By Topic

Frontier Computing. Theory, Technologies and Applications, 2010 IET International Conference on

Date 4-6 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 77
  • Cover

    Publication Year: 2010 , Page(s): c1
    Click to expandAbstract | PDF file iconPDF (2377 KB)  

    The following topics are dealt with: VoIP; grid computing; information filtering systems; data handling; hidden Markov model; user interfaces; e-learning; computer games; image processing; wireless sensor networks; access control; cryptography; and Web services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2010 , Page(s): 1 - 6
    PDF file iconPDF (90 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A completed partial order of ordered semi-vector space of intuitionistic fuzzy values

    Publication Year: 2010 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Click to expandAbstract | PDF file iconPDF (116 KB)  

    For developing the intuitionistic fuzzy aggregation operators to handle intuitionistic fuzzy multicriteria fuzzy decision making problems, two popular partial orders are used, one is Atanassov's order and the other is Xu's order. Both of them disregard the following important condition, "a feasible partial order must be not only a totally partial order but also an operation-invariant partial order... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A load-sharing overlay network design for conferencing VoIP

    Publication Year: 2010 , Page(s): 7 - 12
    Click to expandAbstract | PDF file iconPDF (770 KB)  

    Voice over Internet Protocol (VoIP) is one of the most important and popular applications for voice communications on the Internet. However, network dynamics of transmission latency and packet loss from public Internet will affect the voice quality of VoIP service. To make sure all participants in large-scale session of conferencing VoIP (CVoIP) have a good perceptual quality, CVoIP needs to pay c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of Gfarm and GPFS-WAN in Data Grid environment

    Publication Year: 2010 , Page(s): 13 - 18
    Click to expandAbstract | PDF file iconPDF (301 KB)  

    The network technologies and storage devices are developing quickly and the technical devices are inexpensive. Therefore, users have a large amount of storage space, Data Grid can collect distributed storage device to share to other users. In this paper, we discuss several file systems that consist of NFS, SRB, iRODS, Lustre, Gfarm and GPFS-WAN. In Data Grid, we select the specific file system to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service mobility support for pervasive grid based on SIP

    Publication Year: 2010 , Page(s): 19 - 24
    Click to expandAbstract | PDF file iconPDF (171 KB)  

    The goal of Next Generation Grid and pervasive computing models are two of the new models that attract a lot attention in last few years. The current trend is to integrate the two domains, called pervasive grid, where mobile devices can access and provide services. Most current researches adopt the concept that services run in a device and migrate with the device. System developers deal with the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A space-efficient and multi-objective case-based reasoning in Cognitive Radio

    Publication Year: 2010 , Page(s): 25 - 30
    Cited by:  Papers (2)
    Click to expandAbstract | PDF file iconPDF (707 KB)  

    Cognitive Radios (CRs) are intelligent mobile systems that can adapt to changing network environments. Adaptivity is achieved through reasoning and learning from past experiences. The conventional case-based reasoning (CBR) method requires a large storage space for the cases; however, embedded system have limited storage space. This work proposes a novel CBR method for improving the storage space ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced cluster validity index method comprising Rough Set theory and modified PBMF index function

    Publication Year: 2010 , Page(s): 31 - 36
    Click to expandAbstract | PDF file iconPDF (222 KB)  

    This study proposes a method for partitioning and classifying complex datasets based on the Rough Set (RS) theory and a modified form of the PBMF-index method. In contrast to the traditional PBMF-index method, the proposed approach, designated as the Huang-index method, partitions the attributes rather than the data and optimizes both the number of clusters and classification accuracy. Overall, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ID-tree index strategy for supporting similarity searches in information filtering systems

    Publication Year: 2010 , Page(s): 37 - 42
    Click to expandAbstract | PDF file iconPDF (1099 KB)  

    Finding the nearest neighbor is one of the most important search operations in the field of information filtering. Aggarwal et al. have proposed SG-table strategy to index user profiles to support finding similar profiles for a query, reducing the number of accessed profiles. However, it can only improve some particular queries because of collisions in the index. Therefore, in this paper, to avoid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Ambiguity of class structures via Instance Neighbor Entropy with weighting

