Ad Hoc Routing Using Rough Set Theory

    Publication Year: 2006, Page(s):80 - 83
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Mobile ad hoc networks are formed dynamically without any infrastructure and each node is responsible for routing information among them. Rough set theory is a mathematical tool to deal with vagueness and uncertainty. In this paper a routing protocol for mobile adhoc networks that uses rough set theory is proposed. The performance of the protocol is compared with that of an existing routing protoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Brightness Information in Satellite Image Data Search using Distributed Genetic Algorithm

    Publication Year: 2006, Page(s):84 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    Tokyo University of Information Sciences maintains and distributes MODIS (Moderate Resolution Imaging Spectroradiometer) satellite data as part of the research output for Frontier project. An intelligent image search system is being developed as part of the project, in order to retrieve requested images such as matching images patterns or forest and field fires extraction. The intelligent image se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.