By Topic

Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on

Date 18-20 June 2008

Filter Results

Displaying Results 1 - 25 of 604
  • LiNeS: Virtual Network Environment for Network Administrator Education

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1132 KB) |  | HTML iconHTML  

    User-mode Linux (UML) is virtual environment software being developed for server integration, testing buggy software, and so on. However, we have been applying UML to network administrator education, since it has functions for comprising networks. The Linux Network Simulator (LiNeS) is a system that provides an environment for various network training based on virtual networks realized by UML on one PC. Since LiNeS does not require many network machines, unlike conventional network training, we believe that it can become a new learning method in network administrator education. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Astronomy Teaching Resources Management System for Curators Using Information Technology

    Page(s): 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2363 KB) |  | HTML iconHTML  

    Curators are always searching for the best educational method to exploit new technology in their educational activities. Our research group previously produced teaching materials using 3DCG animation in cooperation with the Nagoya City Science Museum. In this paper, we present a system research and development project that comprehensively supports various kinds of astronomy education by curators who can use information technology based on these activities. As a base system of this project, we built a content management system to support online teaching resources delivery in astronomy education for curators. In astronomy education, the most important thing is seeing real stars outdoors. Therefore curators want to support learning for beginners not only in science museums but also at homes and outdoors. Our system provides teaching materials that can be conducted outdoors and linked to planetarium programs. Curators used the system in practice and evaluated it to clarify its effectiveness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a Web Community for Female Researchers

    Page(s): 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (353 KB) |  | HTML iconHTML  

    The number and percentage of female researchers in Japan is very low than other developed countries. How to give them effective support has becoming a noticeable topic in recently years. We design a Web community for female researchers which has a community function to promote their communication, a role model function to encourage them to continue their research work. The study is ongoing and future plans are mentioned. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sketch RR-Tree: A Spatio-Temporal Aggregation Index for Network-Constrained Moving Objects

    Page(s): 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (432 KB) |  | HTML iconHTML  

    Traffic aggregate information is important for Intelligent Transportation Systems. There are two issues in obtaining such information, one is how to aggregate traffic data stream efficiently, and another is how to process the "network-constrained" property of the traffic data. This paper solves this problem by proposing an index structure for network-constrained data stream, which manages the sketch synopses of the moving objects in road network considering their "network" positions and supports the effective aggregation on road networks. Evaluation shows the new structure can respond to the aggregate queries on network-constrained data streams within small errors efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Primary Content Block Detection from Web Page Clusters through Entropy and Semantic Distance

    Page(s): 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (180 KB) |  | HTML iconHTML  

    A new method named ENP-DOM tree is proposed in this paper, which extends the document object module tree by adding two properties, i.e., entropy and relativity, to some nodes. Semantic distance is used to extract the primary content accurately from the same source based on three facts: noise blocks always have high entropy property within a given Web site; primary content blocks are often made up of few link words and many text words; useful links are contained in a useful content blocks and have a close semantic distance with page titles. The proposed method can identify the primary content blocks with higher precision and recall rate and reduce the storage requirement for search engines; thus, result in smaller indexes, faster search time, and better user satisfaction. Extensive experiments are also conducted to evaluate the proposed method by comparison with existing methods. The experimental results show that the method outperforms existing methods with better satisfying recall rate and higher precision. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Educational Application and Evaluation of Medical Dialogue Visualization Method

    Page(s): 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (676 KB) |  | HTML iconHTML  

    We propose a method that visualizes the topic structure of medical interviews to provide doctors with clues found in the complete narratives. We collected 15 simulated interviews in an education field and conducted the following analysis to evaluate the utility of our proposed method. By applying it to the 15 interviews, we classified the following three topics: core, expansion, and local. In review sessions with interview participants, interview contents and flows were supported by the topic structure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frame Registration of In-Vehicle Normal Camera with Omni-Directional Camera for Self-Position Estimation

    Page(s): 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1123 KB) |  | HTML iconHTML  

    We propose a method for frame registration between in-vehicle omni-directional and normal cameras aimed at self-position estimation of a vehicle. We assume that the position of a vehicle is estimated by frame registration between the inputted normal camera images and the omni-directional video database with accurate position information. A DTW- based algorithm is used for nonlinear time-series matching because we consider that time-series information contributes to robustness. According to an evaluation experiment, the proposed method showed precise self-position estimation ability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication Protocols for Mobile IP Networks

    Page(s): 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (927 KB) |  | HTML iconHTML  

    In this paper, we propose a novel 2-way handshake authentication protocol to locally authorize intra-domain roaming users for efficient authentication in mobile IP networks, which is based on authentication, authorization and accounting (AAA) architecture. The performance evaluation shows that our protocol outperforms the existing authentication protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Real-Time Database Technique Used in Power System Dispatcher Training Simulator

