By Topic

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II

Date 4-6 April 2005

Go

Filter Results

Displaying Results 1 - 25 of 162
  • [Cover page]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2005, Page(s):i - iv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • General Chair's message

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2005, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • Additional referees

    Publication Year: 2005, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Impact of Java compressed heap on mobile/wireless communication

    Publication Year: 2005, Page(s):2 - 7 Vol. 2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    M-commerce has shown up as e-commerce in mobile and wireless communication, and now deals with on-line banking, stock trading, auctions, transactions, and mobile media. M-commerce applications are implemented with, for example, Java technology that supports a client-and-server model and cross-platform mobile applications. They are attractive, but, need a large heap space, which may slow down the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on data compression in wireless sensor networks

    Publication Year: 2005, Page(s):8 - 13 Vol. 2
    Cited by:  Papers (87)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Wireless sensor networks (WSNs) are resource constraint: limited power supply, bandwidth for communication, processing speed, and memory space. One possible way of achieve maximum utilization of those resource is applying data compression on sensor data. Usually, processing data consumes much less power than transmitting data in wireless medium, so it is effective to apply data compression before ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of traffic engineering capabilities of MPLS networks

    Publication Year: 2005, Page(s):14 - 15 Vol. 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB) | HTML iconHTML

    This poster presents the traffic engineering (TE) capabilities of multiprotocol label switching (MPLS) networks. The study is carried on Pentium PCs running Linux and using open software. Results show that it is necessary to examine the flows in a MPLS network before setting up paths from a TE point of view. The study also suggests that proper planning with respect to mapping similar traffic types... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Internet payment system using smart cards

    Publication Year: 2005, Page(s):16 - 21 Vol. 2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Advancements in the wireless technology have given rise to various payment methods and protocols. The recent, and probably latest KSL (S. Kungpisdan et al., 2003) protocol has been implemented for mobile credit card payments. This paper proposes a smart card based wireless Internet payment system which is derived from KSL (S. Kungpisdan et al., 2003) protocol. A client using a wireless smart card ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient application of modern logic synthesis in FPGA-based designing of information and signal processing systems

    Publication Year: 2005, Page(s):22 - 27 Vol. 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    The goal of this paper is to promote application of logic synthesis methods and tools in different tasks of modern digital designing. The paper discusses functional decomposition methods, which are currently being investigated, with special attention to balanced decomposition. Since technological and computer experiments with application of these methods produce promising results, this kind of log... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • History calls: delivering automated audio tours to visitors' cell phones

    Publication Year: 2005, Page(s):30 - 34 Vol. 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB) | HTML iconHTML

    Many museums around the world rent audio players to their visitors to provide automated tours delivering pre-recorded information about their exhibits. Though generally pleased with their patrons' responses to automated audio tours museum administrators find that hosting them can be expensive, time consuming, and frustrating. Ongoing advances in mobile wireless technology provide an alternative to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Web services discovery and invocation through auto-generation of abstract multimodal interface

    Publication Year: 2005, Page(s):35 - 41 Vol. 2
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    With the advancement in wireless technologies in general and mobile devices capabilities in particular, ubiquitous access of mobile Web services continues to be in the focal point of research. This paper presents a novel architecture for discovery and invocation of mobile Web services through automatically generated abstract multimodal user interface for these services. A prototype has been develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML-based mobile agents

    Publication Year: 2005, Page(s):42 - 48 Vol. 2
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Current mobile agent systems are based on agent architectures that are partially or fully implementation programming language-specific. Mobile agent implementation in a specific programming language has usage limitations as the inter agent communication and agent migration to other agent hosts needs support for the same language. Widely used Java-based agents have an advantage of easy agent migrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using dynamic adaptability to protect mobile agents code

    Publication Year: 2005, Page(s):49 - 52 Vol. 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB) | HTML iconHTML

    Mobile agents must be prepared to execute on different hosts where, according to specific environmental conditions, they adopt different behaviors. The aim of this paper is to describe how a mobile agent equipped with a flexible capacity, can adapt its execution with the request and security found (in a visited environment). Based on its security, the agent becomes able to adapt itself to the envi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bluetooth as an enabling technology in mobile transactions

