By Topic

Computer Science and Information Technology, 2008. ICCSIT '08. International Conference on

Date Aug. 29 2008-Sept. 2 2008

Filter Results

Displaying Results 1 - 25 of 203
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (314 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (11 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (31 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (145 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xix - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (27 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Page(s): xxi - xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (24 KB)  
    Freely Available from IEEE
  • Committee Members

    Page(s): xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (17 KB)  
    Freely Available from IEEE
  • Application of Digital Watermark and Mobile Agent in Copyright Protection System

    Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    Digital watermark has been an important technology for copyright protection. However, it is a challenging task to searching watermark from the data over the network. The integration of mobile agent and digital watermark has been intensively investigated in recent years. A framework model is put forward to design copyright protection based on digital watermark and mobile agent. It can reduce the load of sever and network because the watermark is detected on the remote hosts. The specific process of mobile agent copyright protection scheme is described and analyzed. The framework is effectively enables mobile agent to be applied to copyright protection system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent Architecture for Collaborative CAD System

    Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1174 KB) |  | HTML iconHTML  

    In order to improve the features of traditional CAD system, a system architecture based on multi-agent is put forward. The proposed system framework includes three levels, supporting the collaborative product design for different remote users. The user agents are classified as real-time monitoring agent, conflict detection agent, conflict solution agent, user communication agent and knowledge management agent. We give the detail flow architecture of the user agents. The experiment system presents the efficient cooperation among multidisciplinary designers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling Algorithm Based on Task Priority in Heterogeneous Computing Environment

    Page(s): 12 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (193 KB) |  | HTML iconHTML  

    In this paper, a scheduling algorithm suitable for independent heterogeneous tasks on heterogeneous computing has been studied. With the objective to find the best point between matching and load balancing , the concept of task priority has been used to improve the existing algorithm, and the simulation of our algorithm has been performed .The results demonstrated that through prioritizing tasks, a balance between load balancing and shortest execution time has been reached, and better scheduling performance has been achieved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Certificate-Based Signcryption Scheme

    Page(s): 17 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (406 KB) |  | HTML iconHTML  

    In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption, which combines traditional pubic key encryption (PKE) with identity-based encryption (IBE) while preserving most of the advantages of each, such as no private key escrow and less PKI infrastructure. In this paper, we propose the security notion of certificate-based signcryption and present a concrete certificate-based signcryption scheme derived from pairings on elliptic curves and prove its security in the random oracle model. Additionally, our scheme satisfies the public verifiability and forward secrecy. Compared with the certificate-based sign-then-encrypt scheme, our scheme enjoys shorter message length and less operation cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Fuzzy Support Vector Machine Method for Named Entity Recognition

    Page(s): 24 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    Recognizing and extracting exact name entities, like Persons, Locations, Organizations, Dates and Times are very useful to mining information from electronics resources and text. Learning to extract these types of data is called Named Entity Recognition (NER) task. Proper named entity recognition and extraction is important to solve most problems in hot research area such as Question Answering and Summarization Systems, Information Retrieval and Information Extraction, Machine Translation, Video Annotation, Semantic Web Search and Bioinformatics. In this paper we have improved the precision in NER from text using the new proposed method that calls FSVM. In our method we have employed Support Vector Machine as one of the best machine learning algorithm for classification and contribute a new fuzzy membership function thus removing the Support Vector Machinepsilas weakness points in NER precision and multi classification. The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of the Secure Electronic Payment System Based on the SET Protocol

    Page(s): 29 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (282 KB) |  | HTML iconHTML  

    Chinapsilas E-business is still in its infancy and the limitation of financial system has still restricted the development of trans-border transactions. We need to promote more infrastructure construction, and then the E-business can enter the real era of transaction. The electronic payment is the key stage of the E-business and the basis of its development. This paper starts with various payment means in the real life, the security requirements of the electronic payment and security attack; by combining the network security technologies, it presents the secure electronic payment system based on the SET protocol. The system that can ensure the security of transaction is an excellent solution to the E-business model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hedged Predictions for Traditional Chinese Chronic Gastritis Diagnosis with Confidence Machine

    Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (347 KB) |  | HTML iconHTML  

    Traditional Chinese chronic gastritis diagnosis focuses on producing an accurate classifier and uncovering the predictive confidence for individual instance. Transductive confidence machine (TCM), which is a novel framework that provides hedged prediction coupled with valid confidence. In the framework of TCM, the efficiency of prediction depends on the nonconformity measure of samples. This paper incorporates random forests (RF) to propose a new TCM algorithm named TCM-RF. Our method benefits from the more precise and robust nonconformity measure. A case study of traditional Chinese chronic gastritis demonstrates that TCM-RF is feasible and effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fade Scene Change Detection using Luminance Histogram Bin

    Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (580 KB) |  | HTML iconHTML  

    Partitioning video sequence is very important for video applications such as video indexing, retrieval or editing. A lot of techniques have been presented based on information such as structures of the image, image histogram and intensity statistics etc. The histogram-based technique is generally used due to computation complexity when compare with other techniques is less, and most of image processing applications, image histogram have been already computed. This paper presents a new technique to detect the fade scene change from the video scene that contain noise and/or contain logo and compared it with other algorithm that using histogram. The result showed that the proposed algorithm is much better. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of Entrance Guard & Check on Work Attendance System Based on Face Recognition

    Page(s): 44 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (423 KB) |  | HTML iconHTML  