    Page(s): 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    Aiming at the defects exists in tradition relationship database real-time application of power system dispatcher training simulator(DTS), this paper analyzed the constitution of database system in DTS, brought forward real-time database model that composed by the combination of real-time EMS memory base and off-line ORACLE database. Meantime in order to enhance the access speed between EMS memory and database and reduce the utilization rate of CPU, we adopted DMA technique based on high-speed PCI bus to transmit datum. This paper applied the manner that combines both software and hardware techniques and designed proper DTS real-time database. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Histogram Algorithm for Low Voltage Electrical Apparatus Switching Arc's Image Enhancement

    Page(s): 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (401 KB) |  | HTML iconHTML  

    It's difficult to find contact from the image that was photographed by high-speed image sampling system because of the light reflection characteristic of switching arc, contact and interrupter. It do enhancement process to arc image by image enhancement algorithm of histogram and local histogram. In order to find the arc image and on the same time can find contact and the interrupupter's detail in the arcing process. The simulation result shows that the contace and arc's relative position can be observed clearly by this method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Model and Simulation of Enterprise Competition Research Based on CAS

    Page(s): 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (402 KB) |  | HTML iconHTML  

    Firstly, aiming at the limitation of research on enterprise competition model, we propose the idea to apply CAS (complex adaptive system) theory to the enterprise competition. Secondly, refer to the modeling scheme of Holland's Echo model an applied model of CAS-based enterprise competition was built. Finally, according to develop the program of Object-C based on swarm, simulating the dynamic competitive behavior and evolvement, the result of the simulation was analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Long-Distance Steam Turbine Generator Rotor Windings Inter-Turn Short Circuit Fault Diagnose System Based on VB.Net

    Page(s): 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (385 KB) |  | HTML iconHTML  

    This paper had built inter turn short-circuit fault diagnose system of steam generator rotor windings based on the fault criterion of rotor inter turn short circuit on-line identification. The frame of diagnose system is introduced, and then the long-distance rotor inter turn short-circuit diagnose system which based on B/S module is built by combining advanced VB.net technique's Web service and SQL server. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Local/Global Traffic Network Analysis in a GISBased System

    Page(s): 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    This paper reports on our development of a GIS-based traffic network analysis system, named GIS-based transport decision support system, which provides a graphical analysis platform to transportation planners and researchers for transportation network analysis. The system has the functions of designing traffic networks on digital maps and doing traffic equilibrium analysis, as well as a novel function to integrate local detailed structures of intersections into global networks. The latter is particularly useful for the analysis of large traffic network where the detailed local network structures of some intersections have to be taken into account. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous Experience Media for Computer-Mediated Communication

    Page(s): 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1931 KB) |  | HTML iconHTML  

    Ubiquitous experience media (UEM) is the computational media for experience-oriented knowledge sharing. In this paper, we address its properties and our research approach, describing its concept and examples as communication media. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abrupt Steering Detection Based on the Road Construction Ordinance and Vehicle Acceleration Captured with Drive Recorders

    Page(s): 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (491 KB) |  | HTML iconHTML  

    Risky steering operations are detected based on the relationship between the radius of road curvature and road design speed defined in the road construction ordinance. Vehicle motion while steering is approximated as a circular motion, and the vehicle trajectory radius is estimated from lateral acceleration and vehicle velocity captured with a drive recorder based on a circular motion equation. Steering operation behaviors are evaluated for 203 drivers. Experimental results show that the percentages of risky steering operations estimated for individual drivers correlate with driver risk evaluation scores given by a risk consulting expert. We also observed situations of risky steering by recording video along with driving data using a data collection vehicle. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Bird's Eye View Images Depending on Vehicle Positions by View Interpolation

    Page(s): 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1213 KB) |  | HTML iconHTML  

    This paper proposed a method for generating bird's eye view images using multi-cameras set in high points at intersections. As the generated images follows own vehicle's motion and includes the vehicle itself it enables the driver handing the surrounding situations conveniently. Experiments have shown the advantages of our method in save driving supporting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Hiding Scheme Using Sudoku

    Page(s): 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1731 KB) |  | HTML iconHTML  

    Steganography is the science of secret message delivery using cover media. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Zhang and Wang's method and Sudoku solutions. A selected Sudoku solution is used to guide cover pixels' modification in order to imply secret data. Because the number of possible Sudoku solutions is very large, the proposed method is more secure than Mielikainen's method and Zhang and Wang's method. From the experimental results, the visual quality of stego images produced by the proposed method is higher than 44 dB in average, which is slightly less than that of related works; however, the embedding capacity of the proposed method is 1.5 bit per pixel, which is greater than that of the related works. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature-Based Image Watermarking Resisting Geometric Attacks

