By Topic

2012 International Conference on Information Science and Applications

23-25 May 2012

Filter Results

Displaying Results 1 - 25 of 60
  • 2012 International Conference on Information Science and Applications - ICISA 2012 [Title page]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • 2012 International Conference on Information Science and Applications [Copyright notice]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Greeting Message from the General Chair

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Greeting Message from the General Co-Chair

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • ICISA 2012 Organization

    Publication Year: 2012, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • ICISA 2012 Program Committee

    Publication Year: 2012, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • ICISA 2012 List of Papers

    Publication Year: 2012, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • ICISA 2012 List of Authors

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • An Experimental Comparison of Packet Delivery Schemes in a Linear Mesh Topology

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    In this paper, we compare and analyze the performances of two mesh routing protocols (BATMAN-ADV and FLAME) and a WDS implementation of the IEEE 802.11, all of which run on Layer 2 of the OSI reference model. Sometimes the mesh network may simply form a linear topology to provide a service coverage to a line-shaped area. A linear topology can be built without any routing protocol involved, using W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Reliable and Energy-Efficient Topology Control Algorithm in Wireless Sensor Network

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Topology control is an efficiency method that can enhance the energy efficiency in a wireless sensor network. There are several research discuss the topology control problem only focus on topology construction or topology maintenance. In this paper, we design a distributed reliable and energy- efficient topology control algorithm both take into consider with topology construction and maintenance. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Selective Ahead-Of-Time Compiler on Android Device

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The runtime environment of Android is based on its own Java Virtual Machine(JVM) called Dalvik Virtual Machine (DVM) which is said to be having overhead of interpreting every bytecode to machine code during runtime just like other JVMs. There are already well known techniques to overcome runtime overhead of interpreting and Google has adapted one of them which is Just-In-Time Compiler (JITC) since... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Virtual Space Management Platform for Personalized Service

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    The purpose of this research is to propose an efficient management scheme for Virtual Personal World (VPW) which is a model focused on service continuity of personal world. Previous ubiquitous frameworks have been concerned with where is the user is serviced and what services can be offered in that space. However those questions above are not the most important problems anymore in VPW. We also int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Service Management Scheme Based on Virtual Object for Ubiquitous Computing Environment

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    For the ubiquitous computing environment, an important assumption is that all the components in any specific environment are connected with each other. With this assumption, we introduce an effective scheme to provide a personalized service based on Virtual Personal World (VPW). Virtual Personal World (VPW) which is a model focused on service continuity of personal world. Previous ubiquitous frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Pipelined Multistream AES CCMP Architecture for Wireless LAN

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Widespread WLAN has used Advance Encryption Standard in Counter with Cipher Block Chaining Message Authentication Code Protocol (AES CCMP) as security services. As the next-generation WLAN adopts multiuser MIMO technology, multiple AES blocks are needed because this technology supports multiple packet transmission in parallel. To minimize the cost increase due to multiple AES blocks, we propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive Service Environment for Intelligent Services

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    In recent years, there has been interest in home-service robots and their usages have been highly evaluated. However, home-service robots could not match expectations of users due to their poor cognitive abilities. There have been various ways to improve robot's usage. "Proactive Way" could be one of key aspects to make a home-service robot like rich cognitive ability and having intelligence as we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safeguard Workers Performing Catalyst Replacement inside Dangerous Chemical Reactors: An Application of the RF Communication Technology

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Workers who perform catalyst replacement inside chemical reactors face life-threatening risks. This paper describes a system designed for safeguarding workers working in the confined chemical reactors at the Formosa Petrochemical Corporation's refinery plant. The system monitors the status of every worker by continuously receiving radio frequency signal and detects life-threatening events quickly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Sensor Network Localization with Autonomous Mobile Beacon by Path Finding

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Sensor data with geographical information become ubiquitous with development of location base applications in various businesses. There is no exception to Wireless sensor network (WSN) as it is getting more practical under the booming of semiconductor industry. Localization of WSN usually depends on beacons that equip with GPS or GSM module. The cost of finance and energy hamper the application of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Threshold-Based Cache Allocation Algorithm for IPTV VoD Services

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    In recent years, IPTV service has been focused on and invested heavily by many service providers. Among the various IPTV service, VoD (Video on Demand) service is expected to be one of the most popular services. Currently, most of service providers are trying to provide VoD service by locating proxy nearby end-users because it is hard for a single server to cover all the requests from the entire s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Perceptually Adaptive and Retrievable QIM Scheme for Efficient Blind Audio Watermarking

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    This study proposes a feasible way to incorporate the quantization index modulation (QIM) scheme into a framework jointly formed by the discrete wavelet packet transform (DWPT) and discrete cosine transform (DCT) in the field of audio watermarking. To achieve a balance between the robustness and imperceptibility, an adaptive QIM has been developed under the guidance of the human auditory masking e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Performance Comparison of 3D Measurement Systems Based on Fringe Projection Profilometry

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    In this paper, four models of 3D measurement systems are evaluated based on collimating and perspective projections using a real-time 3D virtual scanning system. Fringe projection technique is utilized due to its popularity for real-time and high resolution applications. Analysis and performance comparison of the phase-to-coordinate relation for all four models is presented. Nonlinear system model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boundary Driven Interactive Segmentation

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    This paper presents a novel approach and interface to interactive image segmentation. Our interface uses sparse and inaccurate boundary cues provided by the user to produce a multi-layer segmentation of the image. Using boundary cues allows our interface to utilize a single "boundary brush" to produce a multi-layer segmentation, making it appealing for devices with touch screen user interface. Our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Image Watermarking Using Multilevel Wavelet Decomposition and Human Visual System

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    In this modern world Digital watermarking is of prime importance. This has increased the demand for copyright protection. Digital watermarking is a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper a non-blind watermarking has been proposed that embed a randomly generated binary numbers as watermark. Human ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective R2 Map-Based Liver Segmentation Method in an MR Image

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1181 KB) | HTML iconHTML

    Object recognition is usually processed based on region segmentation algorithm. Region segmentation in the IT field is carried out by computerized processing of various input information such as brightness, shape, and pattern analysis. If the information mentioned does not make sense, however, many limitations could occur with region segmentation during computer processing. Therefore, this paper s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA Based Stereo Vision System to Display Disparity Map in Realtime

    Publication Year: 2012, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1045 KB) | HTML iconHTML

    Dense stereo disparity map displayed in real time as video is one form of 3D video that renders objects in the scene by the intensity modulation in terms of the distance to the objects. With two cameras whose the optical axes are parallel, the stereo disparity is calculated to find the range to the objects. Sophisticated matching algorithms are generally slow and difficult to apply parallelism to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instruction and Data NAND Flash Memory System for Embedded Systems

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Harvard architecture uses physically separate memories for their instructions and data. In the case of a flash memory with a buffer system, separate data and instruction buffers can lead to diversification of a flash architecture and achieve the high performance by overcoming effectively the limitations of a unified buffer. So, the proposed NAND flash system is composed of two separate buffers for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.