    In this paper, the core algorithm is studied, which aiming at developing a robust and practical entrance guard & check on work attendance system based on face recognition, and this system is applied to the logistics management industry. Firstly, this algorithm divides the image into block images, which are also called sub-images. Then the well-known Fisher method is directly employed to the selecting sub-images obtained from the previous step, and the new lower dimensionality patterns that replace the original patterns are obtained. Finally the recognition results are obtained by the general minimum distance classifier. The ORLface image database is made use of to simulate and the results shows that this method presented in this paper is obviously superior to the traditional Fisher method. And when the training sample is only one, the recognition rate of 90.83 percent is achieved. It is indicate that M-FLDA can not only accelerate recognition speed by reducing dimensionality but also reduce the memory capacity. Finally, the preliminary study of solving facial pose changes is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multilayer Method of Text Feature Extraction Based on CILIN

    Page(s): 48 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (188 KB) |  | HTML iconHTML  

    The feature extraction is the most critical technology of text categorization. The method of feature extraction from Chinese text based on CILIN is different from the conventional feature extraction, which uses two feature extraction methods. This method is good at dealing with synonyms and polysemes, and reducing the dimension. Firstly, it uses the method of feature extraction from Chinese text based on CILIN to analyze the meaning of key words. Secondly, use the mutual information to extract the feature, it can give the relation between class and lemma. The experiment results proposed that comprehend to the meaning of key words can distinctively improve the text classification precision. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model

    Page(s): 53 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (260 KB) |  | HTML iconHTML  

    A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy re-encryption schemes have been proposed. However, all of these schemes are only proved secure in the random oracle not in the standard model. In this paper, Based on Waters's identity based encryption, an identity based proxy re-encryption scheme is proposed that is proved fully secure without the random model. The proposed scheme's security can be reduced to the decision Bilinear Diffie-Hellman assumption. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking Finite Automata and Formal Methods Enhancing Modeling Power for Complex Systems

    Page(s): 58 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    Automata have various applications and it plays an important role in computer science, particularly, in modeling behavior of systems. Z notation is an ideal one to be used defining state space of a system and then operations over it. Consequently, it requires an integration of automata and Z increasing its modeling power. Further, finite automata may have different implementations therefore if we give a mathematical analysis and describe formal specification of it before implementing then correctness of a model can be argued. Formal methods are rigorous mathematical techniques which can be used for specification of software systems. To achieve an objective of integration of approaches, we have combined automata and Z. Formalism of this relationship is analyzed and validated using Z/EVES tool. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-Tolerance Ring Network on Chip without Buffer

    Page(s): 67 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (372 KB) |  | HTML iconHTML  

    The paper brings forward a hierarchical ring NoC (network on chip) topology whose links are divided into two groups of rings for fault-tolerance. Each group of ring contains one control-ring and one data ring. Control-ring propagates the information of routing, link error and error control of all nodes using packet switching. Data-ring exchanges data using circuit switching. Three pipeline stages architecture without buffer is presented that minimizes the delay of communications among nodes. Ring network adopts time division multiplexing and priority mechanism to implement space division multiplexing of bandwidth and fair routing. Simulation results show that the architecture can efficiently avoid traffic congestion, deadlock and starvation and ensure full use of bandwidth. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Simulation of the Dynamic Complexity of a Host-parasitoid Model

    Page(s): 72 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (537 KB) |  | HTML iconHTML  

    In this paper, computer simulation is used to study the dynamic complexities of a host-parasitoid interaction with a Hassell growth function for the host and Holling-type functional response. Many forms of complex dynamic are observed, including quasiperiodic bands with periodic windows, Hopf bifurcation, period-doubling bifurcations, period-halving bifurcations, attractor crisis, intermittent chaos, supertransient behavior, multiple attractors with fractal basins of attraction. The numerical results indicate that computer simulation is a useful method of investigating complex dynamic systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network IMC-PID Control of CPE Polymerization Temperature Based on DDE

    Page(s): 79 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (711 KB) |  | HTML iconHTML  

    The production process of chlorinated polyethylene (CPE) is mainly a chemical polymerization. The CPE polymerization temperature has characteristics of time varying, nonlinear and large delay. In order to realize a steady and accurate automatic control system, the neural network IMCPID (NNIMCPID) control is advanced in the article. And base on the DDE technology, the control system can achieve the realtime monitoring and advanced controlling on CPE production process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instance Assisted Semantic Interoperability for Distributed Digital Museums

    Page(s): 83 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    The distribution and heterogeneity of information raise several challenges for systems to search and retrieve information mutually. One critical foundation for coordinated action in multi-systems is the ability to exchange representational objects that can be locally interpreted in ways that make sense. Coherent local interpretation of shared representations is needed to create global semantic coherence for the distributed systems. Ontology technology is a useful approach to information integration. But when the categories of the relative concepts of ontologies are different, the semantic interoperation will encounter new obstacles. Except that the schema carries information, the data also carry abundant information, which assists to further interoperate. In the paper, a semantic interoperation framework is proposed which adopts instance assisted ontology technology. The implementation of the framework in distributed Xu Beihong's Galleries is discussed in detail. The emphasis is the process of ontology integration and the approach to further semantic interoperation using instances. In the end, the more interrelated problems are further discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an Information Intelligent System based on Web Data Mining

    Page(s): 88 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    How to efficiently use the vast amounts of information on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. In this paper, Web data mining process is introduced from the view of function, an intelligent mining system of network information is built with combining the data mining and artificial intelligence technologies and the functions of the various subsystems of it are also introduced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.