    Page(s): 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (805 KB) |  | HTML iconHTML  

    This paper presents a novel robust image watermarking scheme for resisting geometric attacks. In the proposed scheme, watermark synchronization is first achieved by the local circular regions, which can be generated using the scale-invariant feature transform (SIFT). Then the watermark is embedded into each local region in spatial domain by odd-even quantization. In the decoder, the watermark can be extracted using the proposed odd-even detector. Simulations and comparisons have demonstrated the effectiveness of our scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Implementation for DCT-Based Robust Watermarking with Genetic Algorithm

    Page(s): 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (462 KB) |  | HTML iconHTML  

    Application for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches. Based on existing metrics to evaluate the applicability of robust watermarking, it is generally agreed that three metrics, including the quality of watermarked contents, the survivability of extracted watermark after intentional or unintentional attacks, and the number of bits embedded, need to be considered. However, these three metrics conflict with each other. In this paper, in addition to quality and survivability discussed in literature, we take the number of embedded bits into account, thus adding the flexibility in implementation. With the aid of genetic algorithm, we designed an applicable implementation that will obtain the reasonable quality, acceptable survivability, and practical capacity after watermarking. Simulation results present the practical implementation and possible application of the proposed algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCT-Based Watermarking By Quotient-Embedding Algorithm

    Page(s): 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (665 KB) |  | HTML iconHTML  

    A simple watermarking scheme based on the discrete cosine transform (DCT) is proposed. To increase the hidden capacity while maintaining the robustness of the proposed method, the authors use quotient-embedding algorithm to hide the secret message in the selected low-frequency coefficients of a DCT block. Simulations show that the stego-images generated by the proposed method do robustness against image processing operations, such as JPEG2000, JPEG, cropping, processing the negative, quantization, low-pass filtering, noise additions, and so on. Moreover, the PSNR is not bad while the resultant perceived quality and hiding capability are good. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gray-Image Encryption Using Multiplex Encoding Method

    Page(s): 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    This paper proposes encoding the way and dealing with gray-image of multiplex double random phase technique. The true image is stored in a multiplex encoding that is so-called encodegram, and then it can be reconstructed by using proper random phase masks and correct retrieval protocol. It can then increase security and robustness of the true hidden image, and interrupt unauthorized receivers. Finally, we will verify this method encrypted in the image with experimental simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Robust Watermarking Algorithm Based on Error Correction Coding

    Page(s): 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    Information security is one of the most important challenges in computer communication. This paper proposed a novel robust watermarking algorithm with BCH error correction coding for the transmission robustness of encrypted images. Besides applying BCH Error correction coding to produce robust marks for the transmission, the scheme utilizing Ant Colony Algorithm (ACA) to pick the image contour as the embedding position for better performance against channel noises. Experiment results illustrate that the proposed scheme can improve the robustness and invisibility of watermarking against attacks, such as JPEG compression, channel Gauss noises interference and cutting operation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Blind Watermark Algorithm in Mixed Transform Domain Based on Chaotic Sequence Locating

    Page(s): 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (282 KB) |  | HTML iconHTML  

    This paper presents a blind watermark algorithm in mixed transform domain by using chaotic sequence for the watermark locating. After DWT, the DCT is applied on the low frequency and chaotic sequence is used to locate the position of the watermark information in DCT domain. The watermark information is embedded by comparing the frequency coefficients. With favorable transparency, the experimental results show that the algorithm has a good robustness against noise, image processing, malicious attacks and image compression. The adoption of chaotic sequences enhances the security capability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Data Hiding Scheme for Color Image Protection Based on Palette Color Replacement

    Page(s): 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (748 KB) |  | HTML iconHTML  

    In this paper, a novel reversible data hiding scheme is proposed to embed the color information of a palette image into its corresponding grayscale image by using the palette color replacement. Using the proposed scheme, two different qualities of images can be provided, they are the grayscale image and the color image, one for free access, and another for limited access, respectively. The proposed method reordered the palette colors according to their occurrence frequencies in the image and repeated performing a palette color replacement procedure to embed enough information into the grayscale image. Consequentially, we can reconstruct the palette color image by extracting the embedded information from the marked image. The performance of the proposed method is demonstrated by showing the good qualities of both the marked and the rebuilt images. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Hiding in Image Size Invariant Visual Cryptography

    Page(s): 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    This paper proposes a scheme to hide some confidential data in image size invariant visual cryptography. The data hiding processing is synchronized with the secret image encryption. The basic property of the conventional visual cryptography is well maintained in our scheme. That is, the secret information can be decrypted by stacking the two transparencies. Besides, the hidden data can be accurately retrieved and the secret image can be losslessly reconstructed, both with XOR operations. Experimental results show our scheme is simple and effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.