    Publication Year: 2010 , Page(s): 43 - 48
    Cited by:  Papers (1)  |  Patents (1)
    Click to expandAbstract | PDF file iconPDF (1294 KB)  

    In this paper Instance Neighbor Entropy INE with weighting was proposed to estimate the Class Structure Ambiguity (CSA) of class structures. The main idea of the INE{x)k for one instance x was to compute the weighted entropy of class probability distribution of the top k nearest neighbors of that x. The weighting associated with that entropy was determined according to the inverse of the distance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preference utility mining of web navigation patterns

    Publication Year: 2010 , Page(s): 49 - 54
    Cited by:  Papers (1)
    Click to expandAbstract | PDF file iconPDF (124 KB)  

    Through the world wide web development, web mining becomes an important research topic in database technologies. Web usage mining is to discover useful information of web pages from user navigation patterns recorded in web logs. Web utility mining is not only discovering the frequent web navigation patterns, but also identifying the profit of web pages. For enhancing the web utility mining, this s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New data structure and algorithm for Mining Dynamic Periodic Patterns

    Publication Year: 2010 , Page(s): 55 - 59
    Click to expandAbstract | PDF file iconPDF (106 KB)  

    Periodic pattern mining searches useful periodic patterns in time-related datasets. Previous studies mostly concern the synchronous periodic patterns. Since static transaction database cannot provide the dynamic and timely information to obtain timely mining results, this study proposes the Dynamic Periodic Pattern Mining model for progressive databases. This study also presents a novel periodic p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent controller with cache for critical infrastructures

    Publication Year: 2010 , Page(s): 60 - 65
    Click to expandAbstract | PDF file iconPDF (160 KB)  

    Critical infrastructures require precise and swift response to a local disturbance before it would spread and accumulate. To meet the demand on response time, we propose an intelligent controller with cache design. The controller stores previous decisions and rates them based on a comprehensive evaluation. With those ratings, the controller can intelligently choose the decision leading to the opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive color image style transformation for video

    Publication Year: 2010 , Page(s): 66 - 70
    Click to expandAbstract | PDF file iconPDF (350 KB)  

    This paper presents a simple and fast color style transfer algorithm for video. Based on this proposed algorithm, users can simply select two reference images during the video conversion to complete the color transfer process. Generally speaking, video is a compilation of related images, thus we first split the video into an image sequence, and then perform one-by-one color transfer for each video... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient fault-tolerant configuration in heterogeneous wireless sensor networks

    Publication Year: 2010 , Page(s): 71 - 76
    Click to expandAbstract | PDF file iconPDF (1455 KB)  

    Heterogeneous wireless sensors are widely used to perform a cooperative monitoring task for critical applications. For reducing cost, powerful sensors are activated only when an interesting event is detected, while the other low-cost and error-prone sensors contrarily play an important role in detection. A significant issue arises: How do we provide fault tolerance in such a heterogeneous wireless... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible data hiding with affine invariance for 3D models

    Publication Year: 2010 , Page(s): 77 - 81
    Click to expandAbstract | PDF file iconPDF (172 KB)  

    This paper presents a reversible data hiding method which is affine transformation invariant for 3D mesh models. The histogram shift scheme is applied to data embedding by modifying the normalized distances between the model center and vertices. When the 3D model is rotated, uniform scaled, or translated, the embedded data can be correctly extracted and the original 3D model can be reconstructed. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel reconfigurable computing and its application to hidden Markov model

    Publication Year: 2010 , Page(s): 82 - 91
    Cited by:  Papers (1)
    Click to expandAbstract | PDF file iconPDF (1312 KB)  

    Parallel processing techniques are increasingly found in reconfigurable computing, especially in digital signal processing (DSP) applications. In this paper, we design a parallel reconfigurable computing (PRC) architecture which consists of multiple dynamically reconfigurable computing units. The hidden Markov model (HMM) algorithm is mapped onto the PRC architecture. First, we construct a directe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML to User Interface Binding

