By Topic

Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on

Date 2-4 April 2010

Filter Results

Displaying Results 1 - 25 of 186
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (632 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (158 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Message from the IITSI 2010 Symposium Chairs

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (91 KB) | HTML iconHTML
    Freely Available from IEEE
  • IITSI 2010 Organizing Committee

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • IITSI Committee Members

    Publication Year: 2010, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Skin Segmentation Based on Double-Models

    Publication Year: 2010, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    In the process of skin tracking of video, Skin color model often can't get expect affection in some environment. This paper brings out double-models based on analysis of color space and traditional skin color models. Using the interaction of two models, We can adjust their parameters which can adapt to the environment. The skin color modeling include two steps. First it is stat stylebooks' paramet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Small World Network Based Grid Resource Discovery Mechanism

    Publication Year: 2010, Page(s):8 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Since Small World Network's (SWN) traits of shorter routes and higher clustering rate, SWN is introduced to layered Gird Resource Discovery Mechanism (GRDM). This new structure balanced between the impressive efficient of formal centralized management and extendibility of absolute distribution. We also designed a resource discover algorithm based on this model. Simulation and analysis of algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Hybrid Function Projective Synchronization for Two Different Chaotic System with Uncertain Parameters

    Publication Year: 2010, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    This paper investigates general hybrid function projective synchronization using adaptive method, the drive and response systems discussed in this paper can be strictly different dynamical systems (including different dimensional systems). By Lyapunov stability theory, the adaptive control law and the parameter update law are derived to make the state of two chaotic systems hybrid function project... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Quay Crane Assignment Approach for Berth Allocation Problem in Container Terminal

    Publication Year: 2010, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    Berth allocation and quay crane assignment are two important problems in seaside operations. They are commonly integrated to support the plan. The first generates the berthing time, position and required quay crane. It can be taken as a 2D bin-packing problem with one-dimension resource constraint by quay cranes and variable length of operation time determined by quay crane numbers. The second pla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of an Improved Single Neuron Adaptive PID Control

    Publication Year: 2010, Page(s):22 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    PID control was commonly used for control system which often depend on accurate mathematical models, but in some complicated situations, the model are hard to obtain and the plant parameters are subject to perturbations, the application of PID control are limited and adaptive schemes should be taken. BP neural networks with good model identification and can be used to satisfied PID parameters thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mixture Conjugate Gradient Method for Unconstrained Optimization

    Publication Year: 2010, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    In this paper a new conjugate gradient method for unconstrained optimization has been proposed, furthermore a mixture algorithm has been proposed, we have proved that the new method and the mixture method using inexact line search is sufficient descent and global convergent, and the numerical result shows that the new method is effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Key Management Scheme for Large Scale Pay-TV Application

    Publication Year: 2010, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    In the Pay-TV system, the Key Management System (KMS) is one of the essential basis. The KMS is used to prevent the unauthorized access to the audio/video data and ensure the benefit of the service providers. The security of the KMS is primarily affected by the key distribution process. In this paper, a distributed key management scheme based on the notion of the rekey path method is proposed. Thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SECTrust: A Secure and Effective Distributed P2P Trust Model

    Publication Year: 2010, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based global trust model. Previous work about the global trust model is almost based on the assumption that the peer with higher trust value will provide more honest fe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing Non-deterministic Actions within the Situation Calculus for Autonomous Characters

    Publication Year: 2010, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    An alternative approach is proposed to represent non-deterministic actions in the situation calculus based on epistemic fluent K. A new epistemic fluent based on fuzzy set semantics is defined to solve uncountable number of possible worlds due to the introduction of epistemic fluent K. Meanwhile autonomous characters can come to the real world from the possible worlds by incorporating sensing into... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Service Selections Based on Ontology and Qos

    Publication Year: 2010, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Because Quality of service is multi-dimension, ontology has limitation in semantic, and the negotiation between user and resource is lacking of semantic, we can't select the service user satisfied, we use ontology and Qos elements for semantic, and propose a method SBOQ (Service selection Based Ontology and Qos) to select the service. We improve the method to measure the similarity of ontology. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Way to Design an Optical Camera Lens for River Sediment in Underwater Imaging

    Publication Year: 2010, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    In order to real-time gathering the images of underwater sediment, an optical imaging system should be designed for the optical imaging of the sediment. As water and air has a different refractive index, so when light from the aqueous medium aiming at the phenomenon of refraction of air will occur, the objective lens's angle of vision will become smaller (focal length), magnification decreases, ab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism

    Publication Year: 2010, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    In order to settle the conceal terminal, frequency shift, losing package, mistaking code problems of air-to-ground data link, which were aroused by high speed moving of node and more complicated network environment, two important MAC communication mechanism-the MSDU frames subsection and RTS/CTS handshake mechanism-were introduced. Then some simulation experiment were made from little operation an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application Research of Wireless Sensor Network in the Prison Monitoring System

    Publication Year: 2010, Page(s):58 - 62
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    In this paper, the prison monitoring system is designed based on wireless sensor network technology. This system could not only monitor the relevant information about the vital signs of inmates in prison, but also record and check the physical condition of personnel, activities, status and location information at any time, preventing inmates from committing suicide or escaping, and discovering whe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm

    Publication Year: 2010, Page(s):63 - 67
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Clustering analysis method is one of the main analytical methods in data mining, the method of clustering algorithm will influence the clustering results directly. This paper discusses the standard k-means clustering algorithm and analyzes the shortcomings of standard k-means algorithm, such as the k-means clustering algorithm has to calculate the distance between each data object and all cluster ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet Transformation

    Publication Year: 2010, Page(s):68 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    In this paper, a verifiable copyright-proving scheme based on lifting wavelet transformation is proposed. Our scheme uses lifting wavelet transform (LWT) and chaotic system on the protected image in order to generate a verification map. Using the verification map, anyone can publicly verify the copyright of the protected image without needing the original image. Experiments show that the scheme ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation for Real-Time Property of Serial Communication Based on WINDOWS CE

    Publication Year: 2010, Page(s):73 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    A software configuration for register program based on embedded CPU is addressed in this paper with characteristics analysis of WIN CE multithread. The configuration is constructed for implementing real time of serial communication of multitask program with operating system in the field of embedded application system. Based on the configuration, the CPU and registers related with serial communicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance

    Publication Year: 2010, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1665 KB) | HTML iconHTML

    In the mine, open field or a severe surveillance environment, it is limited to take both full view images of circumstance. The use of computers and data collection card to achieve surveillance task is fairly dangerous and unreliable. To counter such special case, this paper analyzes the optical structure principles of panoramic mosaic. The advantages and disadvantages of phase correlation methodol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.