    Publication Year: 2005, Page(s):53 - 58 Vol. 2
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Mobile commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial opportunities and complexity, which makes computing globally pervasive and ubiquitous. Customers prefer a choice in the channels through which they do business and the same applies to tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using principles of pervasive computing to design m-commerce applications

    Publication Year: 2005, Page(s):59 - 64 Vol. 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one of the first to emerge for this class of devices, many modern m-commerce applications become more complex and utilize a wide range of features of pervasive computing. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using facial images to diagnose fetal alcohol syndrome (FAS)

    Publication Year: 2005, Page(s):66 - 71 Vol. 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    This paper proposes the methodology of classification architectures for FAS diagnosis tasks and shows their feasibility through experimental studies. We describe the automatic selection of features from an image training set using the theories of multidimensional discriminant analysis and the associated optimal linear projection. The method consists of two steps: projection of face image from the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust optical flow estimation algorithm for temporal textures

    Publication Year: 2005, Page(s):72 - 76 Vol. 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    In this paper we propose a robust optical flow estimation algorithm for objects whose motion patterns are classified as temporal textures. While suitability of contemporary motion estimation algorithms depends on physical properties of textures, the proposed technique is robust enough to compute accurate flow patterns for a wide range of temporal textures independent of their type. Experimental re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating a wrapper approach for selecting features using constructive neural networks

    Publication Year: 2005, Page(s):77 - 82 Vol. 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    This paper investigates the problem of feature subset selection using a wrapper approach implemented using genetic algorithm and a constructive neural network. The main goal of the experiments conducted is to investigate whether the subset of features identified by the wrapper approach, implemented using the DistAl constructive neural algorithm, can also improve the accuracy of other constructive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Orthogonal and least-squares based coordinate transforms for optical alignment verification in radiosurgery

    Publication Year: 2005, Page(s):83 - 88 Vol. 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Radiosurgery is a non-invasive treatment technique applying focused radiation beams. It requires high geometric accuracy as misalignment can cause damage to the surrounding healthy tissues and loss of the therapeutic effect. One promising technique to insure submillimeter alignment accuracy of the radiation beam is to optically monitor the position of the beam axis relative to a frame firmly attac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical evaluation of a radial soft hash algorithm

    Publication Year: 2005, Page(s):89 - 94 Vol. 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    This paper presents a practical evaluation of a radial soft hash algorithm, an image hashing technique used for image and visual content authentication. First we evaluate its collision resistance and susceptibility to geometrical deformations and image processing attacks. Second we investigate its actual efficiency on different platforms. Although software implementations allow managing sizes and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic shape descriptor using Bezier curves

    Publication Year: 2005, Page(s):95 - 100 Vol. 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Bezier curves are robust tool for a wide array of applications ranging from computer-aided design to calligraphic character, outlining and object shape description. In terms of the control point generation process, existing shape descriptor techniques that employ Bezier curves do not distinguish between regions where an object's shape changes rapidly and those where the change is more gradual or f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy-based parameterized Gaussian edge detector using global and local properties

    Publication Year: 2005, Page(s):101 - 106 Vol. 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Many edge detection schemes suffer from the lack of image quality at the global level. Global properties are more vital in grayscale images due to loss of hue and texture. This paper proposes a novel fuzzy-based Gaussian edge detector that uses both global and local image properties for grayscale images. In the global contrast intensification phase, each pixel in an image is represented in the fuz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic vehicle classification system using range sensor

    Publication Year: 2005, Page(s):107 - 112 Vol. 2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    This paper presents an automatic vehicle classification system based upon laser intensity images obtained from range sensors (called AVCSLII). Current systems that utilize loop detectors, video cameras, and range sensors have deficiencies. The loop detectors have high failure rates due to pavement failures and poor maintenance. Video based systems and range sensors do not perform well in deteriora... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.