    Publication Year: 2010 , Page(s): 92 - 97
    Click to expandAbstract | PDF file iconPDF (139 KB)  

    Separated from GUI builders, existing GUI building tools for XML are complex systems that duplicate many functions of GUI builders. They are specialized in building GUIs for XML data only. This puts unnecessary burden on developers since an application usually has to handle both XML and non-XML data. In this paper, we propose a solution that separates the XML-to-GUI bindings from the construction ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advantageous next generation adaptivity through reflection

    Publication Year: 2010 , Page(s): 98 - 104
    Cited by:  Papers (1)
    Click to expandAbstract | PDF file iconPDF (1319 KB)  

    Adaptivity is one of the key properties of current and future computer systems to make them more easy to operate, more efficient, and better accessible to a wider audience. By extending both the reach and the effectiveness of systems, adaptivity is nowadays a decisive business factor. A system's adaptivity requires a certain knowledge about the human user. The knowledge typically is incomplete and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hypermedia Note Taking

    Publication Year: 2010 , Page(s): 105 - 110
    Click to expandAbstract | PDF file iconPDF (1122 KB)  

    Note taking is known to be an essential activity in human learning and the skill of note taking has been identified as a key prerequisite to successful learning. However, in all contemporary systems of technology enhanced learning, the note taking is only marginal. Technological support is usually insufficient and it is not uncommon that learners at a computer take notes with pen and paper. Hyperm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital game-based learning in improving students' reasoning: A pilot study

    Publication Year: 2010 , Page(s): 111 - 116
    Click to expandAbstract | PDF file iconPDF (246 KB)  

    The purpose of this research is to investigate the possibility of applying digital games to improve students' reasoning ability. According to the review of literature, we created a connection between digital games with children's reasoning cognition. To verify this hypothetical assumption, a 5 weeks pilot study was implemented. Ten fifth graders were participated in this study. Through pre- and po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing a multi-perspective learning environment using blog technology and Topic Maps

    Publication Year: 2010 , Page(s): 117 - 121
    Click to expandAbstract | PDF file iconPDF (209 KB)  

    To design an effective learning environment, several perspectives should be considered. This paper proposes an implementation issue of a multiperspective model which consists of student-centered, assessment-centered, community-centered, and knowledge-centered perspectives. Blog and topic map are two technologies introduced to implement this model. We propose a hierarchical blog learning platform t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital game design principles for spatial ability enhancement

    Publication Year: 2010 , Page(s): 122 - 127
    Click to expandAbstract | PDF file iconPDF (660 KB)  

    The concepts of spatial visualization and the geometrical calculation are important elements of multiple-intelligence development. According to the cognitive-development theory of Piaget, the students in 5th and 6th grade in the elementary school are on a level of concrete thinking, in which their thinking may have greater flexible alternatives, and begin to develop conservation concepts, includin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using competitive digital game-based learning to improve learning motivation

    Publication Year: 2010 , Page(s): 128 - 132
    Cited by:  Papers (1)
    Click to expandAbstract | PDF file iconPDF (200 KB)  

    Digital Game-Based learning is a popular research area in computer science and pedagogy, and there are many domestic and international researches on this topic. Although the fact is that the features of the game and the ways of designing learning materials in each research differ, and the learners' experience may also vary, the common purpose of these researches is to improve the motivation of lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A complex event processing method based on pre-grouping for Radio Frequency Identification data streams

    Publication Year: 2010 , Page(s): 133 - 138
    Cited by:  Papers (2)
    Click to expandAbstract | PDF file iconPDF (317 KB)  

    Radio Frequency Identification (RFID) technology applied ubiquitously uses radio frequency waves to automatically collect data and track objects. RFID readers generate primitive events after reading tagged objects. The primitive events containing very limited semantic information cannot communicate with the high level applications. RFID middleware combines several related primitive events to gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.