2010 2nd International Conference on Information Technology, (2010 ICIT)

28-30 June 2010

Filter Results

Displaying Results 1 - 25 of 79
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for reuse | PDF file iconPDF (284 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 3
    Request permission for reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Conference committees

    Publication Year: 2010, Page(s): 4
    Request permission for reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Greetings from the Chairwoman

    Publication Year: 2010, Page(s):5 - 10
    Request permission for reuse | PDF file iconPDF (305 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s):11 - 14
    Request permission for reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Intelligent information systems

    Publication Year: 2010, Page(s): 15
    Request permission for reuse | PDF file iconPDF (7 KB)
    Freely Available from IEEE
  • Ontology visualization

    Publication Year: 2010, Page(s):17 - 20
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    Ontologies are often represented as a graph where nodes represent objects within given ontology and edges represent relations between those objects. Such graphs can be very complex even for medium sized ontologies so a clean and complete graphical representation is needed. Existing solutions do not include all elements or produce unreadable results for big ontologies. In this paper a complete set ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic conversion of legacy applications into services in BeesyCluster

    Publication Year: 2010, Page(s):21 - 24
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1201 KB) | HTML iconHTML

    The paper presents a solution and a tool for automatic, fast and easy adaptation of legacy Unix applications into services in BeesyCluster. The latter is a middleware that allows users to access distributed servers and clusters via WWW/Web services. Each BeesyCluster user can publish own applications as services and define access policies to such services to make them available to others. Such ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workflow application for detection of unwanted events

    Publication Year: 2010, Page(s):25 - 28
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (937 KB) | HTML iconHTML

    The paper presents a workflow application aimed at detection of unwanted and potentially dangerous events observed by multimedia cameras installed at public facilities, such as universities. The detection of unwanted events launches alarms, causes notifications to be sent to respective forces and videos to be recorded. The proposed application model consists of several stages: nodes with camera(s)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Features of a radial user interface to search engines

    Publication Year: 2010, Page(s):29 - 30
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    The paper is concerned with a new type of user interface to search engines. Instead of presenting search results in a form of a ranked list, the results are presented in radial arrangement. In the center of the interface the most relevant web page is presented. Other web pages are located around the central one. The location of a web page depends on two factors: its relevance to the query and its ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of video object tracking algorithm in autonomous surveillance system

    Publication Year: 2010, Page(s):31 - 34
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    Results of a performance evaluation of a video object tracking algorithm are presented. The method of moving object detection and tracking is based on background modelling with mixtures of Gaussian and Kalman filters. An emphasis is put on algorithm's efficiency with regards to its settings. Utilized methods of a performance evaluation based on a comparison of the algorithm output to manually prep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building student groups of similar usability needs in Web based learning systems

    Publication Year: 2010, Page(s):35 - 38
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    The performance of Web-based learning systems depends on student acceptance of the environment. Usability needs may differ among students attending the same course who have similar technical skills, and it is difficult to determine average user requirements. The identification of student groups of similar preferences may help designers in building interfaces acceptable for users. Methods for build... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge engineering and management

    Publication Year: 2010, Page(s): 39
    Request permission for reuse | PDF file iconPDF (7 KB)
    Freely Available from IEEE
  • Internal representation of s-modular knowledge base in RKaSeA system

    Publication Year: 2010, Page(s):41 - 44
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    The paper presents a novel method for representing ontological knowledge expressed in Description Logics. The method, named G-Cart, overcomes many shortcomings of knowledge cartography and provides practical means of representing semantically modularized knowledge base. The G-Cart has been deployed in the recently developed knowledge management system RKASEA. The paper describes and discusses theo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KQL as an application of SQL rationale for knowledge bases

    Publication Year: 2010, Page(s):45 - 48
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    As a part of the Semantic Web initiative there are being developed knowledge inference systems. The languages for accessing such systems are also open issues. The paper proposes a new language for accessing modularized knowledge bases, which features allow for its comprehensive usage in knowledge management systems in an analogous way as SQL language in relational databases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ideological and practical model of metaontology

    Publication Year: 2010, Page(s):49 - 52
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The development of Semantic Web initiative resulted in the development of many languages for defining and manipulating knowledge. An important aspect of the design of those languages is the design of terminological statements. The paper presents the way the terminological statements are realized in the Knowledge Query Language (KQL) - an access language for the RKaSeA knowledge management system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Description logic based generator of data centric applications

    Publication Year: 2010, Page(s):53 - 56
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1616 KB) | HTML iconHTML

    The knowledge stored in Ontology Management Systems (OMS) that originally has the form of expressions, can be seen as a user application specification or as knowledge provided by an expert. The generator of applications discussed in this paper is defined as a program that automatically generates an application that meets a certain specification stored in OMS. It is shown that it is possible to bui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating training data for SART-2 keystroke analysis module

    Publication Year: 2010, Page(s):57 - 60
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    The keystroke dynamics analysis is one of the biometric techniques which takes into account behavioral features. The difficulty with the keystroke dynamics information is its poor stability. This article briefly presents a solution used to collect training data and extract features for a user authentication system based on the keystroke dynamics. Then a few approaches which might be applied to aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student model representation for pedagogical virtual mentors

    Publication Year: 2010, Page(s):61 - 64
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (683 KB) | HTML iconHTML

    The paper concerns technological aspects of virtual mentors construction, especially concentrating on the student model representation. The article distinguishes several types of information that is gathered by the pedagogical agents and other educational platforms, including student knowledge model, student progress tracking, interaction process patterns and learner preferences. A set of technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia Systems

    Publication Year: 2010, Page(s): 65
    Request permission for reuse | PDF file iconPDF (7 KB)
    Freely Available from IEEE
  • Application of passive acoustic radar to automatic localization, tracking and classification of sound sources

    Publication Year: 2010, Page(s):67 - 70
    Cited by:  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1643 KB) | HTML iconHTML

    A concept, a practical realization and applications of a passive acoustic radar for automatic localization, tracking and classification of sound sources were presented in the paper. The device consists of a new kind of multichannel miniature sound intensity sensors and a group of digital signal processing algorithms. Contrary to active radars, it does not emit a scanning beam but after receiving s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Immersive 3D visualization laboratory concept

    Publication Year: 2010, Page(s):71 - 74
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    In the paper an advanced concept for a Virtual Reality (VR) CAVE installation is presented, which should allow for human immersion in a spatially unlimited virtual world. The CAVE will be completed by the end of 2013 in a special building designed and constructed for the purpose. The unit will simulate an autonomous movement of a human inside a computer generated scenery. The person immersed in VR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gesture-based computer control system applied to the interactive whiteboard

    Publication Year: 2010, Page(s):75 - 78
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    In the paper the gesture-based computer control system coupled with the dedicated touchless interactive whiteboard is presented. The system engineered enables a user to control any top-most computer application by using one or both hands gestures. First, a review of gesture recognition applications with a focus on methods and algorithms applied is given. Hardware and software solution of the syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity verification using complex representations of the handwritten signature

    Publication Year: 2010, Page(s):79 - 82
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (945 KB) | HTML iconHTML

    This paper is devoted to a handwritten signature verification using the cross-correlation approach (adopted by the authors from telecommunications) and dynamic time warping. The following invariants of the handwritten signature: net signature, instantaneous complex frequency and complex cepstrum, are analyzed. The problem of setting the threshold for deciding whether the current signature is authe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile internet and wireless systems

    Publication Year: 2010, Page(s): 83
    Request permission for reuse | PDF file iconPDF (7 KB)
    Freely Available from IEEE